Paxton welcomes a new Senior Product Manager to the United States team, bringing with him a wealth of knowledge and experience of the access control market. Jeremy Allison will be based in Greenville, SC, and will oversee the development of future products, making sure they meet the demands and expectations of the growing US market. With over 15 years’ experience in CCTV and control systems, Jeremy has worked as a product manager for a security company and has run his own integration company. Product management team The company has a really positive atmosphere and I can’t wait to get started" He said, “I’m excited to be working with such a creative and talented team at Paxton - this really is the perfect role for me. I’m looking forward to sharing my knowledge and experience, while further developing my skills using Paxton’s world-class systems. The company has a really positive atmosphere and I can’t wait to get started.” Paul Bannister, Paxton’s Research Director said, “I’m absolutely delighted that Jeremy has joined our product management team, heading up the US side of the department, and bringing 15 years of experience with him. We’re looking forward to working with Jeremy to deliver the world-class products our customers expect, resulting in continued growth for our important US market.” Access control industry Jonathan Lach, VP of Sales at Paxton Access, Inc. said, “Jeremy has a wealth of knowledge of the access control industry, and he will make a fantastic addition to the team.” Jeremy will be working to develop Paxton’s brands: Net2 – simple access control Net2 Entry - innovative video intercom PaxLock – access control in a wireless lockset
Globally renowned video surveillance, analytics and access control systems firm, Axis Communications has announced AXIS P5655-E PTZ Network Camera, a cost-effective, high-performance network PTZ camera for versatile surveillance applications. It comes with the new generation chip that offers improved imaging, enhanced security features, extended capabilities for video analytics and radically more efficient video compression technology. P5655-E PTZ Network Camera AXIS P5655-E features a light-sensitive sensor and forensic WDR for greater clarity in both dark and light settings AXIS P5655-E features a light-sensitive sensor and forensic WDR for greater clarity even when there are both dark and light areas in the scene. Additionally, incorporated with Axis Lightfinder 2.0 technology, the camera captures low-light images with more saturated colours and sharper images of moving objects. Additionally, electronic image stabilisation minimises the effects of vibration and shaking. Including extended processing power for advanced analytics, the camera also offers a choice of four scene profiles (indoor, outdoor, forensic and traffic). For each profile, the camera automatically optimises exposure time, white balance, aperture, sharpness, contrast, and noise to suit specific scene requirements. Signed firmware Signed firmware and secure boot guarantees that the firmware hasn’t been altered and ensures only authorised firmware is installed. And if needed, secure boot guarantees that the camera is completely free of malware after a factory default. Key features of the AXIS P5655-E PTZ Network Camera include: HDTV 1080p with 32x optical zoom Forensic WDR and Lightfinder 2.0 Signed firmware and secure boot Focus recall and EIS Zipstream with support for H.264 and H.265 Two-way audio function To ensure flexible and seamless installation, the P5655-E PTZ Network Camera comes with two-way audio functionality and four I/O ports. Furthermore, Axis Zipstream technology with support for H.264 and H.265 video compression significantly lowers bandwidth and storage requirements.
Tavcom Training, part of Linx International Group, is supporting police forces transformation programs, as they work towards the Policing Vision 2025 and adapt to the rise in digital evidence, with its Gathering Video Evidence course. Earlier this year, the CoPaCC National Police ICT User Survey results were published, and topping the list of digital evidence challenges for the 3,500 police professionals in England & Wales that responded were issues relating to CCTV evidence. The main pain points are - the sharing of evidence electronically with prosecutors (52.5%), manually collecting evidence such as CCTV video on site (51.8%) and converting proprietary CCTV video to a playable format (51.2%). Training BTEC Level 3 course The speed with which police officers can obtain video evidence can have a major impact on an investigation" Developed in collaboration with the police and the Home Office, the Gathering Video Evidence BTEC Level 3 course was first launched in 2009 to support the new role of image retrieval officers. "In the past 10 years, CCTV technology and has undergone a transformation, along with the much wider digital evidence revolution," says Andrew Saywell, Sales Manager at Tavcom Training. The three-day classroom-based course blends theory and practice, to help those involved with the retrieval of video evidence to overcome the challenges highlighted in the CoPaCC National Police ICT User Survey. In doing so, it helps to ensure that the police officers have timely access to better quality footage, which can be used for investigation and prosecution. Saywell adds: "The speed with which police officers can obtain video evidence can have a major impact on an investigation, enabling changes to be brought faster." Gathering Video Evidence syllabus: The impact of legislation on the retrieval of CCTV The range of national guidelines associated with image retrieval by law enforcement Customer relations when dealing with CCTV system owners Risk assessment approaches when carrying out their duties Evidence and exhibit management Audit trail Equipment required for the role How CCTV systems work Export methods and media used Practical application of theory using DVRs and NVRs and appropriate paperwork Making a network connection between laptop and NVR to enable image retrieval The Gathering Video Evidence course runs from 25th – 27th November 2019 and 10th – 12th February 2020, at Tavcom's training center in Hampshire. Successful completion of the course will result in the award of a BTEC Level 3 Certificate.
Team Valley-based Access Training has added to its training team with the appointment of a senior trainer and industry expert in response to the increasing demand for fire, security and emergency systems apprenticeships in the region. Fire and Security training Access currently has 50 apprentices on the fire, security and emergency systems Apprenticeship, working toward their professional qualification whilst gaining excellent paid work experience as young engineers and technicians at firms from across the North East. The fire and security sector is a growing industry that plays a vital role in the economy" Malcolm Armstrong managing director of Access Training said, “The fire and security sector is a growing industry that plays a vital role in the economy and as a result we are experiencing the highest demand we have ever seen for this course. Adding Dave to our team of trainers means that we can respond to this increased demand and I’m sure the experience he brings will be a great benefit to our apprentices.” Security alarm sector expert Engineer Dave Cash brings with him 30 years’ experience working within the security and alarms sector with employers including ADT Fire and Security plc, most recently as a field line manager. Dave Cash, now a security and alarms sector specialist trainer at Access Training, said, “I’m really pleased to have joined the team and it’s great working with the young people at Access Training. We have around 50 apprentices on board this year and each apprentice attends our Team Valley training centre one day per week over the three-year duration of the course. The apprentices come from a variety of employers large and small, right across the region, from Teesside to Northumberland and across to Cumbria. The Protector Group 18-year-old Kieran Campbell from Chester-Le-Street in County Durham is a former pupil of St Leonards in Durham where he achieved five GCSEs and a BTEC in engineering. He now works as a trainee fire and security engineer with The Protector Group, a Team Valley security systems business with offices across the UK. He said, “I always wanted to get a trade and at The Protector Group I have the opportunity to work on projects including the Metro Centre, healthcare business GSK, Newcastle Central Station and many others. All this at the same time as working toward my Level 3 Apprenticeship and receiving classroom and workshop training from Access Training who provide ongoing help. I love it, I’m able to afford to run a car and relax at the weekend with my mates, sometimes playing golf and know I’m working toward a qualification that has already given me a career.” Fire and Security Apprenticeship The Fire, Security and Emergency Systems Apprenticeship, Level 3 is for those wanting a career in engineering The Fire, Security and Emergency Systems Apprenticeship, Level 3 is aimed at those wanting a sustainable career in engineering. It provides the opportunity to develop the skills to install and carry out maintenance on a range of security systems including intruder alarms, CCTV systems, access control systems, fire detection systems and emergency pull cords. Louis Armstrong, also a trainee engineer who works for established SME HN Storey an access control engineering firm based on the Team Valley. Louis passed all six GCSEs at Whickham School, Newcastle upon Tyne before being brought on board by HN Storey as an apprentice engineer in October 2018 working in partnership with Access Training. He said, “I’ve been coming to Access Training once a week since being employed by HN Storey and it’s been great to get work experience alongside support from a training provider to get my Level 3 apprenticeship in fire, security and emergency systems. HN Storey values me enough to work with Access Training supporting me to gain an industry and nationally recognised qualification. I get mentored at work and shadow qualified engineers on site.” Access Training Academy “Alongside this I’m learning all about health and safety best practice and will go on to learn more technical and practical engineering skills in a classroom environment at the Access Training Academy. With industry experts like Dave Cash developing me I’m really loving my job and really grateful for the career opportunity.” Dave Cash said, “There is definitely a demand for engineering skills in the fire and security sector and with our specially equipped facilities we provide practical as well as theoretical training which complements the invaluable workplace experience these apprentices are getting. We have a new group due to start this month, and again in the autumn of 2019.”
Airport environments have become more sophisticated and complex over the course of the last 20 years. What was once a simple structure to facilitate travel from point A to point B has now been transformed into a hustling and bustling setting that offers passengers the comforts and conveniences of a small city. As a result, the complexity of risks that airport operators face has grown exponentially. Security personnel must now mitigate risks like terrorism, theft, personal safety and insider threats all while streamlining operations to help preserve a positive passenger experience. Beyond the visual of long and winding security checkpoint lines, most travelers are unaware of the vast amounts of work that take place behind the scenes to ensure their safety. Increasing passenger numbers On top of the typical, day-to-day concerns security operators face, airports are only becoming busier. According to the United States Department of Transportation’s Bureau of Transportation Statistics, 2018 was a record-breaking year for air passenger travel. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017. As these numbers continue to increase, the demand on airport security personnel to keep people and property safe also increases. This is why the latest advancements in security technology are critical as part of a comprehensive and cohesive airport security strategy. Let’s take a look at some of these advancements and how they are helping airport security operators mitigate risk. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017 Video-based command and control Airports are operational 24 hours a day, 7 days a week, which means it is paramount (and typically mandated) to have video as the heart of modern-day security operation centres (SOC). In today’s data-focused environment, security personnel rely on a multitude of solutions and systems, which often include video surveillance, access control, alarm notifications, and more, to ensure comprehensive protection of passengers. What’s needed is a single, unified platform with integrated event management and response The rising influx of information from these systems can often be overwhelming, and in most cases, manual processes are used to manage across these domains in an attempt to achieve a coordinated response. These manual processes are not scalable. What’s needed and is now being introduced to the market is a single, unified platform with integrated event management and response to allow security operators to maximise situational control and determine the appropriate intelligence-powered response. Real-time situation management The combination of real-time video, with information from a variety of additional sensors, devices and applications is changing the game for airport security personnel. Now, in the event of an incident, security officials can use this data to gain enhanced situational awareness of what’s happening and deliver actionable insights to efficiently and effectively respond to the incident. Through numerous information sources and security systems, airports can benefit from a modernised and enriched investigative experience for a broad and deep understanding of routine or emergency situations. Advanced analytics Analytics are a powerful resource that gives security teams the ability to discover significant patterns and obtain insightful knowledge from video surveillance data. Advanced algorithms can be the key in providing early warnings to assist in detecting threats, helping to establish a proactive security strategy. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations. Additionally, analytics can automate predefined standard operating procedures to help minimise human error and optimise resource utilisation. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations Mobile reporting The Internet of Things (IoT) and ubiquitous connectivity have brought remote capabilities to airports, where instantaneous information sharing is paramount. Mobile reporting solutions allow passengers and employees to act as additional “eyes and ears”, bringing critical safety alerts to the attention of security officials. Information shared by passengers and employees can be extremely beneficial to help shed light on a security incident and enable faster and more efficient response. Some solutions even offer the ability to share video and audio with the command centre through a passenger’s smartphone. Facial recognition technology Facial recognition can provide situational intelligence through detecting, tracking, and alerting on persons-of-interest A powerful and versatile security solution, facial recognition can provide situational intelligence to security operations centres through detecting, tracking, and alerting on persons-of-interest appearing in video streams across multiple sites and thousands of cameras simultaneously. These systems are capable of forensic-search recognition capabilities and can be compared against national, local or custom databases to make investigations faster and more efficient. Interest and adoption of the technology is growing, with new use cases being introduced daily. The solution is sure to become a valuable tool in the years to come. In short, airports are very much like small connected cities, featuring a landscape with a variety of assets, a wide range of stakeholders, and numerous sites that keep safety at the forefront of the public eye. However, while global risks and day-to-day challenges can be difficult for security operators to manage, today’s advanced and intelligent technologies can ultimately help improve the overall traveler experience.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Artificial intelligence allows machines to do jobs previously done by people. When it comes to security and surveillance, this technology allows cameras and control room equipment to identify a wide range of threats automatically and in real time across hundreds or even thousands of cameras – allowing security teams to take immediate action to protect people and assets. AI technology and surveillance solutions Artificial Intelligence technology built into surveillance solutions help organisations optimise their security Video surveillance cameras are the electronic eyes of any security operation. In the past, human supervision was needed to make sense of the images captured, and to assess whether certain events posed a security risk or not. With some organisations using hundreds or even thousands of cameras to protect their people and assets, manual review of footage is simply impossible – potentially leaving them vulnerable to security breaches. Advanced Artificial Intelligence technology built into surveillance solutions can help organisations overcome this challenge and optimise their security. This means cameras, control-room equipment and back-end infrastructure can now ‘learn’ about potential threats for themselves by recognising people, vehicles and even behaviours. Detection and prevention The manual interventions needed with traditional security systems mean that teams were frequently reacting to breaches that had already happened. Artificial Intelligence changes all this by recognising potential threats before they impact company’s people or assets – allowing security teams to react immediately to neutralise any potential threat. Artificial intelligence solutions can automatically trigger alerts when a person appears in a restricted area For example, artificial Intelligence solutions can automatically trigger alerts when a person appears in a restricted area, or when a vehicle with a blacklisted number plate enters a site. With alerts delivered in real time, teams can identify and react to security threats and protect people and assets more effectively. And because alerts are automated, potential threats are hardly missed or overlooked. How does artificial intelligence work? Artificial Intelligence systems become more intelligent over time, building databases of potential threats and reacting to new events accordingly. This allows systems to ‘think for themselves’ and to alert teams of any suspicious events or people who are caught on camera. Artificial intelligence technologies use advanced algorithms based on Deep Learning to distinguish between different kinds of security events and threats. Technologies incorporated into the Hikvision portfolio include: Facial recognition which allows law enforcement personnel to identify suspects and commercial teams to identify VIP customers in real time. Vehicle identification which can be used to identify vehicle number plates and recognise different types of vehicles (even down to make and model), or to trigger alerts when vehicles enter restricted areas. Perimeter protection which helps organisations to identify real threats by distinguishing people and vehicles from other moving objects and keeping false alarms to a minimum. Business intelligence which employs people counting, queue detection, and heat mapping technologies, so that organisations can enhance operational efficiency by making use of the data report. Increasing commercial success Artificial intelligence isn’t just useful for identifying security threats – although this is a key strength of the technology. It can also help organisations increase their competitiveness and commercial success. For example, VIP customers who opt to participate in special marketing promotions or other incentives can be identified so staff can provide the right kind of service at the right time. This gives organisations the opportunity to personalise the service experience, foster loyalty and maximise customer lifetime revenues. Artificial Intelligence can help organisations to better understand customers and meet their needs more effectively In the same way, artificial Intelligence can help organisations to better understand customers and meet their needs more effectively – leading to more commercial opportunities. One feature – called People Counting – allows stores and commercial centres to map footfall at peak times, ensuring that staffing is optimised to meet demand. At the same time, stores can see which areas of the building customers visit most and adjust their merchandising and product positioning accordingly to maximise the sales opportunities. Artificial intelligence at Hikvision Hikvision’s family of artificial intelligence products include the DeepinView network cameras and DeepinMind NVRs. The products help to tackle security with facial recognition; monitoring and counting of people; and recognition and detection of vehicles, to name a few. These features all depend on artificial intelligence technology to recognise, classify and respond to security threats. This article was written by Hikvision.
A video analytics system that provides ‘behavioural understanding’ can yield more meaningful and actionable data for a range of applications. In public safety and security, such a system can alert on violent or suspicious behaviours, such as people fighting, vandalism, people with weapons, etc. In advanced traffic surveillance and monitoring, it can provide alerts to vehicle collisions (accidents), traffic hazards or vehicle that aren’t using the road properly, such as a car that stops in the middle of the junction. For enterprise and campus security, it can provide advanced anti-tailgating and detect unauthorised activity. Video surveillance infrastructure viisights was founded by a group of entrepreneurs with track records in developing technology businesses These uses are among the benefits of viisights’ video analytics technology based on behavioural understanding of video content. “It means we can extract more meaningful data from the huge amount of video content that is captured, and we can transform that data to actionable insights that eventually justify the massive investment in video surveillance infrastructure,” says Asaf Birenzvieg, CEO of viisights. Their behavioural understanding systems for real-time video intelligence leverage artificial intelligence technology. viisights was founded by a group of serial entrepreneurs with track records in developing technology businesses. The Israeli company’s founders recognised a growing global need for intelligence to make physical and virtual public areas safer – and realised the role that smart video understanding technology can play. Developing artificial intelligence technologies viisights is committed to developing artificial intelligence technologies that facilitate human-like video understanding, which in turn serves as the basis for fully autonomous video intelligence systems powered by pattern prediction technology. “Behavioural recognition is the future of video analytics and the next generation of the object classification analytics systems that hold the majority of the market today,” says Birenzvieg. viisights has developed a video understanding technology for real-time video processing “To date most video analytics systems still base their product features on static analysis of objects from images using image recognition, even the ones that use ‘AI analytics.’ Products built using such object classification technology are extremely limited.” For example, object classification analytics cannot recognise behavioural events in a video such as people fighting or a car collision because such behaviours can’t accurately be concluded in large scale from analysing a single static image/frame. Video understanding technology viisights has developed a video understanding technology for real-time video processing. The technology can process live video feeds. In addition to recognising a particular object (e.g., person) and its attributes (e.g., red shirt), the system can understand an object’s actions, interactions with other objects (events), the scene being viewed (i.e., crowd is gathering, riots) and the context (a car is driving on the road or on the sidewalk). The main verticals are smart cities, enterprises and campuses, banks and ATM security “Basically, we are able to extract more meaningful data from a live video feed and therefore create actionable insights and greater ROI,” says Birenzvieg. The company focuses mostly on security and safety use-cases. The main verticals are smart cities, enterprises and campuses, banks and ATM security, security guard companies and transportation hubs. The company is working on a new product for in-vehicle monitoring mostly for security, safety, vehicle protection and proper vehicle use; it monitors passengers’ behaviour inside a bus, train, or taxi. The product will come to market next year. Video management system viisights’ video analytics offering is currently optimised for server-side deployment, and the integration architecture is similar to most video analytics systems. From one side it is integrated with the video management system (VMS). They are a Milestone verified partner and soon will be part of Milestone's marketplace. From the other end, it is connected to a command-and-control system for processing the data and presenting the alerts to the end-user. The analytics company makes most sales through system integrators. They have partnerships with big system integrators like Motorola Solutions and NEC and are also working with smaller ones. They are looking to expand their system integrator network, mostly in the USA and Europe. Behaviours can have many variations and they can be very diverse Cloud video surveillance “We will continue to invest in performance and accuracy, meaning higher recall and lower false positive rate,” says Birenzvieg. “Since our major value proposition is in behaviour recognition, behaviour events many times are not clearly defined, which is very different from object classification. Behaviours can have many variations and they can be very diverse.” An example is a simple behaviour like a person falling on the floor. A person can fall on the floor in many ways, but the challenge is to ignore similar behaviours that are not a person falling and that confuse the system, such as a person bending over to tie his shoelaces. With cloud video surveillance becoming a trend, viisights is also looking into offering some of their advanced functionalities in a video-analytics-as-a-service-model.
An interim Federal Acquisition Rule (FAR) detailing how the U.S. Federal government will implement a ban on government use of video surveillance products from Chinese manufacturers has been released just days before the August 13, 2019, deadline for the ban to take effect. The interim rule will take effect immediately; it notes there are "urgent and compelling reasons… to promulgate this interim rule without prior opportunity for public comment". After the interim rule is published in the Federal Register, 60 days will be allowed for public comments to be submitted (tag comments and correspondence ‘FAR Case 2018-017’). The final rule will follow. The agencies issuing the interim rule are the Department of Defense (DoD), the General Services Administration (GSA), and the National Aeronautics and Space Administration (NASA). Banning Chinese video surveillance equipment The interim rule provides details about implementation of Section 889(a)(1)(A) of the NDAA for fiscal year 2019The interim rule provides details about implementation of Section 889(a)(1)(A) of the National Defense Authorization Act (NDAA) for fiscal year 2019, which the President signed into law on August 13, 2018, to take effect a year later. It bans government uses of telecommunications and video surveillance equipment produced by Hikvision and Dahua, among other companies. The interim rule also applies to telecommunications equipment produced by Huawei Technologies Company or ZTE Corp. (or any subsidiary or affiliate). Huawei manufactures HiSilicon chips widely used in video cameras. The interim rule requires inclusion of a clause prohibiting the listed telecommunications and video surveillance services on solicitations and/or resulting contracts that occur on or after August 13, 2019. Contractors who identify covered equipment during the performance of a contract are required to report it within one business day; and to report mitigation actions within 10 business days. The requirement is included in contracts with subcontractors. Identifying telecommunications equipment The rule requires submission of a ‘representation’ with each offer (government bid) to identify any covered telecommunications equipment or services that will be provided to the Government. The interim rule states: “DoD, GSA, and NASA recognise that some agencies may need to tailor the approach to the information collected based on the unique mission and supply chain risks for their agency.” The head of an executive agency can grant a one-time waiver on a case-by-case basis for up to a two-year period There is an option for contractors to "represent annually whether they sell equipment, systems, or services that include covered telecommunications equipment or services". A ‘no’ answer then applies to any contracts during the year. If a contractor answers ‘yes’, they are required to specify that each individual bid does not include the covered equipment. The head of an executive agency can grant a one-time waiver on a case-by-case basis for up to a two-year period. Waivers require a compelling justification, that the equipment be listed/reported, and that a phase-out plan is implemented. The Director of National Intelligence can also provide a waiver. Prohibits purchase of COTS items The interim rule also applies to purchase of commercial off-the-shelf (COTS) items: "Th[e] level of risk is not alleviated by the fact that the equipment or service being acquired has been sold or offered for sale to the general public... nor by the small size of the purchase." It prohibits ‘micro-purchases’ of covered products and services delegated by agency heads. The interim rule covers the NDAA Section 889(a)(1)(A), which is the ‘Chinese ban’ provision. It does not cover the ‘blacklist’ provision [Section 889(a)(1)(B)], which was the subject of a public hearing in July. According to the interim rule: "The prohibition in section 889(a)(1)(B) is not effective until August 13, 2020, and will be implemented through separate rulemaking." The ban also applies to current government installations, and there are questions about whether agencies and departments will comply in time.
The ban on U.S. government usage of Chinese-made video surveillance products was signed into law last year and was scheduled to take effect a year later – on August 13, 2019. With that deadline looming, there are questions about whether government agencies and departments will comply in time. A year ago, the U.S. Congress passed, and the President signed, a ban on government uses of video surveillance equipment produced by two of the world’s top manufacturers – Hikvision and Dahua. The provision was buried in the National Defense Authorization Act (NDAA) for fiscal year 2019, which the President signed into law on August 13, 2018. The ban, which takes effect ‘not later than one year after … enactment’, applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. Tracking software to detect banned products Forescout Technologies, San Diego, California, provides software to track various banned devicesThe bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. One problem is identifying where the surveillance equipment is being used, which involves either a tedious manual process to search out the equipment or the installation of tracking software to identify it on the network. A federal Department of Homeland Security program called ‘Continuous Diagnostics and Mitigation’ requires use of a detection tool to find any banned products on a network. Forescout Technologies, San Diego, California, provides software to track various banned devices, but not all required agencies have complied with a mandate to secure their networks by tracking every connected device (only 35% had complied as of 2018.) “Without an automated, real-time tool that can detect all of the IT devices – computer or ‘other’ – on your network, there is simply no way to be 100 percent certain that you are compliant with these product bans,” says Katherine Gronberg, Forescout’s Vice President, Government Affairs. Difficult to determine device’s manufacturer Not all equipment is marked to identify its manufacturer; some has been rebrandedAnother problem is the existence of OEM agreements and other supply chain complications that can make it difficult to determine the manufacturer of any given device. A report by Bloomberg says: “A complex web of supply chain logistics and licensing agreements makes it almost impossible to know whether a security camera is actually made in China or contains components that would violate U.S. rules.” Not all equipment is marked to identify its manufacturer; some has been rebranded. “There are all kinds of shadowy licensing agreements that prevent us from knowing the true scope of China’s foothold in this market,” said Peter Kusnic, a technology writer at business research firm The Freedonia Group. “I’m not sure it will even be possible to ever fully identify all of these cameras, let alone remove them. The sheer number is insurmountable.” Companies banned under NDAA The NDAA ban covers “public safety, security of government facilities, physical security surveillance of critical infrastructure, and other national security purposes.” It bans “video surveillance and telecommunications equipment produced by Hytera Communications Corporation, Hangzhou Hikvision Digital Technology Company, [and] Dahua Technology Company (or any subsidiary or affiliate of such entities).” Hytera Communications is a Chinese digital mobile radio manufacturer. Huawei Technologies Co. equipment has also been banned, including the HiSilicon chips widely used in video cameras. In addition to banning the Chinese equipment in government installations, the NDAA also includes a ‘blacklist’ provision [paragraph (a)(1)(B)], which could be interpreted to extend the ban to companies that use Chinese-made products in other, non-government applications. Rulemaking on that aspect is still under way, including a public hearing in July.
The National Health Insurance Fund (NHIF) is a Social Health Insurance Scheme established by CAP 395 with the main objective of ensuring accessibility of health care services to all Tanzanians. The Fund has managed to expand its coverage to include councils, private companies, religious and educational institutions, private individuals, children under 18 (TOTO Afya) as well as mutual groups, whereby all members can equally access health services in all accredited health facilities. The Fund is also administering the Bunge Health Insurance Scheme, on behalf of the National Assembly. NHIF is a prestigious public institution that serves people all over Dar es Salaam and Tanzania. It has multiple sites spread over these regions. Their current surveillance platform had a few limitations of integrating third-party cameras and was not facilitating centralised monitoring for multiple locations. Matrix Sataya Samas is designed to meet diverse needs of large enterprises connected to a central location or a single site This posed a problem in managing and monitoring all sites from a single location. For this, they needed a surveillance platform that could easily integrate with multi-brand cameras as well as facilitate multi-location monitoring. Moreover, they needed a system with monitoring capacity of over 500 cameras with the facility of remote management for real-time security. Specifically designed solutions To the above challenges, Matrix Offered Sataya Samas Video Management System. It is a Video Surveillance management solution specifically designed to meet the diverse and complex needs of large enterprises having multiple sites connected to a central location or a large, single site. The system was able to integrate with 56 AXIS cameras available at its Head Quarters and other 16 cameras available at its district branch offices. All the cameras were managed at a single central server located at the NHIF HQ office. Matrix VMS provided real-time security with Intelligent Video Analytics such as Motion Detection, Intrusion Detection, Trip Wire etc. Additionally, VMS enabled monitoring and managing video surveillance from mobile phones and tablets remotely by using Matrix Mobile Application: SATATYA VISION. These features made monitoring much more reliable and easier for them. Project highlights : VMS Simultaneous User Licence - 3 Qty Mobile App (SATATYA VISION) Intelligent Video Analytics Benefits : Retention of existing Security infrastructure Reduces storage consumption with cost-saving features Centralised monitoring and management Real-time security
360 Vision Technology’s Invictus ruggedised Hybrid PTZ cameras are being used to protect endangered nesting green sea turtles. The Invictus camera has been deployed as part of Security Centres International’s high-performance Mobile Advanced Safety Tower (MAST), rapid deployment camera solution, which is now installed on the Cayman Islands, British West Indies. Mobile Advanced Safety Tower The MAST unit was deployed after a funding campaign led by Caymanian, Michael Ridley, to install video surveillance at a key nesting beach at Sand Hole Road in Boatswains Bay. “Sand Hole Road is a critically important nesting beach for the female turtles, who crawl out onto the beaches to dig nests and lay eggs during the night,” Michael explains. We are all very confident that the data obtained from this project will prove invaluable " “Unfortunately, poaching poses a constant threat to the survival of the nesting sea turtles at many locations. In addition, economic development of the island has seen more beach front property being built and a subsequent squeeze on places available for the turtles to nest safely after migrating long distances between feeding grounds.” HD surveillance imaging He adds, “After analysing the Cayman Islands Department of Environment (DoE) detailed nesting data accumulated over 20 years, to identify the most vibrant turtle nesting grounds, I selected the beach to implement a pilot program to monitor nesting turtles and protect them from poaching activity. The beach site has been dubbed, ‘Turtle Beach’ and provides a perfect nesting ground for turtles due to its minimal property development, zero light pollution, and enough sand and vegetation to support the turtles’ nesting activity.” “The Invictus based MAST solution was perfect for the application at the beach,” says Stuart Bostock, Executive Group President at Security Centres International. “Featuring world-class HD surveillance imaging from the 360 Vision Invictus camera, leading-edge design, robust build, zero infrastructure requirements and seamless Video Management System (VMS) integration, MAST is the only product of its kind. It’s also 100% self-powered, using solar energy and a 100-hour back-up battery; a feature supported by the use of the low power requirements of the 360 Vision Invictus camera.” High-performance CCTV surveillance Monitored 24/7, images from the camera enable DoE and Royal Cayman Islands Police Service (RCIPS) officers to be alerted and dispatched when nesting turtles arrive at the beach, assisting the DoE to monitor the beach and provide the highest level of protection against poaching. “We are all very confident that the data obtained from this project will prove invaluable in assisting the DoE with their conservation efforts and assist them with their Island-wide monitoring efforts,” says Michael. “Sand Hole Road is a critically important nesting beach with poaching posing a constant threat to the survival of the sea turtles that nest there, so high-performance CCTV via the MAST solution was specified as the best way to protect them.” Night-time surveillance The MAST system was selected for deployment on the beach due to its excellent night-time surveillance capability The MAST system was selected for deployment on the beach due to its excellent night-time surveillance capability, operating without the need for any supporting local infrastructure. Plus, the MAST system is silent in operation, posing no environmental impact, and thanks to the 360 Vision IR LED illuminator equipped Invictus camera, the system can operate without a visible light source that may disturb, or draw unwanted attention to the turtles nesting site. Mark Rees, Managing Director at 360 Vision Technology added “The Invictus is a high-performance, ruggedised all-in-one PTZ camera with full 1080P HD and Predator ultra-low-light camera technology, making it the perfect choice for off-grid temporary/rapid deployment mobile surveillance rigs, such as MAST. Additionally, Invictus’ low-power consumption greatly assists the longevity of critical off-grid battery power when deployed in remote applications, extending MAST’s operational performance, and meaning fewer maintenance visits to the camera, with the benefit of less disturbance to the green sea turtles.” Video evidence gathering “The Invictus camera’s unparalleled mix of competitive cost and advanced functionality make it the perfect imaging component for the innovative MAST system, where it is now providing much needed surveillance protection and research video.” To date, the use of the MAST unit has proved a huge success in protecting the sea turtles from poachers and providing evidential video of the turtles’ feeding and nesting activity on the beach. Calculating population, nesting patterns and survival rates from the footage gained during this season, plans have already been made for additional protection measures and the extension of the MAST based surveillance program to other locations on the British West Indies island.
Comelit 4 camera wireless CCTV system has been selected on site at the iconic, Grade II listed Chichester Cathedral, to protect the retail area and provide 24x7 high-quality monitoring capability and extra peace of mind for staff. Wireless CCTV surveillance This magnificent Cathedral has stood at the centre of Chichester for over 900 years. With unique architecture from each century of its life, this Cathedral is both ancient and modern, where original medieval features sit alongside world famous contemporary artworks. Any works needed to consider the sensitivities of working in such a historic building. A representative from Chichester Cathedral commented, “When it came to upgrading CCTV for the retail area, we contacted Envisage Technology Ltd who recommended Comelit’s 4 camera wireless CCTV system. It has proven to be the perfect solution, with the system proving simple to install. Staff now have access to monitors by the till points that also act as a significant visual deterrent. The high-quality images available add extra peace of mind.” Four camera wireless CCTV Kevin Brown, Managing Director, Envisage Technology added, “Chichester Cathedral is one of the most prestigious visitor sites in West Sussex. Comelit’s wireless CCTV specification, coming from such a renowned brand, provided the necessary infrastructure to embrace the need for delicate installation, minimising the need to run cables, and still provide the high-quality footage. We can support the ongoing maintenance process to ensue volunteers, customers and staff are kept safe and secure.” Comelit’s simple four camera wireless CCTV system provides a clear, detailed and well-defined high-resolution image Comelit’s simple four camera wireless CCTV system provides a clear, detailed and well-defined high-resolution image. Installed outside of opening hours to avoid disruption to the retail environment, monitors were positioned directly by the till points, enabling staff to have full visual access of the complete area at all times. Retail surveillance Tim Edmonds, Comeilt CCTV Manager concluded, “The retail area, established in such a significant Cathedral is a great example of how Comelit’s wireless CCTV system can be used to protect any environment.” “Working with Envisage, the solution was presented as a simple, yet effective option, installed with absolutely no impact on the surrounding building. The result is a powerful visual deterrent and peace of mind that staff in store, and in back offices can keep an eye on operations quickly and easily, on a 24x7 basis.”
As prominent in Belfast’s history as its cranes are on the city’s skyline, it’s hard to imagine Belfast without Harland and Wolff. Once the world’s greatest shipbuilder, Harland and Wolff today has evolved into a company that provides over 150 years of engineering excellence to the maritime, offshore, and renewable energy sectors. The Harland and Wolff facilities on Queen’s Island are now used to maintain some of the world’s largest ocean-going vessels, ranging from offshore platforms and cruise liners to offshore wind farms. The company is spread over two sites in Belfast and covers over 200 acres. Its main facility has a public-facing perimeter of no less than 1.5 kilometers. With safety as a primary consideration in the execution of projects, the company goes to great lengths to protect its investments from unwanted visitors, intruders, and vandalism. FLIR VMS solution For over 15 years, Harland and Wolff has been using FLIR’s United VMS to manage a wide variety of security cameras For over 15 years, Harland and Wolff has been using FLIR’s United Video Management System (VMS) to manage a wide variety of security cameras. As technology innovations and features were being added onto the United VMS over the years, Harland and Wolff has always remained loyal to the FLIR brand. But with the increasing development of Queen's Island as an industrial, commercial, and tourist area came a greater public presence and an increased safety and security threat. That is why in recent years Harland and Wolff has been continuously investing in the latest security camera technology from FLIR, including enterprise security cameras, PTZ cameras, intelligent thermal cameras, and mobile and wearable cameras. Optical and thermal cameras “Today, over 140 FLIR cameras on-site and along the site’s perimeter make sure that we can detect any irregularity,” said Chris Neill, security operations manager at Harland and Wolff. “Whenever one of our cameras picks up an incident – an intruder for example – an alarm is generated and sent to our security control room, who can then follow up the incident. This ensures us that our investment and that of our customers is safe and secure at all times.” Due to the high impact and risk associated to a possible incident on site, the company’s security department follows a proactive approach for possible intruders. Even in complete darkness, in perimeter areas where there is no additional lighting, thermal analytic cameras can pick up the presence of intruders, animals, or vehicles automatically based on their heat signatures. Intruder detection While thermal camera footage does not allow actual identification of intruders, it can still be used as evidence for insurance companies or law enforcers, especially when an intrusion pattern can be seen over different cameras. United VMS is FLIR’s enterprise-level software solution for video surveillance operations United VMS is FLIR’s enterprise-level software solution for video surveillance operations. The software is currently used at Harland and Wolff by four control room operators and eight managers, all of which have dedicated user rights. One of the strengths of the United VMS system is that it can connect with nearly any security camera on the market and that video streams and detection alerts can be presented on any screen, be it on a video wall, a PC, or a smartphone. United VMS But Harland and Wolff has been using United VMS for far more applications. “We also use the United VMS platform to monitor alarms coming from fire sensors on oil rigs, for example,” said Neill. “Another example is the detection of failed pumps on one of our drydocks. This information also comes in on United VMS, where we generate alarms and notify key staff in real time.” Harland and Wolff has indeed managed to make use of United VMS's flexibility and deploy it for much more than security applications only. "We are not in a static business," said Neill. "At Harland and Wolff, we are always taking on new challenges and solving new problems; FLIR’s United VMS platform helps us do that.” TruWITNESS mobile sensor technology Harland and Wolff will also make use of TruWITNESS, the latest mobile and wearable sensor technology from FLIR. TruWITNESS will allow guards on patrol to stream video directly to the control room in real time and from anywhere on the Harland and Wolff sites. Harland and Wolff needs to comply with a minimum security level imposed by the UK Department of Transport" Guards will be able to bookmark events so that incidents or irregularities can be reported and can be followed up more efficiently. In case of incidents, camera footage from the TruWITNESS wearable devices can be used as evidence. In addition, control room operators will be able to track members of staff via the United VMS and display their location on a map. Security technology advancements “Our yellow gantry cranes have become a national icon,” said Neill. “Unfortunately, this also means that they are an attractive target for political messages or, as in the past, terrorism. As a port facility, Harland and Wolff needs to comply with a minimum security level imposed by the UK Department of Transport. But in reality, we always exceed these requirements. We owe this to our continuous investments in security technology, which we also consider as a commitment to our customers.” Maybe this is what connects Harland and Wolff with FLIR. “As committed as we are to our customers, we expect the same from our suppliers as well,” said Neill. “As someone with a technical background, I have always been convinced of the quality of FLIR security products. But there will always be a time when you need to rely on technical support, and that’s where FLIR really makes a difference.”
Round table discussion
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
One impact of Chinese companies entering the physical security market has been an erosion in product pricing, creating what has been called the "race to the bottom". However, political forces and cybersecurity concerns have presented new challenges for Chinese companies. Adding cybersecurity increases costs, and the addition of more functionality to edge devices is another trend that has impacted product pricing. We asked this week's Expert Panel Roundtable: Has price erosion ended (or slowed down) in the security market?
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditisation is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
Video surveillance: Manufacturers & Suppliers
- Hanwha Techwin America Video surveillance
- Bosch Video surveillance
- Hikvision Video surveillance
- Pelco Video surveillance
- Visionhitech Video surveillance
- LILIN Video surveillance
- eneo Video surveillance
- Panasonic Video surveillance
- Honeywell Security Video surveillance
- Vicon Video surveillance
- Messoa Video surveillance
- Axis Communications Video surveillance
- Dedicated Micros Video surveillance
- FLIR Systems Video surveillance
- Dahua Technology Video surveillance
- Sony Video surveillance
- VIVOTEK Video surveillance
- Arecont Vision Video surveillance
- Vanderbilt Video surveillance
- Siqura Video surveillance