National Security

 

 

https://sm.asisonline.org/Pages/Partners-in-Crimestopping.aspxPartners in CrimestoppingGP0|#21788f65-8908-49e8-9957-45375db8bd4f;L0|#021788f65-8908-49e8-9957-45375db8bd4f|National Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652017-09-01T04:00:00Zhttps://adminsm.asisonline.org/pages/mark-tarallo.aspx, Mark Tarallo<p>​A few years ago in Australia, a group of industry representatives and Australian government officials got together to make a plan. They wanted to fight financial crime and terrorism in a way never done before, by designing a new system for discovering, interpreting, and disrupting financial crime.</p><p>In May, the plan came to fruition with the formal launch of the Fintel Alliance, an initiative that is being billed as the world’s first private-public partnership aimed at combatting money laundering and terror financing. The alliance was established by the Australian Transaction Reports and Analysis Centre (AUSTRAC), which is Australia’s financial intelligence agency with regulatory responsibility for anti-money laundering and counterterrorism financing.</p><p>Organizers say that one of the unique aspects of the alliance is that its diverse team members—representatives from the financial sector, nongovernmental organizations, law enforcement, and national security agencies—work cheek-by-jowl in AUSTRAC’s operations hubs in Sydney and Melbourne. </p><p>This collaboration, they say, means agility—intelligence that is drawn from close to real-time information can be exchanged quickly, using the best tracking tools. This agility and cooperation enables the alliance to follow the money trail down holes, behind fraudulent facades, and wherever else it leads.</p><p>“We aim to make Australia the most difficult jurisdiction in the world for organized crime and terrorism financiers to operate in,” the group said when it was launched earlier this year. “Fintel Alliance will be relentless in pursuing serious financial crime, terrorism financing, and the profits of organized crime.”</p><p>The alliance has three operational goals: to help private sector partners identify and report suspicious transactions more easily; to help law enforcement partners arrest and prosecute criminals more quickly; and to work with academia to build knowledge and gather insight.</p><p>Under the alliance umbrella, industry leaders and government agencies will attempt to advance these goals by working together to design initiatives in the fight against crime. It will also focus on developing a more streamlined and efficient regulation framework in the areas of anti-money laundering and counterterrorism financing.</p><p>The alliance is working on three projects this year: the identification of money mules, or intermediaries who transport stolen money to fraudsters; the exploitation of data from the Australian Cyber Online Reporting Network (ACORN); and the examination of the Panama Papers, the 11 million documents owned by a Panamanian law firm about offshore entities that were leaked in 2015. </p><p>The group is also considering taking on two new projects: helping police investigate the financial networks of an organized crime syndicate, and developing public-private partnership capabilities to design strategies for disrupting national gangs.</p><p>There’s also the possibility of future expansion. The United Kingdom’s National Crime Agency has joined as the first international alliance member, and alliance officials have said that they hope to work alongside more international counterparts in the future.</p>

 

 

https://sm.asisonline.org/Pages/How-to-Build-a-Wall.aspx2017-06-01T04:00:00ZHow to Build a Wall
https://sm.asisonline.org/Pages/How-Smugglers-and-High-Risk-Travelers-Enter-the-US.aspx2017-05-04T04:00:00ZHow Smugglers and High Risk Travelers Enter the United States
https://sm.asisonline.org/Pages/Detention-Tension.aspx2017-03-01T05:00:00ZDetention Tension

 

 

https://sm.asisonline.org/Pages/Go-with-the-Flow.aspx2017-09-01T04:00:00ZGo with the Flow
https://sm.asisonline.org/Pages/France-Confiscates-Weapons-from-100-Suspected-Extremists.aspx2017-07-06T04:00:00ZFrance Confiscates Weapons from 100 Suspected Extremists
https://sm.asisonline.org/Pages/Extreme-Measures.aspx2017-07-01T04:00:00ZExtreme Measures

 

 

https://sm.asisonline.org/Pages/Partners-in-Crimestopping.aspx2017-09-01T04:00:00ZPartners in Crimestopping
https://sm.asisonline.org/Pages/Go-with-the-Flow.aspx2017-09-01T04:00:00ZGo with the Flow
https://sm.asisonline.org/Pages/FEMA,-CSOs-Assess-Dynamic-Situation-in-Houston.aspx2017-08-29T04:00:00ZFEMA, CSOs Assess Dynamic Situation in Houston

 

 

https://sm.asisonline.org/Pages/Securing-Sacred-Spaces.aspx2017-08-01T04:00:00ZSecuring Sacred Spaces
https://sm.asisonline.org/Pages/In-the-Zone.aspx2017-08-01T04:00:00ZIn the Zone
https://sm.asisonline.org/Pages/Counterterrorism-or-Coercion.aspx2017-08-01T04:00:00ZCounterterrorism or Coercion

 You May Also Like...

 

 

https://sm.asisonline.org/Pages/Partners-in-Crimestopping.aspxPartners in Crimestopping<p>​A few years ago in Australia, a group of industry representatives and Australian government officials got together to make a plan. They wanted to fight financial crime and terrorism in a way never done before, by designing a new system for discovering, interpreting, and disrupting financial crime.</p><p>In May, the plan came to fruition with the formal launch of the Fintel Alliance, an initiative that is being billed as the world’s first private-public partnership aimed at combatting money laundering and terror financing. The alliance was established by the Australian Transaction Reports and Analysis Centre (AUSTRAC), which is Australia’s financial intelligence agency with regulatory responsibility for anti-money laundering and counterterrorism financing.</p><p>Organizers say that one of the unique aspects of the alliance is that its diverse team members—representatives from the financial sector, nongovernmental organizations, law enforcement, and national security agencies—work cheek-by-jowl in AUSTRAC’s operations hubs in Sydney and Melbourne. </p><p>This collaboration, they say, means agility—intelligence that is drawn from close to real-time information can be exchanged quickly, using the best tracking tools. This agility and cooperation enables the alliance to follow the money trail down holes, behind fraudulent facades, and wherever else it leads.</p><p>“We aim to make Australia the most difficult jurisdiction in the world for organized crime and terrorism financiers to operate in,” the group said when it was launched earlier this year. “Fintel Alliance will be relentless in pursuing serious financial crime, terrorism financing, and the profits of organized crime.”</p><p>The alliance has three operational goals: to help private sector partners identify and report suspicious transactions more easily; to help law enforcement partners arrest and prosecute criminals more quickly; and to work with academia to build knowledge and gather insight.</p><p>Under the alliance umbrella, industry leaders and government agencies will attempt to advance these goals by working together to design initiatives in the fight against crime. It will also focus on developing a more streamlined and efficient regulation framework in the areas of anti-money laundering and counterterrorism financing.</p><p>The alliance is working on three projects this year: the identification of money mules, or intermediaries who transport stolen money to fraudsters; the exploitation of data from the Australian Cyber Online Reporting Network (ACORN); and the examination of the Panama Papers, the 11 million documents owned by a Panamanian law firm about offshore entities that were leaked in 2015. </p><p>The group is also considering taking on two new projects: helping police investigate the financial networks of an organized crime syndicate, and developing public-private partnership capabilities to design strategies for disrupting national gangs.</p><p>There’s also the possibility of future expansion. The United Kingdom’s National Crime Agency has joined as the first international alliance member, and alliance officials have said that they hope to work alongside more international counterparts in the future.</p>GP0|#21788f65-8908-49e8-9957-45375db8bd4f;L0|#021788f65-8908-49e8-9957-45375db8bd4f|National Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Unconventional-Cooperation.aspxUnconventional Cooperation<p>​</p><p>Day one of the Democratic National Convention (DNC) in Denver was drawing to a close on Monday, August 25, 2008. The work day had ended for many downtown. A warm summer evening was slowly taking over the hot, dry day, and the Denver Police Department had just issued the command for a group of several hundred masked “black bloc” demonstrators to disperse at the city’s Civic Center Park. Ignoring these orders, the group diverted around the police force, heading for the 16th Street Mall, Denver’s busiest pedestrian strip. That could have created havoc; instead, police were ready and had them cordoned off at 15th Street and Court Street. The surrounding buildings had already locked down as police had alerted them to the evolving security situation.</p><p>As the tension between demonstrators and police rose, 911 dispatchers began receiving calls of rioting and looting nearly 10 blocks away in lower downtown. Should the police break away and respond? “We had our troops committed. The department was committed to resolving this other situation,” says Lt. Rob Rock of the Denver Police Department, who recalls watching the situation unfold at 15th and Court via the city’s emergency operations center (EOC).</p><p>Instead of sending police officers to investigate the reports from lower downtown, Rock called out to the private sector, since nearly every building downtown has security and most security companies had additional forces for that week.</p><p>Joseph P. Gargan, CPP, CFE, vice president of safety and security for Advantage Security Inc., received Rock’s call and passed on the report to private security officers at buildings in lower downtown. “We checked them out and found that they were all false calls,” he says.</p><p>The calls were a diversion. “That’s a standard tactic,” Rock says. “They want to draw resources to something that isn’t an emergency so that they can continue to do whatever it is they were going to do. And it didn’t work because of our cooperative efforts with private security.”</p><p>Police moved in and arrested more than 100 demonstrators. It was the first and only mass arrest during the week of the DNC, and it was made possible by an unprecedented partnership between the city’s public and private sectors, one that scarcely existed just a year before.</p><p>Forming a Partnership<br>The Denver Public-Private Partnership (DP3) had its first formal meeting in August 2007, after the city was selected to host the next year’s DNC. This gave the police and the private sector 12 months to coordinate efforts and prepare for the upcoming federally designated National Security Event.</p><p>DP3 was first conceived two years earlier when Denver Police Chief Gerald Whitman and Gargan considered establishing the city’s own version of New York City’s Area Police Private Security Liaison program. But IT connectivity problems between the Denver city officials’ communications systems and the private sector’s systems initially stalled the effort.</p><p>In 2007, ignoring the communication problems bogging down the program, Gargan and Rock co-hosted DP3’s first meeting. The event was attended by 75 people, many of whom were meeting their public or private sector counterparts for the first time. Not only did the Denver Police Department’s Intelligence and Operations Planning Unit attend, but so did the FBI-led regional Joint Terrorism Task Force; the Colorado Information Analysis Center (CIAC), which is the state’s intelligence fusion center; and Team Rubicon, the Colorado State Patrol’s critical infrastructure unit.</p><p>Private sector attendees included both contract and proprietary security managers, ASIS members, and Building Owners and Managers Association (BOMA) International members. The group then began to meet every month—and grow. </p><p>As discussions progressed, DP3 realized it needed to focus on two elements before the DNC: better communications between the public and private sectors and more training.</p><p>Communications<br>How was DP3 to establish relevant and timely communications between the EOC and private security during the DNC? The initial plan relied on text and e-mail messaging. Lists were made and test alerts were sent. However, the plan faced some major hurdles. One was that membership and e-mail addresses changed frequently, making it difficult for the city’s police department to keep distribution lists current. Another problem was that these types of communication were only one-way. How was the private sector to communicate back? Finally, many participants’ spam filters discarded e-mails before they even reached their inboxes.</p><p>A new approach was needed so that sensitive information gathered by law enforcement could be vetted by a public-safety official and distributed in a timely manner to private-sector security, with the ability for recipients to communicate information back up the pipeline as well.</p><p>The solution came from another public-private effort, the Colorado Emergency Preparedness Partnership (CEPP), a statewide group established in Spring 2008, with assistance from Business Executives for National Security (BENS) and seeded with funding from local philanthropic organizations.</p><p>In terms of preparing the community for disaster, CEPP had recognized that there was a huge gap between what businesses would do and what the public-safety sector would do. “[W]ith the Democratic National Convention coming to Denver, we had an urgent mission ahead of us to fill that gap,” says Sue Mencer, comanaging director of the CEPP.</p><p>A first step toward closing that gap was taken in May 2008 when BOMA hosted a DNC tabletop exercise where 250 attendees discussed how they would handle a worst-case scenario. They went through what might happen if unruly crowds became violent and destructive. During an open forum afterward, the dominant question from the audience was: “How are we going to communicate with each other if something does go horribly wrong?”</p><p>In the audience, Robert Edson, Mission-Mode Solutions’ vice president for the western United States, grew frustrated with the lack of systemized communication between the public and private sectors. Audience members asked where they would receive real-time information during the convention. “The best advice anyone could give anyone in the room was to watch the news,” Edson says. “That was really an unacceptable answer to me.”</p><p>Edson’s Cottage Grove, Minnesota-based company provides customizable Web-based information sharing and crisis-management tools. MissionMode can set up its page-based forums—or situation rooms, as it calls them—almost instantly, and offer password-protected access to approved users. Information updates are posted by users with administrative access, and alerts are sent out by whatever medium the administrator or recipient chooses: SMS text messages, e-mail, fax, or automated voice call. Administrators can require receipt confirmation on messages, and perhaps most important, users can send text or data—such as photographs—back to administrators for posting to the entire group.</p><p>After the BOMA exercise, Edson met with Pam Pfeifer, then executive director of CEPP. MissionMode set up a portal through which CEPP could make information available to participants.</p><p>“We went out and began securing, through the CEPP, membership and involvement for communications,” Edson explains. He was surprised to see not just an interest from the private sector, but public entities were also subscribing to the system for key, up-to-date information. Officials from Douglas County Sheriff’s Department, Arapahoe County Sheriff’s Department, and Centennial Airport were quick to join. According to Edson, more than 90 different organizations joined, representing more than 200 individual members.</p><p>The result was the Business Emergency Operations Center (BEOC), a secure, virtual, invitation-based online forum where subscribers could receive instant alerts from the EOC as well as respond with valuable feedback to the EOC and to other participants.</p><p>The inner-core of the DNC’s information-sharing apparatus was a highly secure law-enforcement-only forum where local, state, and federal officials shared sensitive intelligence. When their intelligence had to get to the private business and security sector, a public-safety officer communicated this intelligence to the CEPP operator in the EOC. That information was then disseminated to the business/security forums within BEOC.</p><p>The CEPP then monitored feedback from business and private security regarding the intelligence sent down as well as regarding any new intelligence businesses might have gathered that could be given to law enforcement. All agencies operating within the EOC had access to the BEOC.</p><p>How effective was this BEOC during the convention? “The first notifications came in from our private sector,” Edson says. “Private security partners had come across a stash of what they believed to be cached protestor weapons.”</p><p>Rock recalls receiving information about the caches in alleys, often marked with distinctive graffiti close by. “Everywhere we would find stashes of rocks or bottles or urine and feces in bottles and bags. That’s when the information went out: ‘Start looking for these types of markings.’” Private security began photographing the markings and posting them on the BEOC so other organizations could become more familiar with what to look for.</p><p>Pam Sillars, also co-managing director of the CEPP confirms: “We sent out the notice to the business partners, and they were able to go around and identify where [the caches] were, and they took them away. So, when the demonstrators were ready to go pick up their little projects there, they were gone.”</p><p>During the melee Monday night, police used the BEOC to ask all the buildings downtown to go into lockdown mode. “We asked that all private security bring their people in and secure their buildings until we [could] get this situation resolved,” Rock says.</p><p>Edson was stationed in the EOC at the time. “We sent out an alert to all members of the BEOC: ‘We have a large group of protesters moving in your area. You need to lock down your buildings immediately as requested by the Denver Police Department.’”</p><p>The effect of the lockdown was immediate: the protesters had no buildings to duck into and hide from police. As the protesters realized they were being cordoned off, the phony 911 calls began in an attempt to divert police.</p><p>DP3 was able to overcome its public-private sector communication hurdles by latching on to what had already been designed for CEPP by MissionMode. The result was a resounding success during the DNC. The BEOC is still activated from time to time—during wildfires, in relation to the swine flu outbreak, and during major civic events like Taste of Denver. The program enjoys a large membership of business and security partners in the Denver metro area.</p><p>Training<br>During the year from DP3’s inception until the DNC, the Denver Police and the U.S. Department of Homeland Security (DHS) coordinated various training opportunities for private-sector security managers. One course was a five-hour awareness class called “Incident Response to Terrorist Bombing” that was taught by the Denver Police bomb squad with teaching materials provided by New Mexico Tech’s DHS First-Responder Training program. Offered in January 2008, the course was designed to demonstrate how explosives can be concealed, what components all explosives must have, and how to respond after discovering such devices.</p><p>Rock describes the focus of the class: “We want people to know what they’re looking at. If they see something that looks like an explosive device, [we want them to know] what to do about it. What information can they tell us so we can have a quicker response with the appropriate people?”</p><p>Course instructors passed around examples of dummy bombs stuffed in paper bags and briefcases to demonstrate how they could have been rigged. The course ended with a test and certifications from New Mexico Tech.</p><p>In early June 2008, the DHS Office for Bombing Prevention, under sponsorship from Armor Group International Training Inc. and CIAC, offered a 40-hour course called “Surveillance Detection Training for Critical Infrastructure Key Resource Operators and Security Staff.”</p><p>The weeklong class of about 30 local business security managers devoted the first four hours of the day to teaching attendees the fundamentals of facility rings of security, facility vulnerability analysis, determining hostile surveillance points, and determining surveillance detection points. The course also emphasized that each property is unique with regard to surveillance.</p><p>The afternoons were spent at a local shopping center, where students were first asked to walk the perimeter of the mall and conduct vulnerability assessments. Were “secure” doors really not secure? Was anyone questioned by mall security or concerned citizens noticing the unusual behavior?</p><p>Eventually, students were to determine hostile detection points. Where could one sit in a car and watch delivery activity? Which bench would be most beneficial for watching ingress/egress and counting unsuspecting shoppers? Then students also compiled surveillance detection points around the mall. How could someone watch another person who was watching others?</p><p>During the final day of the course, students spent five hours at the mall searching for hostile surveillance personnel DHS had planted. Students did not know how many suspicious individuals there were or what they looked like.</p><p>Was the young man sitting with his back to the fountain really working on the crossword puzzle in the paper, or was he surveying loading dock check-in procedures on the south end of the complex? Students were asked to detect and report all suspicious activity to an off-site command center, helmed by other students.</p><p>In the end, during debriefing, students determined there were 12 hostile surveillance individuals. In actuality, there were only three from DHS. However, those three were included in the 12, so the drill was determined to be a success. Some students jokingly wondered if a call should be placed to the mall security about the other nine exhibiting strange behavior and not part of the exercise.</p><p>“This type of information was ideal because we had already been receiving reports of suspicious things that were occurring: people taking pictures of buildings and of things that most tourists wouldn’t take pictures of,” Rock says.</p><p>Upon completion of the course, security managers who had attended were encouraged to teach the surveillance detection fundamentals to their security staffs.</p><p>Conclusion and Challenges<br>Rock has suggestions for municipalities that want to establish a partnership like DP3. The first step is to proactively reach out and invite all the relevant players to meetings. The police department should also provide relevant training and good information that people are interested in receiving, he says. And he emphasizes the importance of a system of exchanging key information in a timely manner.</p><p>Gargan says the transfer of information between the two sectors was a great challenge for the partnership. He says there’s a balance between keeping law-enforcement-sensitive information classified and keeping the public informed. “Breaking down that barrier was pretty tough. Just breaking down ‘old school’ law-enforcement ideas was pretty tough,” he says.</p><p>Still, the goals are achievable, as DP3 proved. Within a relatively short time, Denver’s public-private partnership was able to overcome a major communication hurdle between the public and private sectors through the arrangement established by the CEPP and MissionMode. The partnership also reached out to DHS to provide relevant training to private-sector security officers, with no cost to the participants.</p><p>That’s not to say that there aren’t ongoing challenges for DP3. Attendance at the monthly meetings dropped significantly after the DNC and is back to 2007 levels. Any public entity wanting to create a similar program needs to be patient during slow times. “The most challenging aspect is just getting people involved when there’s not a major situation that’s going down,” says Rock. People just “want these systems to run in the background” until they’re needed, he notes.</p><p>When the Colorado Rockies found themselves in the 2007 World Series and Denver learned that it would host as many as four of the games, a DP3 meeting was held on only two hours’ notice. There was a strong turnout of about 70 people, showing that businesses appreciated the partnership when they saw the need. </p><p>Gargan explains: “We were briefed by Denver Police as to what can happen, being it was the World Series, and of the possibilities of what happens in many cities around the country now when a team wins…people get a little wild…and what we had to be prepared for in the buildings.”</p><p>Rock was pleased with how the DNC event turned out, as were most in the private sector. The only property damage sustained was a bit of graffiti. It wasn’t the smashed windows, upturned cars, or major tear gas deployment that some had feared. It wasn’t anywhere near “what could have been” during the BOMA’s worst-case scenario drill. Some of the credit for that outcome goes to the DP3. </p><p>Edson leans back in his chair, looking out the conference room window over north Denver and sums up the point of a public-private partnership program: “You don’t want the head of an organization, a large employer in the area, sitting down across the table with the emergency manager for their city for the first time and handing business cards to one another after there’s a smoking crater in the ground…. They need to be part of the process all the way through.”</p><p>Brian M. Van Hise was security manager of Denver’s Seventeenth Street Plaza for Advantage Security, Inc., during the DNC.<br></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Interoperability-for-the-Safe-City-.aspxInteroperability for the Safe City <p>​​Today's cities often use video management systems or other platforms to view camera footage, protect citizens and property, analyze incidents, evaluate security, and determine appropriate responses to events like natural disasters, disruptions to public transit and other municipal services, and other threats to public safety. <br><br>Cities implementing this connected security approach are typically referred to as safe or smart cities. Most safe cities share a common infrastructure and operate using sensors and cameras over a shared municipal network. Synthesizing information from these sensors and the data from other devices through one interface, government officials and law enforcement are afforded a comprehensive view of a city's security.<strong> </strong></p><p><strong>Integrating the Many Parts of a Safe City</strong></p><p>There are operational challenges that accompany the many systems that are included in a safe city deployment. Interoperability continues to present one of the greatest challenges, particularly with video management systems, video recording devices, and cameras. The most common scenario is that municipalities have several management systems for city operations that were created by different manufacturers, each with proprietary interfaces for integration.<br><br>To connect their different systems together, cities often end up employing a single-vendor "build once and maintain forever" approach, in which the continuing cost for integration of systems becomes prohibitively expensive. In a world where technology and features change quickly, this approach is not practical because it severely limits an end user's ability to try new technology and different vendors' products and requires a substantial financial commitment to specific manufacturers and proprietary interfaces.<br></p><p><strong>Standards in Safe Cities </strong></p><p>ONVIF was founded in 2008 by Axis, Sony, and Bosch to create a global standard for the interface of IP-based physical security products. The organization was developed to provide increased flexibility and greater freedom of choice, so installers and end users can select interoperable products from a variety of different vendors. </p><p>Product interoperability is a driving force behind ONVIF. Interoperability is a simple concept: it is the ability of a product or system to work with another product or system, often from different brands made by different manufacturers. </p><p>ONVIF profiles are subsets of the overall ONVIF specification. They group together sets of related features to make product selection easier for end users, consultants, and systems integrators. Products must be conformant with one (or more) of ONVIF's specific profiles. </p><p><strong><em>ONVIF's current profiles are:</em></strong></p><p><strong></strong></p><p><strong>Profile S</strong> for IP-based video and audio streaming, including:​<br></p><ul><li>Video and audio streaming<br></li><li>Pan-tilt-zoom control and relay output<br></li><li>Video configuration and multicast<br> </li></ul><p><strong>Profile G</strong> for edge storage and retrieval, including:</p><ul><li>Configure, request, and control recording from conformant devices<br></li><li>Receive audio and metadata stream<br></li></ul><p><strong><br>Profile C</strong> for IP-based access control, including:</p><ul><li>Site information and configuration<br></li><li>Event and alarm management<br></li><li>Door access control<br></li></ul><p><strong><br>Profile Q</strong> for easy configuration and advanced security, including:</p><ul><li>Out-of-box functionality<br></li><li>Easy, secure configuration<br></li><li>Secure client/device communications using transport layer security (TLS)<br></li></ul><p><strong><br>Profile A</strong> for Broader Access Control Configuration</p><ul><li>Granting/revoking credentials, creating schedules, changing privileges<br></li><li>Enables integration between access control and IP video management system<br> <br></li></ul><p><strong>Profile T</strong> for Advanced Video Streaming is currently in draft form and is scheduled for initial release in 2018. </p><p>Standards, such as those from ONVIF, provide the common link between disparate components of safe city systems. Designed specifically to overcome the challenges in multi-vendor environments, ONVIF's common interfaces facilitate communication between technologies from different manufacturers and foster an interoperable system environment where system components can be used interchangeably, provided they conform to the ONVIF specification. </p><p>In 2014, ONVIF member company Meyertech helped the city of York, United Kingdom, deploy a safe city solution for the city's public spaces and transportation system. Using Meyertech video management software (VMS) and information management software, the city integrated IP cameras with the many legacy systems for its York Travel and Control Centre command center. </p><p>The city's control room monitors more than 150 cameras from different manufacturers in York, and city representatives reported an immediate impact on crime rates. The integration of legacy and new IP cameras with the new VMS, which interfaced with the information management software, was made possible through ONVIF's video specification. </p><p>A standardized approach for both file format and associated players, which is often a challenge in multi-vendor environments, is also provided by ONVIF, increasing the efficiency of the process and also adding the potential of including metadata—for example, data from an analytic, indicating number of objects, speed of objects, or even colors—in exported materials and reports. Standardized file formats include MPEG4, H.264, and, with Profile T, H.265, which are readable by many standard video players on the market, including Windows Media Player, VLC, DVD players, and many more. </p><p>ONVIF has also released an export file format specification that outlines a defined format for effective export of recorded material and forensics. These specifications together make it possible not only to integrate devices in multi-vendor video security system deployments in safe city environments, but also to offer a common export file format that can streamline post-event investigations where authorities are trying to react as quickly as possible to apprehend suspects or to defuse an ongoing situation.<strong> </strong></p><p>Another ONVIF member, Huawei, is considered a leader in smart city solutions. Huawei's video management system was used in Shanghai, China, as part of the Chinese Ministry of Public Security's safe cities construction initiative. One of the key challenges of the project was to integrate old and new technology. Huawei's VMS uses ONVIF to integrate cameras from manufacturers Dahua, Haikang, Axis, Sony, and others.<strong> </strong></p><p><strong>Multi-Discipline Standards</strong></p><p>A multi-discipline physical security standard that specifies parameters for video surveillance, access control, and other essential operations of a safe city command center would likely increase the prevalence of safe cities even further.</p><p>Many in the broader technology industry see standards as an important component in both safe cities and the Internet of things (IoT). The Institute of Electrical and Electronics Engineers and other standards groups are already working on IoT standards for technology-based industries, and some experts that global IoT standards will be introduced by the end of this year. </p><p>As standards and industries collaborate even further and establish minimum interoperability standards together, the need for a multi-discipline physical security standard will become more urgent. ONVIF envisions that all physical security systems will eventually have the same interfaces for interoperability, and the organization is dedicated to facilitating the work of its members in developing such a multi-discipline standard. </p><p><em>Jonathan Lewit is chairman of the ONVIF Communication Committee.</em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465