Government

 

 

https://sm.asisonline.org/Pages/July-2017-Industry-News.aspxJuly 2017 Industry NewsGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a43444652017-07-01T04:00:00Zhttps://adminsm.asisonline.org/pages/flora-szatkowski.aspx, Flora Szatkowski<h4>​Video Update for the Council</h4><p>The Council of Europe is an international organization that was created to promote democracy and protect human rights and the rule of law in Europe. Located in Strasbourg, France, the organization focuses on issues such as child protection, online hate speech, minority rights, corruption, and judicial reform.</p><p>The headquarters campus has five distinctive buildings, including the Agora (pictured here). The video surveillance systems throughout the campus needed updating, and security managers called on Securitas and ENGIE Ineo to design and implement a new system. ENGIE Ineo partnered with Milestone Systems for video management software and Axis for network cameras. The team replaced the analog system with a full network video surveillance solution that delivers better performance, ease of access to video assets, and flexibility in tailoring how different locations are secured. The work was done with a minimum of disruption and completed early in 2017.​</p><h4>PARTNERSHIPS AND DEALS</h4><p>Hyatt Guns of Charlotte, North Carolina, deployed 3xLOGIC thermal cameras to increase security for the store. Sonitrol Carolinas installed the cameras and now oversees the video monitoring.</p><p>AMAG Technology and CodeLynx integrated AMAG’s Symmetry Access Control software and CodeLynx’s ARIES Mixed Reality platform.</p><p>Amika Mobile announced that the Amika Mobility Server platform for critical communications is now integrated with the Guardian Indoor Active Shooter Detection System from Shooter Detection Systems.</p><p>Point Blank Enterprises will distribute ARMORVENT systems to the U.S. commercial and law enforcement markets.</p><p>ASSA ABLOY announced the integration of its Aperio wireless lock technology with ProdataKey’s pdk io cloud managed access control solution. </p><p>V5 Systems is partnering with Axis Communications to create a self-powered solution to protect people outdoors.</p><p>Bosch Security Systems and Sony Corporation are partnering in sales, marketing, and technical collaboration for video security solutions.</p><p>Brivo and Mercury Security integrated the Authentic Mercury open platform into Brivo’s flagship OnAir access control system.</p><p>CBC AMERICAS Corp. announced a strategic business alliance with CrucialTrak to introduce CrucialTrak’s range of products to Japan, Australia, North America, and Latin America.</p><p>Centerra Group, LLC, was selected as the protective services contractor at URENCO USA’s site in New Mexico. </p><p>Checkpoint Systems is implementing electronic article surveillance systems at approximately 2,800 Dollar General retail locations. </p><p>Delta Scientific provided temporary vehicle barriers to restrict vehicle access to Bourbon Street in New Orleans during Mardi Gras.</p><p>Flexera Software is working with the Financial Services Information Sharing and Analysis Center to offer verified software vulnerability intelligence alerts to critical sector entities worldwide.</p><p>Genetec integrated gunshot detection technology from ShotSpotter in its Security Center.</p><p>Huawei is collaborating with Honeywell to create smart building offerings and make them sustainable, secure, and energy efficient.</p><p>HySecurity commercial, industrial, and antiterrorist automated gate systems are now available to PSA Security Network integrators.</p><p>Ergos Group and IndigoVision worked together to improve surveillance at the stadium of the Santos </p><p>Futebol Clube in Santos, Brazil.</p><p>Netsurion was named a Fortinet MSSP Platinum Partner.</p><p>Free2Move, a mobility app for car-sharing providers, including companies such as Car2Go, Flinkster, Multicity, Zipcar, and DriveNow, selected Jumio Netverify Trusted Identity as a service to verify customers’ driver’s licenses.</p><p>Kentec gas extinguishing fire safety panels are helping protect Specsavers’ new West Midland manufacturing and distribution center. The new fire safety system was designed and installed by Leader Systems LLP. </p><p>Lenel and Everbridge, Inc., announced an alliance to interface their leading solutions for comprehensive security management and critical communications.</p><p>March Networks announced a strategic partnership with Oncam for its banking, retail, and transportation solutions.</p><p>Mount Airey Group, Inc., is partnering with Acuant to launch a comprehensive authentication solution for border control and to minimize the acceptance of fraudulent passports.</p><p>Henry County Hospital in Ohio is using the Netwrix Auditor from Netwrix Corporation.</p><p>A collaboration between nuPSYS and Bosch Video Management System integrates the nuPSYS 3D-mapping solution to allow assets, sensors, alarms, and critical points to be plotted onto a 3D mapping surface.</p><p>Park Assist was awarded the Parking Guidance System contract for the University of Texas at Dallas in its new garage.</p><p>Deutsche Telekom entered a strategic partnership with Radiflow to collaborate in securing industrial networks. </p><p>Raytec LED lighting improved security at a multisite installation for the National Bank of Romania. </p><p>SALTO Systems hired Warren Associates to sell SALTO’s security products in northern California, northern Nevada, Utah, Colorado, Montana, New Mexico, Wyoming, and Idaho. Bassett Sales Corporation will represent SALTO in the Southwest United States and Hawaii.</p><p>Semafone is partnering with Australian compliance specialist SecureCo to protect customer payment data.</p><p>Sharp Robotics Business Development appointed U.S. Security Associates as an authorized guard services reseller of the Sharp INTELLOS Automated Unmanned Ground Vehicle.</p><p>Suprema announced that its SFU-S20 fingerprint modules are integrated in BioWolf LE rugged tablet PCs from BioRugged.</p><p>London development New Ludgate chose Tyco Security Products C·CURE 9000 Security and Event Management system to unite building management, access control, and video surveillance systems.</p><p>Vanderbilt integrated its award-winning Lite Blue and Bright Blue access control solutions with Allegion’s Schlage NDE series wireless locks with Engage technology.</p><p>An official partnership agreement was signed by SMR Links Consultants and VSTEP, making SMR Links the exclusive partner of the NAUTIS maritime simulators and RescueSim Incident Command Simulator in the United Arab Emirates region.​</p><h4>GOVERNMENT CONTRACTS</h4><p>American Public University was selected by the U.S. Transportation Security Administration Institute of Higher Education to provide academic programs to up to 20,000 TSA employees at 147 airports nationwide.</p><p>Fredericton Police Force in Canada is testing Axon body cameras.</p><p>The U.S. Department of Commerce and First Responder Network Authority selected AT&T to build the first nationwide wireless broadband network dedicated to America’s first responders. </p><p>BioTrackTHC partnered with the Hawaii Department of Health to deploy a live seed-to-sale cannabis traceability system in a FedRAMP authorized environment. </p><p>Bittium received a purchase order from the Finnish Defence Forces for Bittium Tactical Wireless IP Network system products.</p><p>Edesix is the body-worn camera provider of choice for Her Majesty’s Prison Service throughout the United Kingdom.</p><p>Central Lake Armor Express, Inc., was awarded a new contract with the San Francisco Police Department and San Francisco Sheriff’s Department to provide its Vortex ballistic vest.</p><p>Police in the Canton of Graubünden, Switzerland, where the World Economic Forum was held, employed a drone defense system from Dedrone to monitor critical airspace above the area.</p><p>Boise Airport updated its security infrastructure with Genetec Security Center to manage cameras, access control points, and video analytics software.</p><p>The City of Deagu, South Korea, is using Hikvision cameras in an integrated atmospheric information system.</p><p>J & S Franklin Ltd. delivered DefenCell MAC geotextile lined metal gabions to the Tunisian authorities for deployment on the Tunisian-Libyan border.</p><p>Milestone Systems open platform IP video management software was installed at JFK International Airport. </p><p>Mutualink and Rave Mobile Safety announced a technology deployment in Warwick, Rhode Island, public schools as an effort to help save lives through enhanced collaboration with the local police, fire departments, and hospitals. </p><p>Colquitt County Jail in Georgia worked with local systems integrator Ace Technologies to deploy a new video system from Pelco by Schneider Electric. </p><p>Safran Identity and Security supplied a facial recognition solution to the National Police of The Netherlands.</p><p>SRC was awarded a U.S. Army contract to deliver, integrate, and sustain 15 counter-UAS systems. </p><p>SuperCom announced that its M2M division was selected by the Czech Republic Ministry of Justice to deploy its PureSecurity Electronic Monitoring Suite.</p><p>Total Recall Corporation will work with the City of Chattanooga and the Chattanooga Police Department to provide a citywide safety solution that includes CrimeEye-RD-2 rapid deployment portable video systems.</p><p>Vialseg combined forces with Vivotek’s local distributor Selnet and LPR software partner Neural Labs to provide red light enforcement systems for Argentinian cities.</p><p>Zenitel is providing IP-based security systems for Oslo Schools.​</p><h4>AWARDS AND CERTIFICATIONS</h4><p>ByteGrid achieved the SOC2+ HITRUST designation, to go along with its EHNAC accreditation.</p><p>The office of the Ohio Secretary of State certified that Verity voting from Hart InterCivic meets all state requirements to ensure fair and accurate elections.</p><p>IBM announced that its scientists have been granted a patent around a machine learning system that can dynamically shift control of an autonomous vehicle between a human driver and a vehicle control processor in the event of a potential emergency.</p><p>Intelligent Protection International Limited was granted Conseil National des Activités Privées de Sécurité status and is licensed for Close Protection activities in France. </p><p>Frost & Sullivan recognized Karamba Security with the 2017 North American New Product Innovation Award for the Automotive Industry.</p><p>Milestone Systems was named one of the 100 Best Companies to Work for in Oregon by Oregon Business Magazine.</p><p>PinPoint Initiative from PinPoint won a Platinum Govie award from Security Today in the category of User Authentication/Identification/Credentialing and Management.</p><p>Secure I.T. Environments Ltd. achieved new quality management standards for design, construction, and management of data centers. The new accreditations are SOHSAS 18001:2007 (ISO 45001), ISO 14001:2015, and BN ES ISO 9001:2015.</p><p>Sielox LLC recognized MCM Integrated Systems of Van Nuys, California, as its National Business Partner of the Year.</p><p>Snap Surveillance achieved the status of Milestone Certified Solution with its integration to XProtect Corporate IP video management software. </p><p>Sword & Shield Enterprise Security was named to the Cybersecurity 500, a global compilation of leading cybersecurity solutions and service companies.</p><p>Tosibox won the Industrial and Security Category Awards at the IOT/M2M Innovation World Cup.</p><p>Tyco Security Products announced that its Innometriks Cheetah high assurance physical access reader achieved UL 294 certification, and the complete Innometriks Infinitas FICAM solution is now listed on the U.S. General Services Administration Approved Product List.</p><p>Vinson Guard Service, Inc., and company president Christine Vinson were honored with the James J. Coleman, Sr., Corporate Partner Award at the Annual Crimestoppers of Greater New Orleans Awards Luncheon. </p><p>Virtual StrongBox, Inc., was named a finalist for a Blue Diamond Award, which recognizes the best technology in the greater Charlotte area.​</p><h4>ANNOUNCEMENTS</h4><p>ASSA ABLOY completed an additional seven Environmental Product Declarations, third-party reports that document the ways in which a product affects the environment.</p><p>Blancco Technology Group opened a new office in Beijing, China. </p><p>The Community Security Service is launching a new app, the Jewish Security Application, allowing individuals to report suspicious activity and document anti-Semitic incidents quickly and accurately from their smartphones.</p><p>Constellis entered into a definitive agreement to acquire Centerra Group, LLC, and its subsidiaries.</p><p>DNA Labs International relocated to a larger laboratory near its current facility in Deerfield Beach, Florida.</p><p>A new shipping facility for eDist Security in Dallas offers more space.</p><p>Intelligent Protection International Limited opened an office in Paris on the Champs-Elysées.</p><p>MorphoTrak will donate access to MorphoCloud to West Virginia University. The donation will support research and education in biometrics and forensics.</p><p>The National Association of Police Equipment Distributors is welcoming online distributors and retailers within the law enforcement, public safety, and military markets to its general membership.</p><p>NEC Corporation and Infosec Corporation established Infosec America, Inc., as a security operations center in Santa Clara, California.</p><p>Pelco by Schneider Electric launched a new informational website for the security industry: securityinsights.pelco.com.</p><p>Red Hawk Fire & Security acquired  two companies: Alarm Tech Solutions of the Washington, D.C., metropolitan area and Integrated Systems of Florida.</p><p>RiskIQ revealed that its intelligence and external threat investigation system was used by the Citizen Lab in the discovery of commercial spyware that targeted the mobile phone data of United Arab Emirates human rights activists.</p><p>The Security Industry Association established the SIA International Relations Committee to engage with international trade officials, to facilitate education for SIA members on topics related to trade/export programs, and to collaborate with global security trade associations.</p><p>SecurityScorecard launched the Risk Ratings Alliance Program aimed at developing strategic partnerships to help the world’s companies become more secure through collaboration and trust. </p><p>Security Innovation’s security division, OnBoard Security, is placing all of its NTRUEncrypt patents in the public domain, so that they may be freely used under the Creative Commons CC0 1.0 Universal License.</p><p>The Smart Card Alliance is changing its name to the Secure Technology Alliance.</p><p>Tyco Security Products launched a new partner portal to enhance the third-party integration process with its brands.</p><p>Unisys Corporation plans to launch the Unisys Artificial Intelligence Center of Excellence, allowing users to gain free access to online tools to help them develop capabilities in advanced data analytics.</p><p>ViSTA Networking Solutions announced that its network video recorder configuration tool is now available for download. ​</p>

Government

 

 

https://sm.asisonline.org/Pages/July-2017-Industry-News.aspx2017-07-01T04:00:00ZJuly 2017 Industry News
https://sm.asisonline.org/Pages/The-Next-Tase-Phase.aspx2016-10-01T04:00:00ZThe Next Tase Phase
https://sm.asisonline.org/Pages/A-Vote-for-Biometrics.aspx2016-05-01T04:00:00ZA Vote for Biometrics
https://sm.asisonline.org/Pages/In-the-Public-Interest.aspx2016-05-01T04:00:00ZIn the Public Interest
https://sm.asisonline.org/Pages/A-Head-Start-on-Insider-Threats.aspx2016-05-01T04:00:00ZA Head Start on Insider Threats
https://sm.asisonline.org/Pages/The-Lessons-of-Flint.aspx2016-05-01T04:00:00ZThe Lessons of Flint
https://sm.asisonline.org/Pages/Industry-News-October-2015.aspx2015-10-19T04:00:00ZIndustry News October 2015
https://sm.asisonline.org/Pages/Andreas-Poppius.aspx2015-10-14T04:00:00ZFrom Military Heroes to Security Assets
https://sm.asisonline.org/Pages/Washington-Navy-Yard-On-Lockdown-After-Reports-of-Shooter.aspx2015-07-02T04:00:00ZWashington Navy Yard On Lockdown After Reports of Shooter
https://sm.asisonline.org/Pages/China-Tries-to-Cage-Corruption.aspx2015-04-01T04:00:00ZChina Tries to Cage Corruption
https://sm.asisonline.org/Pages/lax-lab-safety.aspx2014-11-01T04:00:00ZLax Lab Safety
https://sm.asisonline.org/Pages/a-new-point-view-0013505.aspx2014-07-01T04:00:00ZA New Point of View
https://sm.asisonline.org/Pages/crime-lab-manual-0013520.aspx2014-07-01T04:00:00ZCrime Lab Manual
https://sm.asisonline.org/Pages/united-states-charges-china-first-criminal-cyber-espionage-case-0013423.aspx2014-05-19T04:00:00ZUnited States Charges China in First Criminal Cyber Espionage Case
https://sm.asisonline.org/Pages/infrastructure-protection-0013189.aspx2014-03-01T05:00:00ZUpdated National Infrastructure Protection Plan Released
https://sm.asisonline.org/Pages/security-clearances-0013186.aspx2014-03-01T05:00:00ZWhen Are Security Clearances Necessary?
https://sm.asisonline.org/Pages/who-really-needs-a-security-clearance-0013192.aspx2014-02-26T05:00:00ZWho Really Needs A Security Clearance?
https://sm.asisonline.org/Pages/canine-evidence-0013125.aspx2014-02-01T05:00:00ZCanine Evidence
https://sm.asisonline.org/Pages/data-breaches-0013123.aspx2014-02-01T05:00:00ZReport: Federal Responses to Data Breaches
https://sm.asisonline.org/national-security/border-security2014-01-31T05:00:00ZBorder security.

 You May Also Like...

 

 

https://sm.asisonline.org/Pages/Drafting-a-Blueprint-for-Security.aspxDrafting a Blueprint for Security<p>​<span style="line-height:1.5em;">Immediately upon concluding the construction of a secure-asset facility 10 years ago, project management hit a major setback: the security manager. Instead of working with the design team and project manager in the initial phases of the project, the security manager waited until the new facility was already erected to determine where security cameras needed to be placed.</span></p><p>“All of a sudden, we’re moving cameras and changing openings and sleeves in the wall for wiring because [the security manager] had difficulty reading blueprints,” says Rick Lavelle, PSP, principal architect and owner of Creador Architecture, of the experience. Instead of admitting that he had this difficulty, the security manager waited until he could see the facility three-dimensionally, causing delays and increasing project costs.</p><p>“Then he’d step in and really do his job that would have been helpful to have earlier in the process,” Lavelle explains.</p><p>To help prevent security professionals from becoming similar setbacks in construction projects, Security Management sat down with Lavelle; Mark Schreiber, CPP, principal consultant for Safeguards Consulting and chair of the ASIS International Security Architecture and Engineering Council; Rene Rieder, Jr., CPP, PSP, associate principal at Ove Arup & Partners; and J. Kelly Stewart, managing director and CEO of Newcastle Consulting, for their tips on navigating the document and project management process.​</p><h4>1. Know Your Team</h4><p>Like almost any project that involves numerous people, it’s crucial to understand that a construction project is a team effort that requires team members to understand the process and communicate with each other.</p><p>“We emphasize...know who your team is, align with your team, and communicate with your team as much as possible because that will support a central project,” Schreiber explains. </p><p>And this team can be quite large, including top executives at the company, the project manager, the facility operations manager, the facility engineer, the security manager, security consultants, architects and designers, engineers, and general consultants—just to name a few. The council encourages team members to construct a simple diagram to help keep track of everyone.</p><p>While it may take a while, identifying the team and communicating with them helps ensure that security is included in construction project discussions from the very beginning—something that doesn’t always happen automatically. </p><p>“I was fairly surprised to learn early on in one of [the first classes I taught] that most of the project is completed—and sometimes is built—when the security manager gets a roll of drawings and they say, ‘Give us a security plan,’” Lavelle says.  </p><p>To change this, he explains that security needs to “know the relationships within their own companies that they need to develop so that doesn’t happen to them, [and that they make sure] they’re brought in earlier in the process. That leads to a much more successful implementation of anybody’s security plan.”</p><p>Lavelle also recommends that security leads work with the IT department during the project. “Getting IT, security, and the facilities people together on one team and having them all have the same direction, you’ll probably have the most effective security program that’s possible,” he explains.​</p><h4>2. Know Your Goals</h4><p>A construction project is rarely initiated just to meet a security need. It’s typically instigated to meet some other operational need, such as to increase manufacturing capacity. So the security department must ensure that its goals for the project—whether it’s introducing a new CCTV system or implementing its existing access control system—align with the overarching goals for the new facility.</p><p>“Just because they now have been given the green light to do an improvement for their facility doesn’t mean that they can go in and put every possible technology, every possible countermeasure that they’ve been dreaming about for years in,” Schreiber says. “They have to work within the goals of that project.”</p><p>This means that once the goals for the facility are outlined, the security department needs to specify its own project goals, providing a way to measure those goals, ensuring that goals are attainable and relevant to the overall project, identifying the starting functional requirements, and making sure they meet time and budgetary constraints. In the case of a new manufacturing plant, for example, CCTV might be attractive to other departments as well, such as quality management or logistics, creating a stronger case for the technology and getting these departments to share the expense.</p><p>By going through this process, security professionals can make sure that their goals are aligned with the overall project goals, enabling them to have success, Schreiber adds. “Whereas the more they stray away, they’re going to essentially be spinning their wheels, wasting effort, and possibly jeopardizing credibility.”​</p><h4>3. Know Your Documents</h4><p>For most security professionals, being part of a construction project is not routine. Nor is the process of reading project manuals, floor plans, elevations, and other drawing plans. But understanding what these documents are and how they come together to represent a construction project is key to the success of the project “because if the documents are correct, then you have a sound project for development,” Stewart says.</p><p>That’s because the documents work together as a guide detailing the design of the project, the technology that will be installed, and where exactly those installations will take place in the final construction. </p><p>And while discussing changes or where technology should be installed in the final project, security directors can communicate with design professionals and architects—regardless of their drawing skills, Lavelle adds. A quick visual representation of the camera and access control location can be helpful. </p><p>While these discussions are taking place, it’s important to document changes throughout the process and review them with the project team after each step is completed. “It’s arduous, but it’s a necessary evil because if you skip a step, you’ll forget something or something will fall through the cracks,” Stewart explains.</p><p>After the construction project is completed, it’s important to continue to keep track of its documentation and make sure it’s up to date so it reflects the current facility. In one case, Stewart took over as a director of security for a company that hadn’t documented the many changes to its system over the years. </p><p>“I actually had to bring in a security consultant and architect to figure out where all the stuff was,” he says. “There were drawings that were going back 20 years, which had nothing to do with the current system.”​</p><h4>4. Know Your Chain of Command</h4><p>In an ideal world, once the initial security goals for the project are outlined and plans are designed to implement them, nothing would change. “But truthfully, it never works that way,” Lavelle says. And when changes or problems occur, it’s critical to know who in the project team you need to talk to about implementing a solution. </p><p>As the project goes further along, you spend less time with the design team and more time with the general contractor, Lavelle explains. This means that security directors need to understand the roles and responsibilities of those involved in the project, and who they need to speak to about changes throughout the process.</p><p>For instance, some construction projects can take more than 18 months to complete, and during that time technology may change or new company policies may be implemented. The security needs for the project may shift, but it might not be appropriate to seek executive approval for the change.</p><p>“Going back to the CEO or the CFO who approved the project costs in the beginning may not be appropriate if you’re halfway through construction,” Lavelle says. Instead, security directors will likely need to go to the facility or project manager, or even their direct supervisor, to have the changes approved.</p><p>Most security professionals have never been involved in a construction project. For them, this is a “once in their career” experience, Rieder says. Following the steps outlined above can help smooth the way. However, if a project seems overwhelming security professionals need to reach out to peers or experts for help and advice.</p><p><em>​The Security Architecture and Engineering Council is sponsoring an educational session on the <a href="https://www.asisonline.org/Education-Events/Education-Programs/Classroom/Pages/Security-Document-and-Project-Management-Process.aspx" target="_blank">security document and project management process​</a> in October.</em><br></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Book-Review---Insider-Threat.aspxBook Review: Insider Threat<p><em>Insider Threat: Prevention, Detection, Mitigation, and Deterrence. </em>​ Butterworth-Heinemann; Elsevier.com; 252 pages; $49.95.​<br></p><p>​Organizations face an increasing number of risks in today's uncertain and complex world. Security has become even more challenging with the digital transformation of the business environment. These challenges are not limited to external threats, so it is equally important to manage and mitigate threats within the organization.</p><p><em>Insider Threat: Prevention, Detection, Mitigation, and Deterrence </em>aims to provide a people-centric and technology-enabled approach for creating a program to identify and mitigate the risk of insider threats. Author Michael G. Gelles sets the stage with a clear conceptualization of the insider threat, the motivations underlying the behavior, the challenges for maturing a program, and the changing nature of the phenomenon over time. </p><p>Each of the 15 chapters, with contributions by various specialists, provides insights and strategies on key segments for building a holistic and risk-based program. Topical contributions relate to data analytics, information security, cyber and supply chain risks, just to name a few. The reader will find information on risk tolerance as well as the use of potential risk indicators. In addition, attention is given to governance, ownership, and stakeholder management.</p><p>Overall, the book is well structured and well written. The visuals throughout the book and key takeaways at the end of each chapter are practical and insightful. The manuscript taps into developments in regulatory requirements, offers advice for developing resilience against insider threats; and builds upon the wide experience, practices, and solutions of multiple well-qualified contributors.</p><p><em>Insider Threat</em> is of great value to the professional who manages or aspires to manage the prevention, detection, response, and deterrence of insider threats.</p><p><em><strong>Reviewer: Rachid Kerkab</strong> has almost two decades of experience in criminology, security, risk, and resilience. He is a member of ASIS.</em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Surveillance-on-the-Fly.aspxSurveillance on the Fly<p>​Long before Jack Hanagriff was tasked with creating a temporary camera deployment for Super Bowl LIVE, he called on Keith Drummond, senior director of sales for IDIS America, for help supplementing the city’s camera infrastructure. Drummond traveled to Houston for the NCAA Men’s Final Four tournament in April 2016 to better understand the city’s needs, and found that Houston was dealing with a common problem: it needed temporary coverage of the event area but didn’t have time to deploy a whole surveillance system.</p><p>“They have an existing video surveillance system with hundreds of cameras, but when they have these special events they don’t always have cameras where they need them,” Drummond explains. “And IP-based video surveillance is just inherently very difficult to employ and very time consuming.”</p><p>Although the Final Four was at a known location, Drummond said last-minute changes could leave officers scrambling: bad weather could force an outdoor event to relocate, or companies or celebrities might decide to throw their own side events at the last minute. “These celebrities will decide they want 10,000 people in an outdoor gathering for their party, and the city finds out last minute and now needs cameras where they don’t have them,” Drummond explains. </p><p>After visiting Houston and talking with Hanagriff about the city’s needs, IDIS and integrator Edge360 created a rapidly redeployable solution to be used during Houston’s 2016 Freedom Over Texas Fourth of July event. The solution they created could be deployed in under four hours by untrained personnel—setup only requires a place to hang the camera and a power source, Drummond notes. </p><p>John Rezzonico, CEO of Edge360, says that his military background taught him the importance of being able to adapt in the field, and he applied that logic to surveillance systems. “We came up with a solution that allows police officers to deploy cameras wherever they want, and if something changes they can quickly grab them, power them down, move them, stand them back up, and they come back up online,” Rezzonico explains. “The goal of the project is freedom of movement of the camera sensors, so that way they augment and support existing infrastructure of security that’s already in place.”</p><p>Rezzonico noted that the biggest challenge was overcoming bandwidth saturation to send the video feeds to command centers or mobile devices. “If everyone is using their cell phones at the same time, bandwidth goes away and everyone relying on it for public safety loses the video feed,” he explains. “Houston wanted a wireless solution that could augment their fixed security that was mobile and easy to deploy but could also utilize whatever bandwidth was available. Our solution didn’t just include cellular, it included WiFi and point-to-point transmission. It was all built in.”</p><p>The Freedom Over Texas event took place at Discovery Green, a 12-acre park, and 50,000 people were expected to attend. The park already had some broad camera coverage, but Drummond explains that there were a few areas where more specific views were needed. Four pan-tilt-zoom cameras were installed to focus on high-volume areas such as the stage. IDIS had to address the unique environment, taking the event itself into account. Because the fireworks show was going to be the centerpiece of the event—making the camera image go from nighttime to broad daylight with each explosion—cameras that could handle the fluctuation were required. </p><p>Video feeds were sent to the city’s main command center where they could be viewed side-by-side with the city’s existing camera feeds, but unlike the existing cameras the redeployable cameras could be viewed on mobile devices at satellite command centers and in the field. Since the main goal of the solution was to create a rapidly redeployable surveillance system, Drummond says IDIS and Edge360 tried to be as hands-off as possible during the deployment.</p><p>“We set ourselves up for failure—the concept is that they need to be deployed quickly by untrained personnel, in some cases the utility guy who had never seen them,” Drummond says. “We were obviously available if needed, but we didn’t give them any training and let them do things how they wanted.” The deployment went as expected, and there was no connectivity trouble.</p><p>During the Freedom Over Texas event, the cameras were able to use the cell network almost exclusively, but experienced occasional blips in the service. During those moments, video continued to be recorded on the camera’s SIM card, and that footage was transmitted back to the control center once the live feed was active again. </p><p>“Frankly, most of the time it’s the recorded video that’s most important, not the live video,” Drummond explains. “They are watching those cameras in real time, but most of the time there’s no action to be taken. But if an event does take place during an outage, you didn’t record it for evidence purposes. The smart failover technology changes that.”</p><p>“It’s key for cities to be able to share this system,” Rezzonico notes. “If a municipality buys it, they can send it to another one that needs it for easy deployment.” ​</p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465