Documente Academic
Documente Profesional
Documente Cultură
com
Quality Control
is Everything
Like any product, reliability will
keep the end user happy
ALTRONIX MIDSPANS AND SWITCHES ARE DESIGNED WITH MAXIMUM FLEXIBILITY FOR
DEPLOYING IP DEVICES. NETWAY PROVIDES THE PRECISE COMBINATION OF SPEED
AND SCALABLE POWER IN VIRTUALLY ANY ENVIRONMENT.
WHAT’S DRIVING
G YOUR PoE?
2x2MP Dual-sensor
Network Dome Camera
DH-IPC-HDBW4231FN-E2-M
2x3MP Dual-sensor
StereoVision People Counting Camera
DH-IPC-HDW8341XN-3D
Empower your business with the latest technology offerings from Dahua. Contact us for
details on scheduling a demo.
us.dahuasecurity.com | sales.usa@dahuatech.com
Go to http://sp.hotims.com and enter 15 for product information.
features
Privacy Laws 8
Expanding Cybersecurity Solutions
Five data security questions for SMBs in light of the expanding Storage Security 38
consumer privacy laws Why Are SMBs so Worried?
By Richard Kanadjian Many organizational benefits include flexibility and productivity
By François Amigorena
Media Converters 12
The Mighty PoE Privacy Issues 42
Media converters ply myriad roles in today’s centric world Data Privacy Requires a Security Response
By Frank (Skip) Haight GDPR affords EU residents more control
over personal information
Transportation Security 22
By Mohammed Murad
Theft on Wheels
Cargo theft accounts for as much as $40 billion in annual losses
By John Chigos departments
Border Security 26 Industry Focus 6
Smart City Technologies Wyoming Surveys K-12 Principals
How solutions are deployed to ensure safety By Ralph C. Jensen
and security at the border Security Today Solutions 44
By Kevin Taylor
Advertising Index 49
Privacy Issues 28
Ushering in a New Era Industry Professional 50
Consumers are more concerned with how t A Global Solution
heir activities are being tracked How OSDP is changing the access control market
By Neil Huntingdon By Kaitlyn DeHaven
ON THE COVER: Image courtesy of / Telmo Machado, InfusionDirect.com
Online Communities
Follow us on Twitter: Become a fan on Facebook: Link to Us:
www.twitter.com/SecurToday www.facebook.com/SecurToday http://linkedin.com/company/security-today
4 1 0 1 9 | S E C U R I T Y T O D AY
EDITORIAL STAFF
Editor-in-Chief Ralph C. Jensen
Wyoming Surveys K-12 Principals Content Editor Sherelle Black
W
Associate Content Editor Haley Samsel
yoming State Superin- Department of Education. Two mass school E-news Editor Brent Dirks
tendent Jillian Balow shootings in 2018, in Santa Fe, Texas and in ART STAFF
is making an effort to Parkland, Florida, have prompted Balow
Art Director Dale Chinn
better understand how and her staff to move forward, in addition to
the state’s 48 school an incident where a student brought a loaded PRODUCTION STAFF
districts’ are protecting their students. I know weapon to a Gillette, Wyoming school. Production Coordinator Teresa Antonio
what you’re thinking. Wyoming is rural and “The state is very diverse in terms of
EDITORIAL ADVISORY BOARD
that’s the last place an incident would hap- campus population,” Balow said. “Some
William Crews, President/CEO,
pen at a school. I know The Cowboy State schools are small and there may be a cop
Security & Resilience Consulting, LLC, Houston
has a rural atmosphere in some places—I that stops by once a day, but we have much
Rob Hile, General Manager,
grew up there. larger schools where there might be a school Florida GC&E Systems Group, Tampa
School principals were emailed a survey resource office in the building. That is why Chris Lanier, LRG Inc., Jasper, Texas
of 20 questions, including what threat as- the threat assessment is the entry point of Jeff Karpovich, CPP, CHPA, CSSP, Chief/Director, Security &
sessment tools they are using; what training our discussion. Transportation, High Point University, High Point, NC
they undergo; how the school secures their “As a parent, educator and state leader it
entrances and other security–related topics. is important to take control and have these SALES
“The intent of the survey is to take the important discussions. We simply can’t just Randy Easton 678-591-2822
temperature on what is happening state- talk about gun control. We have to start with Brian Rendine 972-687-6761
wide,” Balow said. “We’re reaching to every student safety and well-being.” Sam Baird +44 1883 715 697
school to find the sweet spot and establish a I applaud Superintendent Balow for her Peter Kao +886-2-2949-6412
policy and set a baseline for campus security. continuing efforts and her press for improved
INFRASTRUCTURE SOLUTIONS GROUP
Our goal is to begin a discussion statewide school security. Following the results of her
President & Group Publisher Kevin O’Grady
on a threat assessment. Every school has a survey, Balow said she will present them
Associate Publisher, Security Ralph C. Jensen
threat assessment; we just want to see what publicly, which she said will help inform both
Group Circulation Director Irene Fincher
various schools have in place. her department’s security guidelines and po-
Group Marketing Director Susan May
“We understand that there is no silver tential future legislation. No doubt, all states
Group Website Manager Scott Newhouse
bullet; our goal is the well-being and safety are grappling with this issue. Good security Group Webinar Administrator Tammy Renne
of every student.” measures will offer peace of mind and create
School districts in Wyoming vary in pop- a baseline of security protocols. Policymak-
ulation and school size, as you might expect, ers must have a clearer idea of what is being
so one district is most certainly not deploy- offered, and what will help fill their gaps for
ing what another district might have in place. an effective campus solution.
The concern at the state level has been a topic Chief Executive Officer Rajeev Kapur
of discussion in the state legislation, and the Chief Financial Officer Sanjay Tanwani
Chief Technology Officer Erik A. Lindgren
6 X X 1 7 | S E C U R I T Y T O D AY
Rawpixel.com/Shutterstock.com
Expanding Cybersecurity Solutions
Five data security questions for SMBs in light of the expanding consumer privacy laws
By Richard Kanadjian
W
ith the expansion of privacy laws abroad What Could a Data Breach Cost a SMB?
and in the U.S.—HIPPA, CCPA, and Data breaches are not just a risk for large businesses and govern-
GDPR as examples—data breaches are ment agencies. Small businesses that collect customer and other sen-
serious issues for any company that holds sitive personal information are also at risk in today’s high-threat en-
PII (Personally Identifiable Information) vironment. Verizon found in their 2019 Data Breach Investigations
of consumers and or any other sensitive information. Report that 58 percent of all cyberattacks target small businesses.
California’s Consumer Privacy Act (CCPA) goes into effect on The cost of a data breach for a SMB is a topic of debate be-
January 1 and will affect not only companies in California, but tween leading researchers and companies. The Ponemon Insti-
also companies nationwide with serious financial penalties for tute put the average cost for a small business that was hacked at
businesses. Already in effect is the European Union’s GDPR $690,000 and over $1.2 million for a mid-sized business in 2018.
regulation, where non-complying organizations can be fined up Kaspersky Lab found that the average cost of a data breach and
to 4 percent of annual global turnover or €20 million, about $20 recovery to a small business is $269,000—$120,000 for the data
million-plus U.S. dollars, or whichever is greater. breach and $149,000 for breach recovery. Either way, a data
Under GDPR, companies can be fined for not having their re- breach could lead to more than just loss of money for a SMB.
cords in order, not notifying the supervising authority and those
affected by a breach, or not conducting an impact assessment. How Does the California Consumer
How businesses store, transport and manage consumer and Privacy Act (CCPA) Affect Businesses?
company information has become critical for not only large com- While the CCPA is meant to enhance the privacy rights and con-
panies, but small and medium-sized businesses (SMB) as well. sumer protection for the residents of California in the United
8 1 0 1 9 | S E C U R I T Y T O D AY
Securitron
AQ Series
Power Supplies
ce
ffi
O
e
Ser
iv
ut
ver
ec
Ex
Roo
m
om
Mai
Ro
n En
ce
en
tran
er
nf
ce
Co
Securitron R100
Card Reader for employee
and visitor management
“BYOD, or Bring Your Own Device, is USB drive encryption can be done through either the device’s
hardware or software. A hardware-centric/software-free encryp-
a key threat to even the most robust tion approach to data security is the best defense against data
cybersecurity plan that a small busi- loss, as it eliminates the most commonly used attack routes. This
software-free method also provides comprehensive compatibility
ness could put in place.” with most OS or embedded equipment possessing a USB port.
States, as with many laws enacted in the state, the law will affect Hardware-based encrypted USB drives are self-contained,
any business that has customers who are based in California— don’t require a software element on the host computer, and
which describes many companies around the world. are the most effective means in combating ever-evolving cyber
CCPA can apply to businesses even if they do not have offices threats. Hardware-encrypted USB drives protect against the pos-
or employees in California. The criteria to determine if this law sibility of brute force, sniffing and memory hash attacks due to
will affect your business are (any one of the three make the law their security being self-contained inside the drive.
apply to your business): Software-based encrypted drives are designed differently.
• Do you have gross revenue over $25 million, or They share a computer’s resources with other programs. The en-
• Do you possess the personal information of 50,000 or more cryption is not done on the USB drive at all. A software program
consumers, households or devices, or on the computer encrypts the data, then stores it on the USB
• Do you earn more than half your annual revenue from selling drive. To read it back, a software program must be run on the
consumers’ personal information? computer to decrypt the data. Because of this computer-based
If the new CCPA applies to your company, the intentions encryption process, the USB drives themselves are vulnerable. In
of the law are to provide California residents (defined broadly some cases, there are compatibility issues with older operating
enough to cover consumers, employees, business contacts and systems that may make the data unreadable.
others) with the ability to know what personal data is collected
about them (and have access to this information); how that data How Can I Protect My Company’s Sensi-
is used, sold or disclosed; ability to say no to the sale of personal tive Data and Not Hinder Productivity?
data; request their data to be deleted, and more. There should be standardization for best practices for what
is known as data “at-rest” or “in-transit.” While the most com-
Do Employees Bring Their Own Storage mon storage medium is the use of inexpensive USB drives, the
Devices For Back Up and Transfer? best practice is to standardize on hardware-based encrypted USB
BYOD, or Bring Your Own Device, is a key threat to even the drives. This practice will provide efficiency and security to mo-
most robust cybersecurity plan that a small business could put in bile data for anyone. Even accessing Cloud storage can be risky
place. The tremendous portability and exceptional ease of USB – while you access the internet at a coffee shop, someone else may
drives have proven to increase productivity to millions of busi- be trying to hack your system. If you carry your data on a hard-
nesses and government agencies. However, since most of these ware-encrypted drive, you can work on your data and keep your
drives are unencrypted, they can pose a major security risk to the internet turned off while in an untrusted open Wi-Fi area.
user storing anything more valuable than public data. So, where do you start? As a small or medium business, you
Their extreme portability means they are very susceptible to more than likely aren’t going to need the same level of protection
being lost, accessed or misappropriated. When that happens, that large companies and government agencies require. There is
there is a fairly good chance that data stored on the device will a range of easy-to-use, cost-effective, encrypted USB flash-drive
end up in the wrong hands, risking the user’s or company’s pri- solutions to choose from that can go a long way toward mitigat-
vacy and security. ing your privacy and security risks, and, quite possibly, save you
Having a company policy of standardizing on the use of hard- money and stress.
ware-based encrypted USB drives is a key factor in a USB drive’s Encrypted USB drive manufacturers provide you with op-
ability to provide the safest, most trustworthy means to store and tions, no matter your needs. For SMBs, Kingston’s DataTraveler
transfer personal, classified, sensitive data. Experts say the use of Vault Privacy 3.0 USB Flash drive provides affordable business-
an encrypted USB flash drive is the best solution for keeping con- grade security. The encrypted solution features 256-bit AES
fidential information what it was intended to be—confidential. hardware-based encryption in XTS mode (this is state-of-the art
From a cost perspective, hardware-based encrypted USBs are encryption). It protects 100-percent of data stored and enforces
not much more expensive than non-encrypted devices—and they complex password protocol with minimum characteristics to pre-
are like insurance against the unthinkable—the loss and breach vent unauthorized access. For additional peace of mind, the drive
of private data that could be exposed otherwise. locks down after 10-incorrect password attempts. It also features
The use of encrypted USB drives can also provide legal pro- a read-only access mode to avoid potential malware risks
tection with regulations such as HIPPA, CCPA, GDPR and oth- Data security and consumer privacy are not only concerns for
er regulations that affect many industries and professions. large businesses. SMBs are facing the same is-
sues with smaller budgets, so identifying cost
What is The Difference Between effective ways to mitigate the risk is paramount
Hardware and Software Encryption? as we prepare for 2020.
Not only is encryption vital in USB drives securing and protect-
ing data, how that encryption is performed is likewise important. Richard Kanadjian is the business manager of
Users have two choices: hardware and software-based encryption. Kingston Technology’s Encrypted USB unit.
10 1 0 1 9 | S E C U R I T Y T O D AY
“The number one reason people lightning or other electromagnetic interference. Optical fiber does
not conduct electricity so any lightning strike or EMI will be iso-
use wireless is, so the cabling lated to that location and not a carry back to the headend. These
infrastructure necessary to carry are often used for very short runs in lightning prone regions or
industrial locations.
the signal is not required.”
T
Make the Right Choice
he lowly media converter—the mainstream defini-
So how do you choose the right fiber-optic media converter? They
tion was always an electrical to optical Ethernet
come in lots of different types so here are options you have avail-
transmission device. Traditionally, it was consid-
able to you. The first question is whether you need a fixed optic
ered a device used to convert from copper media
version or a unit that uses a small form factor pluggable, or SFP,
to an optical fiber media and then back to copper,
that slides into the electronic unit and acts as your fiber optic
usually to send the data longer distances than the standard cop-
transmission and receiving piece.
per cabling can handle. But in today’s IP-centric world, media
Next, figure out what type of fiber will be used. There is mul-
converters work on lots of different types of media.
timode or single mode. Then conclude whether it will use one or
The three that this article discusses are fiber optic media con-
two fibers to make the connection. Many systems used two fibers
verters, extended distance media converters, and wireless media
so that you can send data one way on the first fiber and then in the
converters, all of which are transmitting an Ethernet signal.
opposite direction on the second fiber. Also related to the physi-
cal cable that will be used is the type of connector on that fiber.
The Ethernet Band There are ST, SC, and LC connectors, and here we have it shown
Here’s a graphical example of each type. Since all of them are as a dual LC connector for the duplex fiber.
transmitting Ethernet, they are all converting from a standard Ethernet runs at different speeds, so you also have to decide
copper CAT5 or 6 cable, which has a limitation of 100 meters, or what data speed you want running over that fiber. There is 100
328 feet. An optical fiber media converter converts to a fiber optic Mb per second, 1000 Mb per second, also called gigabit, or multi
cable and then back. rate media converters that allow you to slide in either a 100 or a
Although an extended distance Ethernet media converter 1000 Mb per second SFP for flexibility.
stays on copper cabling, it’s converting from a standard CAT 5 You also have to decide on the form factor for the media con-
or 6 to a non-standard copper cable, such as a coaxial cable or an verter. They come in a mini size, a medium mini size, and a full
unshielded twisted pair cable, and then back to a standard cable. size that would fit in a standard 19-inch electronics rack. These
A wireless Ethernet media converter works the same way as the smaller units are good for fitting in small locations like enclosures
above types but it’s converting the Ethernet to a radio frequency or the mounting arms/back boxes of IP cameras. The full size
to be transmitted through the air. variants can be shelf or wall-mounted, or slid in to a 14 slot card
This article is to help you in selecting media converters that cage with no modifications.
fit your application, so here are some important considerations.
Many applications are outdoors and not in climate-controlled Consider All Options
environments. Electronics don’t like to be cold or wet so a harsh The last option to consider is whether you need power over Eth-
environment requires a hardened product that can withstand ex- ernet at the remote location for your camera or other IP device.
treme temperatures, condensation, transient voltages and other ComNet has options for 15 Watts, 30 W, or even 60 W for the
environmental factors. A lifetime warranty on all hardened outdoor rated IP PTZ cameras. And of course, all units ship with
products means the product will work now and as long as long the correct power supply.
as it’s installed. One application to note to consider with fiber-optic media
Because there are so many factors to consider when selecting a converters is pairing appropriate units. When using just one fiber
media converter for a harsh environment, it’s important that you between the transmitter and the receiver you should pair an A
select a good partner to help pick an appropriate product. Fiber unit with a B unit. The model number will tell you which it is.
optic media converters. The number one benefit with this type is When you are using a duplex fiber optic cable between the trans-
the long distances they can carry an Ethernet signal. Standard mitter and receiver, both units have the same model number.
copper cat 6 cables only carry the signal 100m, but a fiber-optic Let’s examine extended distance Ethernet media converters.
media converter can extend that out over 100 km or more! The main reason installations use them is a retrofit application
The second most common reason for using a fiber-optic me- where are you are moving from an analog camera infrastructure
dia converter is to isolate the devices in an outside location from to an IP camera infrastructure. These media converters allow you
12 1 0 1 9 | S E C U R I T Y T O D AY
WIRELESS S
IG
POWERED B NAL
SIMPLY PUS Y
HI
THE SWITCH NG
!
to use the existing coax cable or UTP cable and now run Ethernet the binary code of Ethernet from an electronic signal to a radio
on it instead of the analog signal, and it can represent a huge cost frequency signal and then back again. The number one reason
savings versus pulling out the existing cabling. people use wireless is, so the cabling infrastructure necessary to
The second most common benefit is being able to send an IP carry the signal is not required. Trenching for new cabling is very
signal much farther than the standard hundred meters over cat six expensive, complicated, and difficult to accomplish in many envi-
without having to switch to more expensive optical fiber cabling ronments. This all represents a huge cost savings by using wireless
and optical fiber media converters. Many extended distance Eth- transmission methods. The second big benefit is the speed of de-
ernet media converters can transmit an IP signal over 2,000 feet. ployment. If you have power on site, the installation of a wireless
The third benefit is a good reason installers choose this type of Ethernet media converter can be very quick and effective.
media converter. Pass-through PoE allows one power source, like This application is a simple point-to-point solution. The Net-
a POE switch, power all devices on the line. Power is transmitted Wave NWK 11/M and NWK1 kits include everything needed
from the PoE switch, powering both of the media converters and to set up a wireless link. The kits are preconfigured in the fac-
also passing power up to the camera at the end of the line. This tory and MAC locked so that installation on the bench or in the
makes for a much quicker installation and means you don’t need field is simple, quick, and reliable. These preconfigured kits have
to worry about finding power at the camera location. allowed installers with no previous experience using Radio fre-
Please note that the amount of POE you need at the end quency products to successfully implement a wireless Ethernet
of the line will affect the distances you can successfully travel media converter solution.
over any copper cable, so please consult our data sheets for spe- Since many of these applications are intended to be used in
cific limitations. Although ComNet has several product lines harsh environments, it is imperative that you select a product
that perform this media conversion, our most comprehensive that can handle extreme temperatures and other environmental
and popular segment is Copperline® distance extending media factors. In addition, it’s important to work with a company that
converters. It comes in 15- and 30-Watt models, various useful has expertise in all types of Ethernet media
form factors, five different ways to power the modules, and 1 to conversion and can work with you to deter-
16 channel units. mine what solutions are best suited for your
application.
Consider the Expense
Last in the series of media converters are wireless Ethernet me- Frank (Skip) Haight is the vice president of
dia converters. This is a little different in that we are converting marketing at Communication Networks.
14 1 0 1 9 | S E C U R I T Y T O D AY
AlarmControls.com
I
n today’s world, there are a myriad of different manufac- ity means different things to different people. However, when it
turers that produce similar products and there are so many comes to perimeter protection and selecting the right turnstile so-
options available to customers. However, there is only one lution, the word quality translates into reliability, which in return
way to make your product stand out from the rest: deliver creates a safer world.
a quality product that offers reliability and peace of mind With so many product choices out there, quality turnstile
to customers. By delivering a quality product time after time, manufacturers that consistently deliver a superior product will
you not only maintain customer satisfaction and loyalty, but forge ahead of their competitors and retain customers. Security
reduce the cost of replacing a broken product and minimize a manufacturers today must make products that are durable, reli-
customer’s downtime. able and without failure. When it comes to quality perimeter pro-
tection products and reliability, you have to be at the top of your
Reputation of Quality game and build a solid reputation by continually exceeding your
Companies can build a solid reputation for quality by gaining customers’ expectations each and every time.
recognition as the industry standard for quality. The word qual- It is important to offer customers peace of mind with them
16 1 0 1 9 | S E C U R I T Y T O D AY
+ +
Intelligent Video Automated Health
Surveillance Server Cybersecurity Monitoring
Appliances Software Software
18 1 0 1 9 | S E C U R I T Y T O D AY
Non-Metallic Enclosures
Waterproof, Impact-Resistant, Non-Corroding and Non-Conductive
MADE I N T
LY H
UD
EU
PRO
SA
FO
S!
R
OV AR
E R 3 0 YE
You name the box, can, cabinet or enclosure: Mier Products has you covered!
1-800-473-0213 | info@mierproducts.com | www.mierproducts.com
Go to http://sp.hotims.com and enter 2 for product information.
out of the box and different then what everyone else offers. Qual- Industry Specific Solutions
ity has to be the main driver and philosophy of any manufacturer Producing industry-specific solutions is also an important factor
and bringing a turnstile product to market that can be counted for turnstile manufacturers. When it comes to school security,
on 365 days a year without any failures should be the goal of any turnstiles that can accommodate forced-entry resistant glass—
turnstile company. school guard glass—can be beneficial. The term “school guard
glass” is something that will become extremely popular over the
Exceeding Industry Standards next few years.
Adhering to an industry-quality standard is an important aspect More schools will be implementing bullet-resistant glass at
of quality control. How turnstile manufacturers handle quality entry points with the intention of protecting and saving lives. A
control internally is something that a potential customer should Dual Portal Mantrap Turnstile can be used at critical checkpoints
look at closely. What systems and processes are in place to ensure and can handle a full-height school guard glass set of moving
quality products are produced and delivered consistently? panels, which is an important factor for schools. Only moving
A manufacturer who invests heavily in internal resources panels with a compound motion will keep the leading edge of
such as engineering, quality control, R&D and production man- the barrier midway along the passageway while storing the panels
agement, has a better chance of being a company that exceeds parallel to the passageway. This functionality provides the safest
industry standards. In addition, testing is a huge component of and widest passageways (up to 42” clear).
quality. All mechanics inside the cabinets should be tested for As well as unprecedented ADA compatibility, particularly with
years to ensure that everything is working properly. Custom- service dogs and wheelchair footrests in bi-directional traffic.
izing a turnstile solution while still adhering to strict quality As we move forward, turnstile manufacturers will continue to
guidelines is just as important. Offering different shapes, mate- develop solutions to better protect facilities
rials, finishes, features and items such as companion walls and around the country. However, only the ones
matching structures all need to come together to seal the deal. that foster a quality-first philosophy will sur-
Turnstiles that are poor quality increase costs not only for cus- vive and be around for the long haul.
tomers, but the manufacturers who will have to scrap defective
products and sometimes pay additional production costs to re- Michael Stoll is the vice president of technical
place broken turnstiles. sales and marketing at Aeroturn.
I WANT YOU
TO BUY AMERICAN!
Our Steel Gooseneck Pedestals are
Made in America from American Steel
Our Lexan Polycarbonate
Housings are
Made in America from
American Plastic Resin
20 1 0 1 9 | S E C U R I T Y T O D AY
Aeroturn designs, manufactures, tests, delivers and installs the world’s only Zero-Maintenance
standard and custom turnstiles. The company has not stopped delivering quality turnstiles
DQGVHUYLFHVRYHUWKH\HDUVWRLWVKLJKSURȴOHFXVWRPHUVLQDZLGHYDULHW\RIYHUWLFDOPDUNHWV
that includes commercial, private, government, industrial, bio-pharma and education.
5HSUHVHQWHG([FOXVLYHO\E\
3KRQH 3KRQH
(PDLOVDOHV#WKLQNUHSVFRP (PDLOLQIR#LQIXVLRQGLUHFWFRP MADE IN THE USA
www.aeroturn.com
Go to http://sp.hotims.com and enter 8 for product information.
welcomia/Shutterstock.com
Theft on Wheels
Cargo theft accounts for as much as $30 billion in annual losses
By John Chigos
O
ddly enough, in a world where virtually any trailers and the escape vehicles have one thing in common: license
item is only a mouse click and 24-hour delivery plates. As such, automatic license plate recognition (LPR) tech-
window away, we tend not to think much about nology can be employed to mitigate theft, recover lost cargo and,
how our merchandise gets from some ware- most importantly, bring the perpetrators to justice.
house to our front door. Unfortunately, there
are thieves who do. Preventing Cargo Theft with
While inconsistencies in reporting make it difficult to assign Improved Perimeter Security
specific numbers to cargo theft, Loss Prevention magazine recent- In a report on cargo theft in 2017, the FBI found that nearly 40
ly reported that cargo theft accounts for between $15 billion and percent of all cargo thefts that year occurred in parking lots or
$30 billion in losses annually.1 As for some recent statistics, trans- garages.4 That means thieves were able to commit their crimes
portation trade magazine Transport Topics cited a report from more or less at their leisure, either by stealing trucks/trailers or
the SensiGuard Supply Chain Intelligence Center that found U.S. stealing cargo from them. Even if there was surveillance technol-
cargo thefts increased by 25 percent in Q1 2019, with the average ogy, the perpetrators could have obscured their faces with hooded
loss being nearly $117,000.2 sweatshirts, hats or masks, making them difficult to identify—
When it comes to cargo theft, thieves certainly have ample op- much less apprehend. In short, they committed a crime that ex-
portunity. According to the Bureau of Transportation Statistics perts could argue was relatively low-risk.
(BTS), the trucking industry accounted for 11.5 billion tons of LPR could increase that risk significantly while making it
freight valued at nearly $12.5 trillion in 2017.3 possible to catch the thieves in the act. That’s because cargo
Regardless of how thieves choose to take the cargo—by pil- thieves can’t transport any meaningful amount of cargo on foot.
fering trucks and trailers left in parking lots or executing violent They either need to steal a truck/trailer or need a vehicle of their
hijackings that also risk the lives of drivers—both the trucks/ own on the premises in order to efficiently transfer the stolen
22 1 0 1 9 | S E C U R I T Y T O D AY
Let Garrett Metal Detectors help pinpoint potential threats at your facilities.
800.234.6151 • 1.972.494.6151
Go to http://sp.hotims.com and enter 19 for product information. Visit garrett.com to learn more Made in the USA
24 1 0 1 9 | S E C U R I T Y T O D AY
jamesteohart/Shutterstock.com
Smart City Technologies
How solutions are deployed to ensure safety and security at the border
T
By Kevin Taylor
wo of the biggest trends today, particularly in the city. With the increasing number of devices and systems that can
security surveillance and IoT realms, are border be integrated and interconnected, the size and scope of smart city
security and the emergence of local governments applications is seemingly only limited by the imagination, ingenu-
transforming their communities into smart cities. ity, and, oh yeah, the budget and/or available funding.
On the surface, these two may seem to have little, if Based on these descriptions, it may be hard to imagine where,
anything, in common. But that isn’t necessarily the case. if at all, the two worlds of border security and smart cities would
intersect. Upon closer examination, however, there are similari-
National Security or Humanitarian ties in some of the technologies and systems that are used for
Border security can be seen as a humanitarian issue, a national each of these applications. So, while the actual use cases and ap-
security issue or even a combination of the two. Regardless of plications of the technology may vary, they are more similar in
how you balance your viewpoint, border security is certainly im- function than they appear at first glance.
portant to countries and their citizens. Without a doubt, there The Department of Homeland Security (DHS) Digital Video
is heightened public awareness about securing national borders Quality Handbook recognizes three primary categories for video
around the world. analytics: real-time situational awareness and incident response,
Within smart cities, there are a number of initiatives that can non-real-time forensic analysis/digital media content search, and
be undertaken to address the challenges facing a particular com- business intelligence. For our purposes, we will examine the first
munity. For some people, the most important aspect of smart cit- and third of these.
ies is a comprehensive energy plan. For others, it’s public safety.
Still others see a shared services hub, enabling bi-directional ex- Real-Time Situational Awareness
change of data and information between citizens and departments and Incident Response
of public services, as the most crucial part of a smart city. These In border security, real-time situational awareness can be used
are just a few of the many sub-segments that can make up a smart with perimeter detection analytics to notify an operator if an area
26 1 0 1 9 | S E C U R I T Y T O D AY
Analytics-Driven Solutions
Selecting technology that is a sound and reliable investment
GS12
The H5SL camera features wide and long-range lens variants that are available in a variety of
resolutions for clear and detailed imaging. It is one of our easiest-to-install cameras, providing
you with a simple, flexible and cost-effective security solution.
Audio Capabilities
Incorporate audio and configure input/output actions
and alarms so that you can respond to events faster.
Ease of Installation
Simple and intuitive to install, with a modular
design that easily snaps into the base of your
choice, helping you to get up and running in minutes.
avigilon.com/h5sl | asksales@avigilon.com
Product features and functionalities may not yet be available and, if and when available, may not be as depicted. Images have been simulated for illustrative purposes.
© 2019, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo and HDSM SmartCodec are trademarks of Avigilon Corporation.
EDITORIAL STAFF
B
Associate Content Editor Haley Samsel
E-news Editor Brent Dirks
ack in the day, talking about to resolve any irregularities to assist first
government security was all the responders.
ART STAFF
rage. In fact, it was about cameras, White delves into several key topics that Art Director Dale Chinn
software and access control. All these are pertinent to the government security
things were and are still vitally important. The market. He will breaks down how to enhance PRODUCTION STAFF
chatter today is all about cybersecurity and safety with video analytics, the tool’s Production Coordinator Teresa Antonio
selecting solutions that are technologically ability to analyze data to extend beyond
sound, and offer a reliable investment. safety, and finally a recap on the fact that EDITORIAL ADVISORY BOARD
This topic is covered in our Cover Story, these capabilities and solutions may seem William Crews, President/CEO, Security & Resilience Constulting
written by Joel White of Bosch Security futuristic, but they are not. They are already LLC, Houston
Rob Hile, General Manager,
and Safety Systems. He writes that video being used in many cities and states across
Florida GC&E Systems Group, Tampa
analytics technology can bring intelligence North America. Alan T. Mather, NASA, Lyndon B. Johnson Space Center, Houston
to infrastructure by delivering solutions for I think you’ll enjoy our cover story, and
traffic flow, which also includes improved the details about the possibilities of a smart SALES
safety, smart parking and data collection. infrastructure to improve safety and security Sam Baird +44 1883 715 697
Safety can be enhanced with video in your jurisdiction. Randy Easton 678-591-2822
analytics. Here’s how it works. Early incident Brian Rendine 972-687-6761
detection enables traffic and transportation
centers to implement necessary workflows INFRASTRUCTURE SOLUTIONS GROUP
President & Group Publisher Kevin O’Grady
Editor-in-Chief/
In This Issue Associate Publisher, Security
Group Circulation Director
Ralph C. Jensen
Irene Fincher
Group Marketing Director Susan May
Group Website Manager Scott Newhouse
Cover Story Group Webinar Administrator Tammy Renne
The cybersecurity maturity model certification could have a profound Dallas Office (weekdays, 8:30 a.m. – 5:30 p.m. CT)
Telephone (972) 687-6700; Fax (972) 687-6799
impact on the procurement landscape when it goes live next year. 14901 Quorum Dr., Suite 425, Dallas, TX 75254
By Derek B. Johnson Corporate Office (weekdays, 8:30 a.m. – 5:30 p.m. PT)
Telephone (818) 814-5200; Fax (818) 734-1522
GS10 Airport Security 6300 Canoga Avenue, Suite 1150, Woodland Hills, CA 91367
GS4
74R1
Electric
Device
EX89 Pullman
Rim Exit Device
By Derek B. Johnson
Steve Mann/Shutterstock.com
Are Contractors Ready for DOD’s
Cybersecurity Framework?
The cybersecurity maturity model certification could have a profound impact
on the procurement landscape when it goes live next year
C
ontractors will face big changes and tight timelines next in operation by 2020 [is] going to be difficult,” said Robert Metzger,
year when the Defense Department institutes its new a lawyer specializing in government contracts and commercial litiga-
Cyber Maturity Model Certification framework. An- tion and a consultant who focuses on supply chain security issues.
nounced by DOD officials in June, the framework seeks “Naturally, industry has a lot of questions about the mechanics…
to certify companies’ compliance with federal cybersecurity regula- Companies are understandably uncertain as to how these changes
tions for controlled unclassified information (CUI). It will be used will affect what they’re doing, how they will demonstrate eligibility
to evaluate and rate contractors’ ability to protect sensitive data on a for contracts and what the costs might be upon their operations.”
scale of 1 to 5.
The initial version of the framework is scheduled to go public in Cybersecurity is Not Free
January 2020. By June, its requirements will start appearing in re- High costs, confusing guidance and low return on investment have
quests for information, and it will become a regular feature of defense all been cited as reasons for compliance challenges among defense
procurement by September. That means defense contractors will have contractors. Traditionally, DOD has declined to cover the costs as-
less than eight months to implement the necessary changes to ensure sociated with implementing acquisition regulations related to CUI
that they comply with the Defense Federal Acquisition Regulation cybersecurity, but that has slowly changed over the past 12 months as
Supplement’s and the National Institute of Standards and Technol- military contractors have faced unprecedented attacks from foreign-
ogy’s guidance on protecting CUI. sponsored hackers.
“Any timeline would seem ambitious. One that looks to have this Last year, then-Deputy Secretary of Defense Patrick Shanahan
Untitled-4
1019gss_GS008_009_Johnson_v3.indd 8 8/28/19 10:47 AM
expressed reluctance on the part of DOD to help contractors cover firm Fathom Cyber, told FCW he has serious doubts that many de-
added costs for cybersecurity, saying it should be a baseline expecta- fense contractors will be ready by September 2020. For most com-
tion in contracts. panies, the associated costs are less about assets and technology and
However, at a Professional Services Council event, Katie Ar- more about training employees and allocating personnel to map and
rington, special assistant to the assistant secretary for defense for formalize internal IT policies. The potential for an initial shock to the
acquisition for cyber, announced that the department would allow federal contracting system is real.
contractors to write off a portion of their cybersecurity spending for “I do think that it’s going to hurt us in the short term from a
government contracts, including implementing NIST guidance. product-availability perspective,” said Goepel, who also teaches cy-
Alan Chvotkin, executive vice president and counsel at the Profes- bersecurity at Drexel University’s law and business schools. “The
sional Services Council, welcomed the shift, stating that it would be government is going to miss out on stuff, and there are going to be
contradictory for DOD to refuse to provide financial incentives for companies that go out of business because of this. But in the end, I
cybersecurity while it is also expressing a desire to expand the num- think that it may actually be a better thing for country unfortunately.”
ber of businesses that make up the defense industrial base. Metzger doesn’t go that far but believes a short-term effect could
“To be a smart businessman, let alone a contractor, you ought to be the departure of some companies from the federal contracting
undertake this [level of security] because our adversaries are stealing space. The impact might be hardest on small and medium-sized busi-
everything,” Chvotkin said. “On the other hand, [DOD] is trying to nesses that have fewer financial resources and have typically avoided
entice nontraditional companies and small companies that otherwise the level of scrutiny directed toward large prime contractors.
… might not see the need to incur such significant costs to reach the “I think the short-term impact is that companies of all sizes are
level that is expected as a contractor or subcontractor.” going to be looking at affordable effective ways to improve their cy-
Still, it’s not clear how DID’s reimbursement policy will work, bersecurity,” he said. “Nobody knows exactly today what you will
which contracts it would apply to or what percentage of a company’s need to do to get a security rates score of [1 to 5] ... I’m thinking that
costs would be covered. many companies will be targeting their investments and actions to be
sure that when it comes into place they will get at least a 3.”
A Shake-up of the Contracting Community
James Goepel, CEO and general counsel at cybersecurity consulting Derek B. Johnson is a senior staff writer at FCW.
By Kim Rahfaldt
V
aldosta Regional Airport in
Valdosta, Georgia offers three
daily commercial flights to and
from Atlanta Hartsfield-Jackson
International Airport, along with general
aviation. The airport contains three runways,
two of which are used by commercial air-
craft. The airport offers ground transporta-
tion, free parking, a Subway restaurant and
many other services, such as hanger space
and flight training, to name a few.
Previously, Valdosta Regional Airport
operated a legacy access control system. The
proprietary system, including the readers,
panels and software, was outdated, making it
difficult and expensive to obtain replacement
parts. Looking for an open solution, Valdosta
Regional Airport turned to Allcom Global
Services for their expertise and upgraded to
AMAG Technology’s Symmetry SR Retrofit
Access Control system with HID readers.
“Symmetry integrates into various video,
intrusion and building automation systems,”
said Kevin Cioffi, the vice president of busi-
ness development in the physical secu- “The security operators found the Symmetry
rity division of Allcom Global Services. “By
choosing an open system, Valdosta has more
solution much easier to learn and use, saving
freedom to research competitive pricing and
alternative options. We are thrilled they have
money and hours in training time.”
chosen Allcom.” the airport’s readers. ing with their old system. Badges are now
“We gutted all the circuit boards and The remaining Airport Operations Areas created on demand and onsite, with no has-
changed to Symmetry panels,” said Tim Reg- (AOA), which are mostly internal doors and sle or extra charge.
ister, the operations manager and airport the main entrance, requires only a proxim- “This Symmetry solution provided us a
security coordinator at Valdosta Regional ity card swipe to open. Thirty-two new HID more economical approach to facilitate the
Airport. “We kept the antennas and how the proximity card readers were installed in total. same thing we used to do with a more expen-
data was transmitted. All the mounts stayed To get the open system the airport re- sive proprietary system,” Register said.
the same; we just swapped in Symmetry, and quired, Valdosta Regional Airport replaced Airport authority employees, TSA, airline
it worked.” older panels. As the system changes and ex- employees, fixed based operators, life flight
The system controls access to the perime- pands, integrating different technologies or helicopter and fixed wing aircraft are all pro-
ter of the airport, including the vehicle access adding more readers will be easy and cost tected by Symmetry. In addition to the perim-
gates and all outside doors facing the Secu- efficient. eter, the solution controls access to all work
rity Identification Display Area (SIDA). The The security operators found the Sym- areas within the airport and to the hangers
SIDA includes all areas that have access to metry solution much easier to learn and located inside the perimeter fence.
the commercial apron and tarmac. The SIDA use, saving money and hours in training
also requires a reader with a PIN-plus-card time. The simple job of creating a badge for Kim Rahfaldt is the director of media rela-
swipe to open, which make up 75 percent of a user was cumbersome and time consum- tions at AMAG Technology.
When we
come together, WAVE TO OPEN
great things
happen
From electric strikes to cabinet locks and maglocks, ASSA ABLOY Electronic Security
Hardware has complete solutions to upgrade access control on any opening.
By Joel White
Christian Mueller/Shutterstock.com
Analytics-Driven Solutions
Selecting technology that is a sound and reliable investment
A
s city streets and sidewalks become progressively more mation for data-driven decision-making.
congested, city planners are facing new safety challenges, As a result, city planners and senior traffic engineers can create a
including distracted pedestrians, a growing numbers of smarter, safer and more sustainable transportation ecosystem.
bicyclists on the road and an increase in public transpor-
tation. At the same time, smart and semi-autonomous vehicles that Reliable Data and Detection
can communicate with each other and with roadside infrastructure Video analytics technology can bring intelligence to infrastructure by
are on the rise in cities and on highways. delivering solutions for traffic flow, improved safety, smart parking
and data collection. Analytics built in to IP cameras enable intelligent
The Right Technology video devices that can send safety risk alerts and deliver valuable data
The challenge for senior traffic engineers and planners is complex. for highway and urban infrastructure planning.
From a broad spectrum of emerging technology coming from new With built-in video analytics on IP cameras, analytics processing
and well-established industry players, how do you choose the right is done at the edge—on the raw video stream at the camera sensor—
technology to improve mobility, safety and efficient use of roadways with no central analytics server required. The key advantages to built-
now and into the future? How do you have a level of assurance that in analytics, as opposed to analytics that are added to the camera af-
the technology selected is a sound and reliable investment? ter the fact or analytics processed downstream on a server, are the
IP cameras with onboard analytics processing capability operat- camera’s architecture, image processing capability and overall system
ing as video sensors are a key component to intelligent transporta- efficiency that is designed from the ground up. Analyzing raw data at
tion systems that help to keep roadways flowing safely and efficiently. the sensor also adds an increased level of precision because the raw
In combination with other systems for city and traffic management, sensor data analyzed is uncompressed with no loss of video fidelity.
smart IP cameras enable detection and monitoring solutions that True analytics at the edge, in the camera, eliminate the need for
instantly alert the right people to safety risks and constantly gather additional computers at the pole or expensive networks for cloud-
information on roadway usage to provide better insights and infor- based analytics while still allowing continuous capture of high quality
data. The result is a distributed network of cameras acting as intel- pedestrians use certain locations to provide insights into possible
ligent processing nodes with no single point of failure, delivering a safety improvements.
cost-effective and reliable video-as-a-sensor solution. Excellent video Multiple cameras can feed data to dashboards that deliver action-
images, intelligent event detection and alerts, and data collection and able information for business intelligence purposes—helping city
aggregation can all come from the single video device. planners understand traffic patterns, congestion points, and more.
With machine learning technology—the latest advancement in Data examples include:
video analytics—cameras can be taught to recognize user-defined • Pedestrian, bicycle, and vehicle counts
object classifiers. For example, machine learning can be used to ac- • Classification of vehicles, such as cars versus trucks
curately count overlapping vehicles queued in front of traffic lights. In • Average speed and direction
many use cases, machine learning capability can improve detection • Road occupancy
accuracy to enable precise vehicle counts with minimal errors. Infrastructure owners can choose whether they want both video
Machine learning also enables customized solutions to solve the and the data or just the data. When only data is needed, low band-
specific needs of cities and transportation departments. For example, width connections can stream it from the sensor into the data ware-
it can detect the formation of icicles or snow buildup on bridges, house, reducing network impact and allowing video to stay private.
overpasses and tunnel openings, where they can pose a significant In busy cities, video analytics can also help monitor parking lot
safety risk to motorists or pedestrians passing underneath. occupancy and curbside parking as well as help enforce no-parking
zones. In lots, cameras can count the number of open parking spaces,
Enhance Safety with Video Analytics specialized spots—such as those for handicap or electric vehicles—or
Improve safety by alerting to risks on the road. Intelligent IP cam- track ingress and egress. The cameras then relay this data to the video
eras deliver automatic incident detection and verification for slow or and parking management systems. Sharing this information, along
stopped vehicles, queues of vehicles at exit ramps, vehicles traveling with alternative parking locations on a dynamic message sign, can
the wrong way, objects in the road—such as lost cargo—and other help drivers find open parking faster, getting them off the road and
traffic events. Alerts can be sent to traffic management centers or, reducing traffic congestion and emissions.
through integration with highway information solution providers, For smart parking applications, machine learning adds the advan-
the IP cameras can trigger third-party systems to notify drivers, im- tage of determining the amount of time a vehicle has been parked
proving situational awareness. and much more. For example, at the airport curbside for passenger
With video analytics: drop-off and pickup, vehicle parking time limit is restricted; machine
• Early incident detection enables traffic and transportation op- learning can detect and alert law enforcement to vehicles that exceed
erations centers to implement the necessary workflows to resolve the maximum time limit. Machine learning analytics technology
road irregularities faster, enable first responders to intervene does not have a timeout dependency as compared to standard analyt-
more quickly, and avoid secondary accidents. ics detections of parked vehicles.
• Integration with dynamic message signs, and dedicated short-
range communication (DSRC) broadcast messages to smart ve- Proven Solution
hicles, ensure drivers are instantly alerted to safety issues. While these types of capabilities and solutions may seem to be part
• Detection of pedestrians in a crosswalk can alert the traffic con- of futuristic solutions, smart connected city and transportation so-
troller to preempt traffic signals to increase safety, enabling smart lutions are already here and are being used in states and provinces
intersection control. throughout North America, whether through full implementation or
• Jaywalkers at night can trigger the IP camera to activate an on- in pilot projects.
board illuminator to make pedestrians more visible to motorists. For example, in one Midwestern state, IP cameras with built-in
• Integration with highway information solutions can broadcast mes- video analytics are helping to improve highway safety by warning
sages to smart vehicles to alert them to the presence of pedestrians drivers of dangers ahead. Some of these alerts include cross-traffic
in the area the vehicle is travelling and display the pedestrian’s GPS warnings, curve-speed warnings, pedestrian detection, queue warn-
coordinates on a live map in the vehicle’s on board unit. ings, work-zone warnings and wrong-way driver detection. Events
detected by the cameras trigger the highway information solution to
Analyze Data to Extend Beyond Safety send messages about these incidents directly into the display units in
With video analytics, the IP camera becomes an intelligent sensor connected smart vehicles. For the majority of unconnected vehicles,
that can classify objects as cars, trucks, bicycles, and pedestrians, and messages are broadcast to dynamic signs and other alert beacons.
detect speed and trajectory. Object classification enables the cameras From improving traffic flow on highways to implementing proj-
to recognize what they are viewing for data-gathering purposes. ects for pedestrian safety initiatives and gathering data for smart in-
Using video as a sensor and software tools for tapping into the frastructure planning, video sensor technology enables a wide range
camera generated metadata, the data can be extracted and stored in of customized solutions to meet the needs of city planners and senior
relational databases allowing city traffic planning directors and senior traffic engineers around the world.
traffic engineers to continuously collect real-time data to analyze flow
patterns on networks of roadways. The camera-generated data can Joel White is the North America vertical marketing manager for
be used for implementing new policies that result in safer and more Intelligent Transportation Systems and Smart Cities at Bosch
efficient intersections. This data can also help them determine how Security and Safety Systems.
59
ble!
$
• Works with outward and inward
95
swing doors
• No need to replace existing
hardware
• One time solution - easy to install ea.
• Lockdown in seconds
classroomlockdown.com
1-855-644-4856 TOLL FREE
By Greg Hamm
T
he vast majority of discussions involving security and park- vehicle at the moment of impact. The amount of kinetic energy pos-
ing areas focus on protecting people and property from sessed by a vehicle changes by the square of its velocity. A vehicle
vandalism, theft or violent crimes. Thus, when planning moving at 50 mph has 25 times as much kinetic energy as at 10 mph.
security features for a new or existing parking lot or garage, An armored car weighing 30 times as much as a Toyota moving at 10
the first consideration must be the level of security required for that mph has less hitting power than the Toyota moving at 60 mph.
particular facility. A parking garage for a foreign embassy or federal Because of the relationship of velocity to the total kinetic energy,
courthouse will require far more serious security measures than a mall the security engineer must make every effort to force a vehicle to slow
parking lot. Other primary considerations include the frequency of ve- down before it reaches the barricade.
hicles moving in and out and whether there will be vehicle inspections
performed or a fully automated system at the entrance. Security Starts With an “S”
Straight lines make for faster and easier approaches for vehicles, so
Reviewing Some Basic Physics Principles it’s best to create curves on access roads to your facility as a natural
When evaluating the security risk for a car bomber or crasher for impediment to speeding cars or trucks.
a given facility, focus on the weights and velocities of vehicles that The most frequently used technique is to require a sharp turn im-
could be used to attempt penetration into sensitive areas. A vehicle mediately in front of the entrance. When vehicle speed is reduced
moving towards a barricade has a certain kinetic energy—the major by 50 percent, “hitting power” is reduced four times. If the speed is
measure of how much “hitting power” it possesses. reduced by two-thirds, the force of impact is reduced nine times. Fail-
Mathematically, kinetic energy is derived from the vehicle veloc- ing to understand this and not using the proper equipment to counter
ity and its weight (mass). On impact, some energy is converted to the threat leads to a false sense of security.
heat, sound and permanent deformation of the vehicle. To stop the Upon designing a way to slow down vehicle approach, precau-
vehicle, the stopping point must absorb the remainder. tions should also be taken so that the attacking car cannot make a
The remaining energy depends primarily on the velocity of the “corner cutting shot” at a barricade. Often, only a light post defines a
www.securitytoday.com
Deploying
IoT Devices
Best practices for managing
and securing IoT networks
securitytoday.com campuslifesecurity.com
gating. When a system suspends a tailgating car, it’s literally doing its
job—stopping an unauthorized vehicle from entering a facility. Most
vehicle barrier systems are set up to allow only one car at a time. How
do you avoid these “accidents,” yet avoid weak links? Employ loop
detectors. These little sensor subsystems determine when the first car
has passed by and automatically and immediately drop the gate or
raise the bollards.
Another common planning deficiency occurs when designers
choose non-certified barriers or barricades. No area is more critical
to the vehicle barrier selection process than testing. Without adequate
testing, there is no assurance that the barrier will resist the threat.
Certified equipment has been tested and proven to work under
extreme conditions, giving planners the confidence they rely on. Test-
ing is normally done by an independent testing company or govern-
“Barriers, bollards and other vehicle ment agency, such as the U.S. Department of State (DOS) and mili-
tary. Comprehensive reports of test results are issued and are available
control equipment discourage attempts from the testing agency or manufacturer.
to cause harm and encourage employees Example: Barricades Bolster Security
and visitors to feel secure.” at Miami Federal Courthouse
turning point and a speeding car can take it out and not even hesitate. To regulate traffic, provide a safe place to transfer prisoners and offer
Knolls and other impediments should be considered. secure underground parking for judges, the Miami Federal Court-
Where turns cannot be created, many are turning to an “Early house installed hydraulic barricade systems. Each 10-foot wide barri-
Warning System.” This system is best applied at locations where there cade is a moving ramp that is surface-mounted and rises to 18 inches
is a long and relatively straight run into the facility that would allow a when activated.
large vehicle to build up its speed. A vehicle traveling at 60 mph can In normal operation, these barricades stay up and are lowered
cover 88 feet per second so it is imperative that guards are alerted only to allow passage of authorized vehicles. The speed at which the
immediately. barrier deploys can be fully adjusted to the security site and facility
Intelligent vehicle systems can check the velocity of an approach- requirements. Security personnel at the Miami Federal Courthouse
ing vehicle, or set off an alarm if a car is coming down the wrong can have different speeds on different barriers and change the speeds
lane. Intelligent systems will also protect innocent drivers who might as security warrants.
be trapped between barricades and a speeding, approaching vehicle. To ensure the units will not rise if a car is on or in the way of the
Intelligent vehicle systems also are able to tell if a vehicle is too large barrier, the Miami Federal Courthouse barriers use the afore-men-
to enter a parking structure, potentially saving countless dollars on tioned loop detectors. The loop detector holds the barrier open until
structural repairs. the last part of the vehicle has passed the closing loop, located beyond
Continuous Doppler Radar picks up instantaneous changes in ve- the unit. The detector then gives a pulse on departure, instructing the
locity and addresses the threat scenario in which an inbound vehicle barrier to rise after the vehicle has passed.
approaches at normal speeds and then accelerates to commence the
attack. It will also warn if a hidden vehicle suddenly passes a larger Vehicle Attacks: A Growing Threat
vehicle and attempts an attack. Once alerted, the guards can take ac- Although the obvious goal of such a system is to protect when as-
tion, including raising the barrier systems. saulted, the larger objective for the system is to deter. Barriers, bol-
Security equipment for parking facilities ranges from tire-punctur- lards and other vehicle control equipment discourage attempts to
ing devices to simple swing arm gates to pop-up crash barriers built cause harm and encourage employees and visitors to feel secure.
into the roadway that will stop errant vehicles dead in their tracks. Whether building a new parking structure, or retrofitting an old
one, there are a myriad of ways to protect people and property by
Use the Barrier You Choose using everything from common sense design to the latest technol-
Today’s barriers and bollards are capable of stopping and destroy- ogy innovations. When integrated properly into a total system, in-
ing a truck weighing up to 65,000 pounds and traveling at 50 mph. cluding fences, lights, alarms, gates and other security components,
Such barricades can be raised or lowered at will to stop traffic or let it well planned vehicle barrier systems are a key measure in preventing
through. In an emergency, the thick steel plates or bollards pop out of threats to sensitive resources.
the ground within 1.5 seconds. It’s critically important to consider supplemental gate and fenc-
With any barrier system, frequency of operation is also a key con- ing reinforcements that may be necessary to optimize vehicle bar-
sideration. For example, a sliding gate would not be practical for a rier effectiveness. Failing to understand this aspect, and not using the
business that requires admitting and releasing hundreds of employee proper equipment to counter the threat, may lead to a false sense of
cars per day. In reality, due to the inconvenience to the employees, security.
most operators would simply leave the gate open.
With vehicle barriers, the most common security breach is tail- Greg Hamm is the vice president of sales & marketing at Delta Scientific.
View the Full Product Line at comnet.net and Identify the Fiber Optic, Copper
or Wireless Connectivity Solution for your Application
Contact the ComNet Design Center Now for Free Design Assistance.
Call 1-888-678-9427 or 1-203-796-5300 or email designcenter@comnet.net
W W W . S E C U R I T Y T O D A Y. C O M 27
jamesteohart/Shutterstock.com
Ushering in a New Era
Consumers are more concerned with how their activities are being tracked
By Neil Huntingdon
P
rivacy issues continue to dominate headlines as The Next Generation of Security
the world’s biggest companies are being chal- Lidar technology promises to usher in a new era of anonymized
lenged on the ways they collect and use people’s security. While lidar is best known for enabling cars to autono-
data. Consumers are growing more concerned mously navigate, lidar is ideal for a wide range of use cases includ-
about how their activities are being tracked across ing security, industrial, IoT, mapping and transport applications.
the web as companies sell information to advertisers for a profit. Lidar works by using lasers to calculate the distance between
At the same time, the public is worried about how different itself and other objects. This creates a point cloud with a three-
types of technologies are tracking them offline. Facial recognition dimensional representation of people and objects in an area.
technology, powered by artificial intelligence to match images With its high-resolution imaging, lidar offers a number of ad-
against various databases, has become particularly controversial. vantages over both traditional security systems and modern facial
While consumers are fine with some implementations of facial recognition systems. However, the biggest differentiator is that
recognition technology, such as unlocking their smartphone or lidar enables robust surveillance while still protecting people’s
tagging their friends in photo albums, the bigger concern is how privacy. With the ability to detect, track and classify objects, li-
it could be used for surveillance. dar systems can be configured to only highlight potential threats,
In May, San Francisco banned the use of facial recognition guaranteeing the anonymity of people or objects not deemed a
technology by city agencies, as legislators argued that the technol- threat. While lidar does not show facial features, the imaging data
ogy infringes on people’s privacy. Other cities are also considering is high resolution and 3D, providing valuable information about
regulating facial recognition technology as the debate around it an object’s location, velocity and size.
continues to heat up. As businesses look to upgrade their security Compared to current technologies where everyone’s biometric
systems, privacy concerns will increasingly be a key factor in pur- data is captured and stored, regardless of whether they are in-
chasing decisions. So what alternatives do businesses have as they volved in a security incident, lidar is a considerable step forward
work to keep people safe and protect their assets? for anonymized surveillance.
28 1 0 1 9 | S E C U R I T Y T O D AY
WINNER
Residential &
Monitoring
Solutions
30 1 0 1 9 | S E C U R I T Y T O D AY
CM
MY
CY
CMY
DON’T MESS
AROUND WITH
WIMPY SECURITY
BrandonKleinVideo/Shutterstock.com
Changing the Look of Security
Analytics can make searching video possible in real time, and what this means for you
V
By Jennifer Hackenburg
ideo analytics have been around almost as into the consumer surveillance market (see Nest, Ring).
long as CCTV itself, rescuing security opera- On the camera and recorder side, better hardware lets devices
tors from the nearly impossible task of contin- react to event detection faster and more accurately. An increase
uously and effectively monitoring video sur- in processing power allows for more sophisticated analytics at
veillance feeds. The concept of video analytics the edge. Inexpensive recorders work in conjunction and provide
is simple enough: algorithms allow a device to analyze video in sophisticated suites of analytical capability. Now the only thing
real time and send alerts to the user. keeping end users from adopting video analytics is education.
Analytics can also categorize aspects of recorded video so it is
more easily searchable. While modern technology has made ana- Breaking the Barriers to Adoption
lytics more accurate and more affordable than ever before, we are One of the most basic barriers that prevents users from incorpo-
still seeing some barriers to adoption. Here is how video analytics rating analytics into their security system is lack of understand-
are changing the way we look at security, and how you can lever- ing. “Video content analysis” gets lost amongst buzzwords like
age this to provide more value to your customers. “Artificial Intelligence (AI)” and “deep learning.” It is important
to distinguish video analytics from the more advanced forms of
History of Video Content Analysis AI. Technically, AI means “getting a machine to mimic human
One of the earliest developed iterations of video analytics was behavior in some way.”
motion detection. While video surveillance systems did correctly Most video security equipment today uses rule-based analyt-
identify suspicious motion within a scene, such as that of an in- ics, and at the edge (embedded into cameras). This form of AI
truder, they were also great at identifying tree branches blowing does not improve their analysis and accuracy through continued
in the wind, or rain falling in front of the camera lens. The preva- examination of data.
lence of false alarms gave video analytics a bad rap, and rightfully Rule-based analytics are a cost-effective solution that enables
so. Like the boy who cried wolf, video analytics were so unreliable the system to examine many events and objects simultaneously in
that camera operators started ignoring them–defeating the pur- a way that would be impractical or impossible for humans to do.
pose of having analytics at all. However, rule-based analytics do not have the cognitive ability to
Advances in hardware and software greatly improved accuracy, interpret activity as well as humans can.
but for a time, the highest-performing analytics were only available The prevalence of video content analysis in procedural foren-
in the most expensive equipment. Fast forward to today, where an- sics crime dramas on TV has also negatively impacted the practi-
alytics have become mature enough that we are seeing them creep cal application of video analytics in real-life situations. The hopes
32 1 0 1 9 | S E C U R I T Y T O D AY
ALARM MONITORING
EMERgency24
999 East Touhy Avenue, Suite 500 ®
1.800.800.3624 | EMERgency24.com
Go to http://sp.hotims.com and enter 18 for product information.
an avid crime show watcher may have for their video surveillance “Video analytics are truly chang-
system can be unrealistic. This “CSI effect” means that integra-
tors should set expectations early on and focus on educating the ing the way we use security. They
user what the system can do instead of cannot do. turn our security cameras into data
collectors that help businesses run
How Analytics Improve
Return on Investment more smoothly.”
Given the innovative abilities of today’s surveillance systems, us- nightclub or bar lets security staff know when the establishment
ers should be looking beyond simply getting a clear picture. They is approaching the capacity defined by fire code.
should be striving for a system that arms them with intelligence
during the process of capturing video. This means not only in- Search and Review
stalling devices with analytical abilities but learning how to use Metadata – a set of data that describes and gives information
those functions as well. about other data – collected through video analytics helps cat-
A simple sales pitch is that video analytics improve the ability egorize and organize footage so that it is easier to search. When
of a surveillance system to detect specific events in real time, and there is no known event to search for, surveillance systems pro-
permit the user to easily search footage upon playback. Utilizing duce a seemingly endless amount of camera footage and histori-
video analytics has an array of benefits: making the system op- cal data that is not viewed at all. Now, video analytics allow for
erate more efficiently, reducing manpower requirements, provid- certain attributes to get tagged to the footage before it gets stored
ing business intelligence (such as improving customer service or on the recorder. For example, face capture functionality can also
better understanding staffing requirements), hastening forensic store facial attribute metadata – such as gender, age, expression
analysis and enhancing detection accuracy. and whether the person is wearing glasses and/or has facial hair
All of these attributes add up to increased ROI for the user, – along with a snapshot of the face. Once such metadata is intro-
who can get more out of their security system and share the se- duced, smart search is possible.
curity budget across multiple areas of the business. This is an Smart search opens a world of possibilities in locating very
incredibly significant selling point to someone who is investing specific footage. Operators can find, say, vehicles detected in a
thousands or even millions of dollars into video surveillance. tripwire area on a certain evening, or use the facial attributes
function to display all clean-shaven people with glasses who
Analytics at the Edge passed through a particular train station in the past week. This
Thanks to the hardware improvements and more accurate algo- will yield a thumbnail gallery you can examine in minutes rather
rithms mentioned earlier, many highly-effective video analytics than hours. Shortcuts like these let users efficiently review the
are available at even the lowest price points. Among the analytics data they have and glean deeper information from it.
that are most widely available are camera-based analytics, also Video analytics have given rise to an exciting advancement
called edge analytics. These are particularly well-suited to chal- in playback: a time-compressed view where moving objects are
lenging locations or budgets because they require lower band- tagged with the time of day, such as BriefCam’s VIDEO SYN-
width and fewer servers. In addition, they are easily implemented OPSIS and RapidRecap from Lorex. A report of a thirty-minute
in real time. The line crossing / tripwire function is one of the sequence, for example, generates a video synopsis that is only 53
most commonly deployed edge analytics. seconds long because the view simultaneously displays events that
Expanding upon line crossing is perimeter protection, where have occurred at different times. People and vehicles that move in
analytics support detection of invasion in a defined area. Well- and out of the field of view are superimposed on a stationary
suited for industrial parks, school campuses, factories and ware- background along with a time stamp “affixed” to them. It’s a fas-
houses; perimeter protection employs algorithms that differenti- cinating glimpse into the future conveniences video analytics may
ate humans and vehicles. For example, enabling an object filter have yet to offer.
and selecting “human” will tell the system to send an alert when
humans are detected and ignore vehicles and animals. Another It is Up to Us
filter could detect if vehicles are entering pedestrian areas and Video analytics are truly changing the way we use security. They
vice versa. turn our security cameras into data collectors that help businesses
Today’s perimeter protection solutions have achieved better run more smoothly. They save time by only giving us the infor-
accuracy than previous versions, where frequent false alarms mation we need, whether we need to know about it as soon as it
were caused by environmental conditions or wild/stray animals. occurs, or after the moment has passed.
People counting is another easy-to-use edge analytic. The Now that analytics are less likely to produce false alarms and
operational capabilities of people counting give users valuable are more widely available in budget-friendly products, a growing
data to run businesses, such as discerning how many people are number of end users can benefit from them. It
gathering in a given area and even keeping track of how much is up to us, the manufacturers and installers,
time they have been standing there. By setting rules to trigger an to clear up misconceptions and show the true
alarm if, say, three or more people stand in line at the grocery value that analytics can provide.
store for more than three minutes, store managers can be instant-
ly alerted when they need to send more staff to the cash registers Jennifer Hackenburg is the senior product mar-
and reduce wait times. Using people counting at the entrance to a keting manager at Dahua.
34 1 0 1 9 | S E C U R I T Y T O D AY
W
By Jim Ryan
hile the political discussions that focus on huge machines can now be put into handheld devices that are
how to secure America’s borders rage on ultra-portable, effective and safe, like X-ray screening tools that
without a clear resolution regarding what let officers see into sealed areas of vehicles. Handheld-screening
or how policies and procedures could tools have already been deployed and are currently in use by law
change, one element of the discussion re- enforcement officials throughout the country and at the southern
mains clear and present–that technology must and will play an border. Searches, which traditionally require officials to manually
ever more significant role at the U.S. border. dismantle a vehicle over the course of hours, can now be com-
pleted in minutes.
Managing the Border Similar technology found in handheld x-ray screening tools
The job of managing daily border crossings includes screening is now being scaled up into full, drive-though vehicle portal so-
vehicles, pedestrian traffic and fleets of trucks for contraband lutions that will help officers find more contraband like this, al-
like cash, weapons and drugs at a speed that protects U.S. citi- lowing officials to remove inventory and dollars from the illegal
zens as well as the half a trillion dollars in annual trade between drug-trafficking industry and even make human trafficking much
the United States and Mexico. Customs and Border Protection more difficult. The objective of these portal systems is 100 per-
(CBP) screens between half a million and a million pedestrians cent inspection. Similar to how today’s airport checkpoint scans
and 400,000 vehicles through 330 ports of entry across 2,000 all carry-on baggage, drive-through portals at the border will ef-
miles every day. fectively scan all passenger and commercial vehicles for increased
It is a daunting task where the stakes are high with an average security and efficiency. Demonstrations for these portal solutions
of 130 Americans daily falling prey to an opioid epidemic that is will be starting in the coming months to select the optimal-secu-
now being fed by synthetic opioids like fentanyl that can be fatal rity solutions for a decade (plus) of investment.
in very small doses. CBP officers and law enforcement officers As an industry, the expectation is that congressional funding
risk their lives and risk exposure to these substances daily in or- mechanisms will recognize the benefits of putting dollars toward
der to perform their jobs. But new technologies and new develop- further development of solutions that can be part of a multi-lay-
ments in technology could change all of that. ered system, solutions that use open-source architecture (so they
Technology at the border is good news for the good guys and can learn to talk to each other), solutions that utilize AI and ma-
bad news for the bad guys. chine learning to rapidly analyze and integrate massive amounts
Innovations in security technology are coming faster and of data, and set new standards in border security technology.
faster, integrating capabilities that were developed for other envi-
ronments including consumer products–facial recognition tech- The Role of Small Business and Innovation
nology for instance has clear application for security. But what Security technology is big business, and research and develop-
if it were possible to develop parallel technologies like vehicle ment does not come without cost. However, research and de-
recognition software that does not rely on license plates or VIN velopment (R&D) is the key factor in getting real innovation
numbers to identify specific vehicles? to the marketplace. While companies in the United States now
What if certain materials that are commonly used to disguise outsource so much of manufacturing, innovation is still one of
contraband or fool current technology could be identified and the our most significant domestic products and one of our most im-
mere presence of that material in a vehicle could alert officers to portant exports with small businesses accounting for significant
a problem? What if the 400,000 vehicles that need to be screened advances in industries including homeland security technology.
every day could go through a portal that could detect those items Engineering (rather than financial engineering) focuses on devel-
of concern and accurately clear other vehicles? oping new solutions to old problems that change the landscape of
And what if all of those factors could be identified across the the security industry every year.
330 points of entry, forming an integrated, multi-layered technol- While consumer technologies like Ring doorbells, smart ther-
ogy net that could make it easier and faster for everyone to cross mostats and Alexa-enabled household devices come into homes
the border and preserve or accelerate the “speed of commerce” as and get smarter and gain new functions; facial-recognition tech-
it is sometimes called? That would be good news for people who nology matched with vehicle-recognition technology, handheld X-
are legitimately crossing the border and bad news for those with ray technology that can see through steel and other materials in
nefarious purposes. And that is what is happening. vehicles, and full drive-through vehicle portals
are coming to the security industry. This level of
The Future is Now innovation will form that protective-technology
Security solutions that are capable of functioning on their own net that can catch the bad actors while letting
or as part of a multi-layered solution are already in use, and ad- everyone else be about their business.
ditional advancements are in development. New innovations that
shrink and ruggedize technology that once was only available in Jim Ryan is the CEO of Viken Detection.
36 1 0 1 9 | S E C U R I T Y T O D AY
C
loud storage is most used by small-and-medium stored on premise, a natural boundary is created against unau-
businesses (SMBs). The reason is that it comes thorised access by the need to be physically present in the office
with many benefits for organizations in terms of to access the data. For remote employees or partners using VPN,
flexibility and more importantly productivity. access can be restricted to specific devices only. On the contrary,
However, it also comes with a number of once your data is stored in the cloud, it can be accessed from any-
technical-and-human risks that worries a majority of SMBs. A where in the world and on any device, significantly increasing the
recent research shows that 61 percent of SMBs believe their data chance of unauthorised access.
in unsafe in the cloud. Let us see the reasons why and what they The second risk pertains to employees stealing data before
can do about it. they leave the job. For the exact same reasons, it is easier for
them to do so when data is stored in the cloud and much harder
Technical Risks for the IT team to detect or stop it.
What is worrying SMBs is that when you store your data in the The third risk has to do with complex hybrid-storage envi-
cloud, you are not in control of it anymore, so they find it pretty ronment (mix of on premise and cloud storage). Working with
hard to trust a third party with their valuable information. a hybrid environment increases productivity but makes manag-
The first technical risk concerns detecting unauthorised ac- ing the security of the data stored across multiple environments
cess. It is harder when your data in stored in the cloud. When very hard.
38 1 0 1 9 | S E C U R I T Y T O D AY
BULLETRESISTANT•ARCHITECTURAL•SECURITYBOOTHS•GATEHOUSES
PARKUT.COM
800.394.6599
Go to http://sp.hotims.com and enter 22 for product information.
Find out about our new physical identity and access management software at genetec.com/ClearID
Go to http://sp.hotims.com and enter 17 for product information.
R
ecent hacks into databases of some of the world’s “We need to employ tools readily
biggest corporations and government organiza-
tions put the personal information of billions of
available to restore citizens’ sense
people at risk. Data intended to remain private is of privacy whether they are com-
showing up for sale on the internet, privacy has pleting an online transaction or
become a worldwide concern, and citizens are losing faith in the
way their data is collected, stored and protected. engaging with a security system.”
The European Union took a big step last year to ease its citi- the card or entering a Personal Identification Number (PIN) has
zen’s concerns with the enaction of the General Data Protection been authorized to do so.
Regulation (GDPR). EU residents now have much more control This is where biometrics can play an important role in secur-
over their personal information. The GDPR requires they know ing databases. Passwords, cards and PINs can be hacked, shared
what data is being collected, how it is being used and how they or stolen; a biometric identifier cannot. Biometrics offer a way
can opt in, not out, of a company’s database. for our industry to meet security goals for the protection of data
What constitutes personal data? That’s broadly defined to in- while also restoring public confidence.
clude just about anything that could be used to identify a person, Biometrics involve the measurement of physical characteristics,
including name, home and email addresses, birthdate, driver li- something only the owner can possess. The most commonly used
cense number, gender, race, political affiliations and much more. biometrics include iris patterns, fingerprints and facial recognition.
Although the GDPR specifically applies to nations within the Combining biometric and access readers or a keypad at the PC cre-
EU, it has worldwide implications. Any organization, no matter ates true two-factor authentication. Passwords can be eliminated
where it’s based, that collects data gathered from an EU citizen while the database remains accessible only to authorized users.
must comply with the regulation. Failure to do so can result in The use of biometric technologies is now commonplace
penalties of up to €20 million or 4 percent of a company’s annual worldwide. You see them embedded in smartphones, at border
global revenue. crossings and in use for time and attendance, national ID cards,
The European privacy movement has sparked a worldwide voter registration and more. Biometric readers can also authenti-
response. In the U.S., more than 10 states have enacted tougher cate consumers registering for websites or making purchases on
regulations to protect its citizens’ personal data. Perhaps the most the internet.
GDPR-like will take effect on January 1 in California. Online Among the major biometric technologies, iris recognition is
sites will be required to conspicuously post a “Do Not Sell My widely considered the most accurate. No two people, even identi-
Personal Information” link. Parental consent will be required be- cal twins, have the same iris patterns. The technology works with
fore selling data about a child under the age of 13. people wearing glasses, contact lenses and safety goggles. It’s not
The security industry was not a prime target of the GDPR, but affected by grease, dirt or scars as are fingerprint readers. Iris
it will feel an impact in the way organizations collect and use video technology works with very large databases where facial recogni-
surveillance and access control data. In the EU, video is considered tion has been shown to be less effective.
to be personal data belonging to those captured in live or recorded GDPR and its goals have arrived with the simple concept
images. By its nature, access control requires personal information that citizens have a right to know the information being collected
from employees and vendors in return for a pass to enter facilities. about them, how it is used and be provided with an easy way to
Organizations must have clearly defined goals for its security delete their data at any time.
functions. That means being ready to explain camera placements, The security industry should see GDPR and efforts at the state
what images they expect to capture, and how the video will be level in the U.S. as driving positive changes and eliminating inef-
used, stored and shared. How video will be shared may be the ficient data protection efforts. At the same time, we need to employ
most critical component. tools readily available to restore citizens’ sense of privacy whether
Strict cybersecurity controls are required to ensure security- they are completing an online transaction or
related data can be viewed only by authorized personnel that may engaging with a security system. A failure to
include corporate staff, law enforcement or even a hosted or man- act now may result in a more severe backlash
aged service provider or central monitoring station. that could negatively impact how we protect
It is obvious passwords protecting data can be hacked. They people and their personal data.
can also be shared.
Adding a card reader or keypad to a workstation provides a Mohammed Murad is vice president, global
second layer of security. Yet there’s no guarantee the person using development and sales for Iris ID.
42 1 0 1 9 | S E C U R I T Y T O D AY
FACT: while your old style telephone line may still be working
with your Telephone Entry System, telecommunication
companies are switching to a fiber and digital infrastructure
which often makes programming these systems via modem
communications a challenge – if not impossible.
The good news is that you can keep your existing Telephone
Entry System and upgrade it to a cellular connection with
DKS Cellular. Besides getting 4G LTE service, DKS Cellular
can save you money in two ways. 1) There’s no need to
replace your existing Telephone Entry System, and 2) The
monthly cost of the DKS Cellular service is typically half the
cost of a business telephone line.
Easily retrofit existing
DKS 1800 Series
Even more good news: the best part about retrofitting
Telephone Access Control Systems
ystems your Telephone Entry System connection service with DKS
with Cellular Connectivity and help your is there’s no digging or trenching – just plug it in and activate
customers stay active. the service!
Member: AFA, DASMA, NAA, IDA, NOMMA, NPA, SIA, SSA, CANASA 800-673-3299 info@doorking.com
Go to http://sp.hotims.com and enter 16 for product information.
Door and Gate Controller Power Harvesting Wireless System 4K Dome Camera
ProdataKey has introduced its “pedestal io” door Camden has launched its newest offering in the Vicon has introduced its new SN688D-WIR PTZ
and gate controller, which is designed for use in wireless market with the Kinetic by Camden “pow- dome camera, offering 4K resolution and highly-
all-weather outdoor applications. The controller is er harvesting” wireless system. The product uses detailed image quality to large area surveillance op-
ideal for securing parking lots, gated communi- the energy created by the operation of the switch erations. In addition, the camera offers high-speed
ties, storage facilities and other exposed outdoor to power the wireless transmitter. No batteries are pan/tilt and zoom functions alongside 360-degree
locations. Compatible with any ProdataKey cloud- required to maintain or replace the system. Kinetic rotation that allow the camera to quickly move and
based, network or wireless access control system, also does not generate hazardous waste, which focus on different objects in a scene. The product
the unit can be mounted quickly to goosenecks or makes the product greener and less harmful to the also features an autoiris lens that maintains proper
walls and comes ready for plug-and-play installa- environment. The company says Kinetic is the only light levels to provide high video quality under di-
tion. The product can come with an optional rug- “power harvesting” wireless system to feature an verse and changing outdoor lighting conditions. De-
gedized touchpad reader to work with proximity ultra-compact receiver with field selectable mo- signed for both day and night conditions, the cam-
cards or fobs. Two reader inputs support applica- mentary, delayed or latching relay operation. Ki- era has a removable IR cut filter for superior image
tions that require credential presentation, and the netic is also designed to be installed in automatic quality that can be adjusted depending on time of
second reader input can also be assigned to trig- door operator cabinets. Designed for both indoor day. Synchronized IR LEDs automatically adjust in-
ger automated events. Instant alerts can be sent and outdoor applications, the product could be de- tensity with the optical zoom of the lens, making
to managers either on their screens or via text or ployed for reliable door activation in any commer- the camera more versatile in case operators decide
email if any issues arise. cial, industrial or institutional application. to change its permanent location.
Go to sp.hotims.com and enter Go to sp.hotims.com and enter Go to sp.hotims.com and enter
300 for product information. 301 for product information. 302 for product information.
44 1 0 1 9 | S E C U R I T Y T O D AY
Security, Alarm and Control Cables Guard Tour System Worker Safety App
Remee Wire & Cable announced the launch of its TrackTik Software announced the launch of its Vismo announced the launch of its app-based Lone
expanded line of security, alarm and control cables, guard tour system, which uses automation for se- Worker Safety Solution at GSX. The app allows em-
featuring the Vigilance Series. The cables, which curity workforce management. The software allows ployees who are working alone to activate a panic
can be used in commercial and residential mar- security managers schedule staff, send out alerts, button if they feel like they are in danger. Once the
kets, can be used in security and alarm systems. log incident reports and send out messages in real panic button is pushed, the administration teams
The new Vigilance security and alarm cable prod- time. The system also features GPS tracking, which are notified of the user’s location. It also offers a
ucts include the 725 series, 900 & R00 series and can help guards enhance their operations by im- timed check-in and check-out function. The feature
a Video/CCTV series. The electronic wire and cable proving transparency and accountability. It can pro- works by automatically alerting the administration
company also includes control cables for lighting, vide a live picture of the security environment in team when the time frame expires, or has not been
window shade and temperature controls. The light- which security staff are operating. Through watch deactivated by the lone worker. The team can then
ing cables have been designed to be compatible mode, security managers are able to inform staff contact the employee and see if they are in danger,
with several automation systems including Elan of dangerous situations, which could help staff pre- or will be. The function can be customized to in-
and Lutron. All of the lighting cables are Plenum- pare or avoid high-risk situations. Special protocols dividual employees or job roles by administrators.
rated with RemGuard Plenum Polymer jackets. In for specific locations can be assign and permitted The app helps eliminate the risk of working alone
addition to the Vigilance line, the company also of- and restricted zones established. The software is and without constant communication with their
fers fire alarm cables and LAN & premise cables. aimed to be “a coach in their back pocket.” management team.
Go to sp.hotims.com and enter Go to sp.hotims.com and enter Go to sp.hotims.com and enter
309 for product information. 310 for product information. 311 for product information.
46 1 0 1 9 | S E C U R I T Y T O D AY
59
ble!
$
• Works with outward and inward
95
swing doors
• No need to replace existing
hardware
• One time solution - easy to install ea.
• Lockdown in seconds
classroomlockdown.com
1-855-644-4856 TOLL FREE
Go to http://sp.hotims.com and enter 30 for product information.
Info No. Company Name Page Info No. Company Name Page Info No. Company Name Page
ADVERTISERS 21........ Hanwha Techwin America............................... 35 309...... Remee Wire & Cable....................................... 46
9.......... Altronix............................................................. 2
30........ Nightlock........................................................ 47 306...... Security Engineered Machinery Co., Inc.......... 46
10........ Alula............................................................... 29
22........ Par-Kut International, Inc................................. 39 310...... TrackTik Software........................................... 46
1.......... DSX Access Systems...................................... 52 301...... Camden.......................................................... 44 ............ Garrett Metal Detectors..................................... 2
18........ EMERgency 24................................................ 33 307...... Hanwha Techwin America............................... 46 ............ Identiv Group.................................................. 13
17........ Genetec Inc..................................................... 41 305...... Rekor Systems................................................ 44 ............ Security Today Academy................................... 9
Reprints: For single article reprints List Rentals: This publication’s Media Kits: Direct your Media Kit
(in minimum quantities of 250-500), subscriber list, as well as other lists requests to Lynda Brown, (972) 687-6710
e-prints, plaques and posters contact: from 1105 Media, Inc., is available for (phone), (972) 687-6750 (fax),
PARS International rental. For more information, please lbrown@1105media.com
(212) 221-9595 contact our list manager, Jane Long,
1105reprints@parsintl.com Merit Direct. (913) 685-1301;
www.1105Reprints.com jlong@meritdirect.com;
www.meritdirect.com/1105
A Global Solution
How OSDP is changing the access control market
O
SDP, or Open Supervised Device Protocol, is
an access control communications standard de-
signed to improve interoperability among access
control and security products, and it’s becoming
the new standard for access control technology.
According to The Security Industry Association (SIA), the prod-
uct is more secure than the most common access control commu-
nications protocol and supports high-end AES-128 encryption,
which is required in federal government applications. In addition,
OSDP meets federal access control standards such as Public Key
Infrastructure (PKI) for Federal Identity Credential and Access
Management (FICAM).
Paul Ahern, president and CEO of Cypress Integration Solu-
tions, said that as this technology starts to become the standard,
Cypress is finding ways to step into the market, primarily by
Brian A Jackson/Shutterstock.com
reaching out to a global OSDP market.
Ahern has personally been working with OSDP for about
eight years. The technology is not brand new, but it has recently
started becoming more mainstream. When the market for key
card access control systems grew rapidly, manufacturers did not
have much time to focus on how to make the system as secure as
possible, Ahern said. In the process, some of the security a physi-
cal key brought was lost, and now, OSDP is bringing that security
back to the market. “I’m hearing more and more questions about [OSDP],” Ahern
While the technology is easily accessible in the U.S., there is said. “People are starting to take it more seriously, and it’s some-
a serious gap in the global OSDP market, according to Ahern. thing that we’re passionate about getting out to the market.”
“OSDP is a new standard in the industry that’s being adopted With so many questions surrounding the technology, Ahern
as a more secure way of communicating in access control of se- said it’s an excellent time to step into the market and address
curity systems,” Ahern said. “We’ve kind of taken a lead role in the concerns on a global level. To do this, Cypress is developing
developing products that will allow that technology to go forward products to make it easier for organizations to adopt the standard
and allow end users, integrators and manufacturers to speed up globally.
adoption of that new protocol, or that new standard.” Ahern said one of the steps the company has taken to ensure
In the past few years, Ahern has been traveling to global trade the products can be used internationally is to make sure the wire-
shows in an evangelizing mode to see if the market needed what less frequencies they use on their wireless products are allowed in
the company had to offer in terms of OSDP. Based on those ef- countries overseas. In addition, the company makes sure that it
forts, he said the company has been able to grow business sig- sources the connectors they ship overseas.
nificantly overseas, bringing them into the global market just by This is one of the primary goals of Cypress’ current research
talking to individuals. and development for future products. The company is continu-
To continue these efforts and grow the success of the global mar- ously studying the development of OSDP and the adoption of
ket push, Cypress decided to exhibit globally at the IFSEC Interna- the technology in hopes of discovering easy migrations paths
tional Security Event & Conference in London this past summer. from older technologies to OSDP. This will allow for easy transi-
It was the first time Cypress exhibited outside of the United States. tions of technology for organizations and companies around the
”We thought, if we’re going to be serious about this, we need world.
to let everybody know what’s going on,” Ahern said. “So, we de- “We’ve been successful in the U.S. market for 36 years, we’ve
cided this year was going to be our first year to do an interna- been somewhat successful in the European market for about eight
tional show.” years, and we’re just seeing a great opportunity now,” Ahern said.
Many of the questions Ahern was asked at IFSEC were in re- “We think it’s the right time to strike.”
gards to OSDP. Companies in attendance were wondering where
Cypress saw the OSDP market going and how they could be more Kaitlyn DeHaven is a former associate content editor for Security
successful in implementing this protocol. Today magazine.
50 1 0 1 9 | S E C U R I T Y T O D AY
Your transmission challenge has always been getting your audio, video,
data and ethernet signals from here to there.
Visit us at ISC East 2019 | New York City | Booth 718 | 20-21 November
Campus Security
& Life Safety
campuslifesecurity.com
Security Technology
is a Top Priority
CM
MY
CY
CMY
DON’T MESS
AROUND WITH
WIMPY SECURITY Visit us at GSX, Booth #1871
cover story
features
20 Securing Campuses
Confronting Active Shooters
Five tips for implementing shot detection technology
By Thomas W. Connell II
24 Campus Technology
Teaching Evolution
Security’s growth and innovation in the education sector
By Lynn Wood
28 Best Practices
Meeting Today’s School Safety Challenges
8 Unsung Security Giving staff a voice to ensure employees have
HERO Unit Provides School Security healthy working conditions
Nationwide school shootings prompt formation By Michael Sander and Tom Strasburger
of safety team
32 Best Practices
By Rob Moore
Perimeter Protection
10 Security Partnership Security solution advances drive re-evaluation
A Crucial Collaboration of campus security
How police departments and integrators can come together By Bruce Canal
in partnerships for the well-being of the communities
By Kaitlyn DeHaven departments
14 Data Challenge 6 Editor’s Commentary
Intelligent Campuses Require an Run, Hide and Let Law Enforcement Fight
Advanced Security Strategy By Ralph C. Jensen
The digital revolution has opened the door to a
flurry of incoming data from numerous entities
By Jeffrey Lewis
ART STAFF
Run, Hide and Let Law Enforcement Fight Art Director Dale Chinn
I
PRODUCTION STAFF
n May of this year, Florida’s House of Representatives passed a bill so controversial that Production Coordinator Teresa Antonio
a clear line of sides was drawn. The bill was already approved by the state’s Senate and EDITORIAL ADVISORY BOARD
will now permit classroom teachers to carry guns … in school. Gov. Ron DeSantis (R) Mike Seger, Director of Safety and Student Services at
has signed the bill and teachers can carry guns. It’s the law. Penn-Harris-Madison School Corp., Mishawaka, IN
Republicans favor the bill, citing a commission’s recommendation to allow teachers to Jeff Karpovich, CPP, CHPA, Chief Director of Security & Trasportation at High
be armed. Following the mass shooting at Marjory Stoneman Douglas High School in 2018, this Point University, High Point, NC
panel studied the concept of arming educators. Joseph Souza, Director of Security and Technology at University of Florida,
Gainesville, FL
State Sen. Oscar Braynon (D) cited his concerns about bringing guns to campuses in areas
Alison Kiss, Executive Director at Clery Center, Strafford, PA
that are already flooded with firearms. Braynon’s district includes part of Broward and Miami-
Dade counties. SALES
“I unfortunately have to deal with parents who have lost children often because this gun vio- Sam Baird +44 1883 715 697
lence is prevalent in my community,” said Braynon, who voted against the bill. “A gun being in a Randy Easton 678-591-2822
classroom, however it is that they’re planning to do it … just the concept brings a different envi- Brian Rendine 972-687-6761
ronment for those children.”
INFRASTRUCTURE SOLUTIONS GROUP
In a similar fashion, Utah is one of 14 states where teachers can carry a gun at school. Follow-
President & Group Publisher Kevin O’Grady
ing the shooting that killed 17 people in Parkland, Rowdy’s Range, I n Hurricane, UT, started
Editor-in-Chief/
offering the class – which normally costs almost $800 – is free of charge to teachers. Associate Publisher, Security Ralph C. Jensen
One of the Utah course instructors, Brett Pruitt, 38, believes that teachers have the right to be Group Circulation Director Irene Fincher
armed if they choose: “We give our children to educators for four to six hours a day and trust Group Marketing Director Susan May
them with their safety. My personal opinion is we should give them the means to [keep those Group Website Manager Scott Newhouse
children safe].” Group Webinar Administrator Tammy Renne
The lines of pro and con are pretty clearly drawn. Like just about anything these days, the
debate of arming teachers is highly charged and most often emotional. How would you feel if
your child’s teacher had a gun in the classroom? Would you feel better or feel that your child is
more protected?
Utah law allows licensed gun owners to bring their concealed weapons in public schools, and Chief Executive Officer Rajeev Kapur
is one of several states in the country, including Florida and Texas, to do so. Chief Financial Officer Sanjay Tanwani
“If teachers are going to be bringing firearms into schools, let’s make sure they know how to Chief Technology Officer Erik A. Lindgren
handle them safely,” said Utah County Sheriff Mike Smith.
I thought a lot about this in late August as I took my granddaughter to her first day of school. Executive Vice President Michael J. Valenti
While most parents are as excited as any child would be, I walked into the school looking for
security solutions and devices. A teacher or administrator carrying a gun never crossed my
REACHING THE STAFF
mind. I do think, however, we should start with the basics. Close and lock the doors. When
Staff may be reached via email, telephone, fax or mail. A list
someone comes to the school, let’s keep that person in a vestibule or the office until credentials of editors and contact information also is available online at
can be verified. www.campuslifesecurity.com.
Schools, or more particularly, teachers in a school is no place for a weapon, even if that person E-mail: To e-mail any member of the staff, please use the
has undergone firearms training. I trust school resource officers with a gun, and they should have following form: FirstinitialLastname@1105media.com
them. I’m completely in favor of teachers doing what they do best … teaching, to include how to Dallas Office (weekdays, 8:30 a.m. – 5:30 p.m. CT)
react if an active shooter is on campus. All respect to teachers nationwide, but I would never Telephone (972) 687-6700; Fax (972) 687-6799
expect a classroom professional to be the one to fire a weapon. Let’s teach the student to run or 14901 Quorum Dr., Suite 425, Dallas, TX 75254
hide and allow law enforcement to fight back. Corporate Office (weekdays, 8:30 a.m. – 5:30 p.m. PT)
Telephone (818) 814-5200; Fax (818) 734-1522
6300 Canoga Avenue, Suite 1150, Woodland Hills, CA 91367
By Rob Moore
A
s the new school year wasn’t working basically.” transpire,” Speed said.
approaches, the Banks After looking at what was going on in the Speed and other officials are very quick to
County, Ga. Board of Edu- state, the region and the nation, Speed said say that most details of the program are con-
cation and Banks County he and Chief Deputy Shawn Wilson realized fidential to protect its integrity and effective-
Sheriff ’s Office are banking they couldn’t find something suited to Banks ness. That’s why specifics are guarded and
on a unique HERO Unit to add an unseen County’s needs. known only to those involved in the HERO
layer of security in the county’s schools. “That’s when Chief Wilson and myself sat Program and vested leadership.
The Heightened Enforcement Response down and talked about it at length and with “We have somebody in place in the system
Officer (HERO) Unit consists of specially his military background, we sat down and at locations within the school system that
trained and experienced deputies who talked about coming up with a solution to can respond at a moment’s notice,” Speed
receive specialized tailored HERO training. where we had somebody on premises at the said. “They also have the ability to monitor
“The HERO Unit provides the school sys- school system that if we did have an active the school system as a whole, not only from
tem with an instantaneous response by a shooter come into the school, we could one location but from multiple locations.”
heavily-armed, highly-trained, proactive respond with an efficiency to stop that per-
protection detail,” said Sheriff Carlton Speed. son in the fastest, most efficient manner Working Behind the Scenes
“Most deputies assigned are longtime law with keeping any devastation to a mini- But visitors to the schools should not expect
enforcement veterans with a former SWAT mum,” Speed said. “At that point, he sat to see members of the specialized unit or
or military background. The need for the down and talked to one of his good friends, even observe evidence of its existence.
HERO Unit became an increasingly apparent SWAT instructor Lt. Mark Gerrells in “The HERO program is designed to work
reality due to the frequency of nationwide Rabun County, GA.” behind the scenes, much like the personal
school shootings. As with many area schools, After brainstorming for a couple of weeks, facility detail assigned to the White House,”
our school system, along with the sheriff ’s Wilson and Gerrells presented their concept Wilson said.
office, has investigated several unsubstanti- to Speed. Hopkins said the program is worth any
ated threats against our school system after “We looked at it,” Speed said. “We went cost, as it increases the safety for the students
the 2018 Parkland High School incident.” back to the drawing table a couple of differ- and allows them to effectively teach.
ent times. We refined it. Then, when we had “It’s worth any cost, because they know
Getting Started something we thought we could work with, what they’re doing,” Hopkins said. “We pray,
When asked how the unit got its start, Speed we brought it down to the school system.” just like everybody else, that it never comes
explained it was in response to concerns to our door. You hope at the end of it you can
about how the sheriff ’s office could quickly Telling the Board say we paid for that, but that’s ok because
and efficiently address active threats in the When presenting it to the Banks County that’s exactly what we’re willing to do. We
county’s schools to minimize their impact. Board of Education, Speeds said he told the can’t teach our kids if they’re not safe, and
“We actually sat down as a group, the board, “We think it’s outside the box, but we they have to feel safe.”
sheriff ’s office to start with, and we tried to think it will work. Once we get this into place
come up with something outside the box in and go down this path, we think it’s the best Speed Agrees
case we did have a situation where we did thing out there.” Speed emphasized that it’s a partnership
have an active shooter in Banks County,” Speed commends Dr. Ann Hopkins, between law enforcement and educators.
Speed said. “We looked at everything around superintendent, and Dr. Hank Ramey, assis- Speed said the Banks County Board of
us in the region. We even had folks looking tant superintendent, for working with sher- Education pays 100 percent of the salary of
nationwide to see what people were putting iff ’s office leadership to bring the program each assigned HERO and SRO, while the
together to respond and see what kind of into being. sheriff ’s office provides the training and
situation they were putting their folks into, “We’ve been fortunate in the fact that all equipment.
how they were going to respond, what they the administrators, Dr. Hopkins and the pre- “While we think we’re the experts in edu-
were going to do. We were looking for an vious superintendent as well, were very cation, we’ve got to listen to what the
answer, because at that time we felt like it interested in seeing how this thing would experts in safety tell us,” Hopkins said.
By Kaitlyn DeHaven
A Crucial Collaboration
How police departments and integrators can come together
in partnerships for the well-being of their communities
Leonard Zhukovsky/Shutterstock.com
T
here are two essential components to effective school sion between police officials and integrators. After they had been sit-
safety—security systems and police response. For ting discussing security for a time, he began to understand the strain
years, the two have been divided and seen as two sepa- was on their relationships. He quickly came to the realization that the
rate entities—the first provided by integrators, and the strain came from the reality of police officials who weren’t communi-
second provided by the city or state police department. cating with integrators, even though they offered a multitude of
Chief Tom Weitzel, the Riverside, Illinois Police Department’s chief expertise in their areas. He said it felt as if each of the organizations—
of police, suggests that if the two were blended into a partnership, law enforcement and integrators—had proficiency in certain safety
security measures could become more effective than they are when fields, but neither of them wanted to look to the other for help.
working autonomously. Weitzel, who oversees security for the River- “I realized we really couldn’t do our job without their assistance
side school district, said that by bringing the two organizations when it comes to school safety, and even safety in general,” Weitzel
together, industry leaders and government officials can create a said. “There was this real disconnect between public law enforcement
school safety plan with better integration and communication. and the [integrators] that were there.”
Weitzel gave a presentation at the security conference, and after
Resolving the Tension presenting, he sat back down at his table. As soon as he returned, an
While speaking with some individuals from the security industry at a individual turned to Weitzel and told him that he had just been con-
conference last year, Weitzel realized there was an overwhelming ten- tracted to install the security cameras for Weitzel’s school district.
• Lock Down in seconds, with a simple key, • Classroom Locks in cylindrical or mortise
safely from inside the classroom, without lock styles, with unique double cylinder
having to step foot into the hall or danger locking mechanism
• Lockdown indicator gives visual peace of mind • Ultra Durable for Life -
• Retrofits any standard lock easily Lifetime warranty; exceeds
& very economically ANSI/BHMA Grade 1 standard
Get a Free LocDown Lock with Find out how safe your school is with a free
professional onsite survey & get a Free LocDown
Free SAVI™ Onsite Security Check: Lock** Sign up online at https://bit.ly/2IdzS1O
PD240
Hand-Held
Detector
EMIS-MAIL Scanner
“Security operators
must balance the high By Jeffrey Lewis
expectations for an
Intelligent Campuses
elevated and modernized
campus experience,
with the need to protect
what matters most.” Require An Advanced
A
lthough you may immedi-
ately think of educational
facilities when someone
says the word “campus,”
these environments can also
Security Strategy
The digital revolution has opened the door to a
be found across a host of other vertical mar-
kets, including healthcare, government and flurry of incoming data from numerous entities
business enterprises. Regardless of the spe-
cific market a campus fits into, the manage-
ment staff responsible for these facilities are
more focused on security than ever before.
Traditional risks, such as workplace violence,
terrorism and insider threats continue to
evolve, while combating cybersecurity
threats has gained importance when consid-
ering a comprehensive security strategy.
Campus leaders have a tremendous
responsibility in ensuring the protection of
what matters most to their organization—
students and faculty in a university setting,
patients and hospital personnel in a health-
care setting or corporate employees, custom-
ers and customer data in a business setting.
The stakes are high, and as the impact of
these threats on an organization rises, the
need for a real-time, predictive and compre-
hensive security strategy increases.
Untitled-2
0919css_CS014_015_Lewis_v2.indd 14 8/29/19 10:27 AM
and video surveillance often operate in silos. This makes it difficult leverage automation and advanced threat detection, information
for security leaders to access the information they need when they must be available and accessible anytime, anywhere. The proliferation
need it most. of mobile devices makes this possible and gives organizations more
The Intelligent Security Operations Center (ISOC) is critical to the ways to protect people, property and information in mission critical
success of an intelligent campus and can help address this issue. The environments.
ISOC aggregates multiple systems into a single interface and exposes For example, there are mobile applications available today that
it to an analytic layer that results in the delivery of actionable intelli- allow users to press a button on their mobile device and immediately
gence. The ISOC incorporates AI to provide data about what is hap- alert security to a threat. Operators in the central command center
pening across a campus’ domains and helps operators determine the can then open a line of communication with that user, obtain real-
impact to the organization. Over time, the ISOC’s ability to unify time video of what the user is witnessing, acquire their location and
incoming data and leverage machine learning to identify patterns and communicate with that user to update their status.
detect threats will help an organization take a more proactive Additionally, mobile video applications can help security officers
approach to their campus security needs. gain more insight to a situation when it occurs. These applications
can push data to their mobile devices in real time from first respond-
Automation ers, employees or citizens providing them with specific information
At the core of the ISOC is a level of automation that ultimately on a security incident. This helps the operator assess the risk and
increases efficiencies for campus leaders. It’s clear that for campuses respond quicker and more efficiently to the situation at hand. Overall,
to predict and identify threats in real time, actionable, intelligent data mobile capabilities add significant value to any organization’s security
analysis must take place to present a unified risk scenario to the strategy by providing more data to the security operators and extend-
appropriate operators. ing their reach far beyond the campus footprint.
Advanced analytic applications, in conjunction with enterprise The intelligent campus empowers organizations to be more effi-
class security software, address this by gathering, processing and ana- cient, effective and proactive in delivering best of breed services while
lyzing the data to deliver greater situational awareness and instant protecting people, property and information assets in today’s ever-
notifications to facilitate immediate action. These powerful solutions evolving risk environment. Security in an intelligent campus scenario
streamline investigations and empower operators to make rapid, is extremely complex. Security operators must balance the high
informed decisions without expensive infrastructure changes. expectations for an elevated and modernized campus experience,
with the need to protect what matters most. This type of environment
On the Go requires a comprehensive, coherent and cohesive security plan.
With the introduction of the smartphone, mobility has taken center
stage, even in the security industry. For campuses to stay ahead and Jeffrey Lewis is the vice president of marketing at Verint SIS.
G
ary Christian has been in K-12 campuses secure. That security starts at staff if a weapon has been detected.
law enforcement for 42 any given front entry. Detroit Public Schools
years, and he has never (DPS) has been using IPVideo’s ViewScan Making the Unknown, Known
had to fire his service for the past eight years with outstanding suc- Detroit schools have been faced with similar
weapon. He wants to keep cess. Crime has been reduced by 37 percent security issues as other schools nationwide.
it that way. After 32 years and a retirement as and even sharper declines in serious crime In the 2010-11 school year, a technology
a deputy chief of Detroit Police Department, by 61 percent. push was put in place, particularly at the
Christian has spent the past 10 years with ViewScan has been the cornerstone in high school level.
Detroit Public Schools, the largest school reducing campuses crime, including detect- “DPS was facing heavy crime and various
district in Michigan. ing a firearm. This technology has been vital- types of weapons coming into school,” said
There is no secret to his successes. He is, ly important for DPS as attendance has Rick Cadiz, the vice president of sales and
however, sold on the idea that using the best increased, and the solution is less intrusive, marketing at IPVideo Corp. “The school dis-
technology possible will assist in keeping replacing the unwanted physical pat down by trict had been facing a situation where atten-
59
ble!
$
• Works with outward and inward
95
swing doors
• No need to replace existing
hardware
• One time solution - easy to install ea.
• Lockdown in seconds
classroomlockdown.com
1-855-644-4856 TOLL FREE
Go to http://sp.hotims.com and enter 706 for product information.
A
ccording to a recent report from the DOJ and FBI, false alarms by providing dual—or even triple—sound authentica-
there were 27 active shooter incidents in the United tion. However, it can be a costlier solution because more sensors may
States in 2018, resulting in 85 deaths and 128 inju- need to be used. There is always the potential for false alarms regard-
ries. Of these incidents, 16 occurred in business less of the technology employed. There are single-factor systems with
environments, five occurred in educational build- a lower false alarm frequency than some multi-factor systems in the
ings and two occurred in healthcare facilities. marketplace today. It’s important to discuss the potential with the
These situations are differentiated from other gun-related situa- system providers and ask them how, and against what conditions and
tions because the FBI recognizes that in an active shooter situation, catalysts, their systems have been tested.
law enforcement and citizens have the potential to affect the outcome With single-factor acoustic detection, computer-based signal pro-
based on their responses. To aid law enforcement response and help cessing helps increase precision by analyzing a sound to determine if
reduce the impact of incidents, security and life safety technology it’s an actual gunshot or just another sound with similar characteris-
providers have recently started offering gunshot detection systems. tics. For example, a cymbal crash from a drum set, which could be
Today’s schools, businesses and healthcare campuses are employ- found in the music department of many campuses, has been found to
ing indoor shot detection to reduce or eliminate delays and errors trigger false alarms. Ongoing testing allows developers to refine algo-
common in victim- or witness-initiated responses to active shooter rithms and rule out these potential false alarms.
incidents. Adding this technology to a campus life safety system can It is also important to consider that not every false alarm is neces-
help shorten the duration of an active shooter event. sarily a bad thing. In fact, it is arguably preferable to react to a false
While an active shooter incident is something that everyone hopes alarm than to have a system fail to identify an actual gunshot.
never occurs, all campuses should have a response plan and the tech-
nology to deal with the situation appropriately and quickly. In order 3. Know Best Practices for Sensor Placement
to select and implement the most suitable technology for a building Acoustic sensors are most frequently mounted in ceilings or on walls.
or campus, it is important to consider the following five suggestions. The range of sensors varies by manufacturer and depends on the
acoustical characteristics in the space, like reverberation and sound
1. Choose the System Most Appropriate for Your Building Layout absorption properties. Even the shooter’s body can create an acoustic
Some shot detection systems use single-factor acoustic verification to shadow when shooting forward with their back facing the sensor.
detect gunshots. Acoustic detection uses sensors to capture a sound. While there is no limit to the number of sensors that can be placed
Then, it develops an acoustic signature and uses computer-based sig- throughout a building, budget concerns are forcing campus facility
nal processing to validate if the sound is a gunshot. This data is then managers to focus their investment on placing sensors only in poten-
used to determine the precise location of the shot. tially high-target areas.
Other systems use multi-factor authentication, where two or more Some recommend placing sensors in areas where large numbers of
sensing technologies are grouped together. These technologies can people congregate like cafeterias, gymnasiums or auditoriums. How-
include the acoustic signature from a muzzle blast and/or from the ever, this is not necessarily where the first shots take place. Other
shockwave of a bullet passing through the sensor field, changes in variables, including building access, approach, motive and the shoot-
barometric pressure triggered by a shockwave, an optical flash/infra- er's actions all play into the location of the first shots. Entryways and
red signature from the ignition of explosive gasses in the ammunition hallways may be the most effective areas to detect first shots.
propellant and comparison of the acoustic signature against an audio It is important to note that system design will never be able to
library of previously recorded gunshots. cover 100 percent of a building. This technology should be part of a
Unfortunately, multi-factor authentication can fail to recognize an comprehensive campus safety plan developed by security profession-
active shooter event if one type of detection is not authenticated due als.When determining what system will best fit your requirements,
to the configuration of the space. For example, if an active shooter ensure the technology provider gives you a clear system design illus-
system requires both acoustic and muzzle flash authentication, wall trating areas of coverage. Above all, involve your local law enforce-
sensors will pick up the gunshot, but muzzle flash may be masked by ment and stakeholder emergency response agencies in the decision-
partitions or walls separating cubicles, offices or classrooms. While making process.
acoustic sensors can detect sound through walls and corners, infra-
red sensors can only pick up flashes within its line of sight. 4. Pick System Offering Communication with First Responders
Active shooter events present numerous challenges for first respond-
2. Understand the Potential for False Alarms ers and emergency staff. Communication of escalating events
The goal of multi-factor authentication is to reduce the number of between 911 and witnesses can be both confusing and erratic, which
800.234.6151 • 1.972.494.6151
Go to http://sp.hotims.com and enter 703 for product information. Visit garrett.com to learn more Made in the USA
can delay on-site response. This is com- safety and evacuation instructions while In the future, the integration of shot
pounded by the fact that active shooters can communicating with emergency services detection into existing life safety systems will
move at a fast pace throughout the build- and mass notification systems, prompting a enable facilities to leverage the infrastructure
ing—making it even more difficult to track quick response by law enforcement. already in place. After detection occurs, mass
the shooter and prolonging the event. Acoustic detection can also indicate the notification to occupants, first responders
Early detection can trigger a host of number of shots fired and the cadence at and law enforcement can be sent through the
responses including alerting students, staff, which they were released, giving insight into same systems used for fire detection. Like all
patients and other building occupants to the the type of weapon the shooter is using. This life safety systems, redundancies will be built
location where shots were fired while trig- data is sent to security, law enforcement, into shot detection technology to ensure
gering building alarms, emergency notifica- hospitals and fire service to enhance their continuous uptime.
tions, evacuation and sheltering procedures. overall strategic picture of the situation and While no technology or planning will ever
Recent tests have shown that shot detec- aid in response. eliminate active shooter threats, it can sig-
tion technology with automatic emergency nificantly shorten the duration and lessen
communication enables law enforcement to 5. Look for Integration Features the impact of the event. Advancements in
respond and mitigate a threat up to 60 per- To maximize effectiveness, it is important to shot detection give occupants, emergency
cent faster. Today’s leading gunshot detec- select a gunshot detection system that sup- management and first responders valuable
tion systems even offer map-based graphical ports multiple integration options, including seconds to react to active shooter events and,
user interfaces that display the location of video feeds from existing CCTV and intru- in turn, potentially save lives.
the shooter to building occupants and law sion systems, mass notification systems,
enforcement, as well as display audio and access control systems and panic button/ Thomas W. Connell II is the senior manager,
video of the incident. The systems provide manual initiation systems. Life Safety, at Johnson Controls.
4
2
5
3
6
The more metal detection zones you have,
2 4 5 6
7
10
8
11
9
12
the greater likelihood of detecting concealed
3 7 8 9 13 14 15 metal objects. ZKTeco walk-though metal
detectors are available in 6, 18 and 33-zone models.
16 17 18
4 10 11 12 19 20 21
6 16 17 18
28
31
29
32
30
33
and remarkably affordable.
6 Zones 18 Zones 33 Zones
Call (862) 505-2101 opt #2 and speak to one of our metal detector specialists.
Teaching Evolution
Security’s growth and innovation in the education sector
Rawpixel.com/Shutterstock.com
E
ach day, we continue to see articles with headlines safety are at the epicenter of today’s conversations about the future of
about the steps and precautions being taken in K-12 security—and it’s time to discuss how we got here and where technol-
schools and universities to protect students and staff ogy is taking us.
from would-be attacks. As the risks and their poten-
tial for damage become greater, school security staff Decrease in Crime
are realizing the importance of prioritizing safety and implementing Although reports show a decrease in school crimes the last two
solutions that keep their facilities protected. decades, school administrators, parents, faculty and communities are
Headlines in numerous publications consistently share the news, remaining vigilant and taking an active stance in determining how to
such as “Wisconsin District Plans Security Updates for the 2019-2020 best mitigate the various types of risks that these facilities face. Aside
School Year,” “Michigan District Prioritizes Security with $225,900 in from active shooting threats, schools must also take into consider-
Planned Upgrades,” “Montana District Updating Elementary School ation how to find ways to protect students from other incidents such
Security Measures” or “New Jersey School Tests Weapon Detection as theft, assault and bullying.
Technology.” These articles demonstrate how student and campus So how has school safety evolved throughout the years to meet the
security needs of today? Not long ago, school security was defined by video surveillance, and in many schools, video is the first thought
chains on exterior doors, fences to protect children on a playground, when it comes to adding security solutions.
hall passes for students wandering outside of classrooms and emer- Today’s video management software (VMS) can be tightly inte-
gency phones in strategic locations on college campuses. With the grated with access control data allowing for a comprehensive under-
media attention surrounding active shooter incidents in schools, all standing of a situation, and quick decision-making. For example, if a
eyes are on campus security officials and the tools they are currently ‘door forced open’ alarm is triggered, officials can simultaneously
using to keep students safe. view live and recorded video of the incident and respond accordingly.
Security measures that encompass both technology and safety Video also can be a deterrent from theft and vandalism and is even
training protocols are gaining the most traction, as these methods being used to identify bullying in today’s schools.
aim to both implement innovative solutions and teach operators how
best to utilize the technology at their fingertips. Let’s examine some Old way: PA system announcements for lockdowns
of these measures and look at how schools are shifting priorities and
changing the definition of protection:
New way: Automatic lockdowns across a campus
One area that has seen significant improvement is in campus lock-
down options. In the past, when a school or campus was placed on
Old way: Open, come-and-go-as-you-please campuses lockdown, certain personnel were appointed to manually lock doors
New way: Secure entrances and exits allow controlled access to with a physical key, which was not the most efficient method in a
students, faculty, vendors and visitors crisis situation.
This put administrators in harm’s way and took critical time to
Comprehensively securing all corners of a campus is the goal of any
execute. Fortunately, new lockdown capabilities have been devel-
school administration team, as it’s important for students to feel safe
oped to increase effectiveness and protect faculty in the event of an
and for parents to be assured of the protection of their kids. But school
emergency. Schools can now leverage an access control or intrusion
officials are tasked with the challenge of balancing an open, welcoming
system that provides them the ability to lock down an entire campus
environment with a safe one, and sometimes that can be tricky.
remotely.
Today’s access control and visitor management tools provide
these leaders with the ability to provide security and issue lockdown
functionality in a simple and efficient manner, without making a
Old way: Mechanical lock-and-key systems
facility feel like a prison. Additionally, integrated visitor manage- New way: Electronic locks, mobile credentials/capabilities, remote
ment software makes it easy for parents, visitors and vendors to management and more
quickly check in and gain access to specific areas throughout the
Many campuses are still operating on a mechanical lock-and-key sys-
building or campus.
tem, which can be costly and difficult to manage. The rise and afford-
ability of networked access control and mobile credentials have made
Old way: Exterior door chains being used to secure mechanical lock-and-key systems a thing of the past for budget-con-
perimeter double doors scious schools.
New way: Network integrated access control on perimeter doors Additionally, remote management of a security system through a
Years ago, many gymnasiums and push-doors were locked with a key mobile app helps streamline decision-making, allowing officials to
and then secured with chains and padlocks. Maintenance personnel actively manage all aspects of an access control solution from any
were required to go from door to door with a set of keys to manually location for maximum flexibility.
lock and unlock these doors.
We’ve since fast forwarded to the enhanced capabilities of security Old way: One-size-fits-all system
management systems supporting wireless locks and networked access
control solutions to regulate entry into and exit out of campus doors.
New way: Customized, integrated solutions
The demand for systems integration is providing campuses the
These solutions allow campus security officials and administrators to
advantage of interoperability between security and campus systems.
remotely monitor and change the state of perimeter doors with the
Instead of running multiple disparate systems that require manual
touch of a button. During emergencies, this allows for faster response
data entry and duplicated effort, the ability to connect these systems
times and increased safety.
through customized workflow solutions allows for improved efficien-
cies and cost savings.
Old way: Focusing only on main entrance doors Campuses often integrate multiple data management programs,
New way: Integrated solutions expand access control options to such as housing, class scheduling and event management systems
include secondary perimeter doors with their access control and video solutions to deliver streamlined
operations.
In the past, it was common to think about nothing but primary
perimeter doors when it came to restricting entry from intruders. It
has since become increasingly clear how important it is to focus on
Continuing Evolution Through Forward-thinking Innovation
Whether 20 years ago or today, educators, administrators and parents
secondary perimeter doors as well—a facility is only as secure as its
can all agree on one thing: the need to provide safe and secure learn-
weakest link.
ing environments for students is of paramount importance.
Today’s integrated solutions enable school administrators to incor-
However, today’s campus security needs have become more com-
porate those secondary doors into their security strategy and ensure
plex, creating unique challenges when it comes to providing solutions
that all entrances to the facility can be monitored and locked down
that enhance protection while at the same time present a welcoming
remotely with the push of a button.
experience. As campus security needs continue to evolve, the solu-
tions designed to keep students, faculty and staff safe will also shift to
Old way: Standalone CCTV systems meet those demands.
New way: Digital video surveillance integrated with access control
Another key technology that has helped improve campus safety is Lynn Wood is the product portfolio manager at Vanderbilt.
stockfour/Shutterstock.com
S
ustaining a safe environment for students and staff is—or at school culture rooted in safe practices, there are a lot of factors that
least should be—a key priority for all school districts. How- district leaders need to address as part of an effective safety plan.
ever, without a comprehensive plan in place, this can be a chal- Franklin City Schools in Franklin, Ohio faced its own challenges
lenging endeavor. From managing ever-changing regulatory with school safety before creating an effective, well-planned and com-
compliance requirements and ensuring the proper communi- prehensive approach to school safety that it could sustain long term.
cation channels are in place, to training staff and creating an overall The town is home to over 11,000 people and located in the fast-grow-
Avigilon solutions help you protect what is most valuable—your students, staff and faculty.
Real-Time Notifications
Avigilon self-learning video analytics provide instant alerts of events on school grounds
via desktop browser or mobile app, helping to improve response times in active situations.
Powerful Search
Avigilon Appearance Search™ technology sorts through hours
of video with ease to quickly locate a specific person or vehicle
of interest across an entire campus in near real-time.
Quick Action
Access Control Manager™ generated door events allow you
to create rule-based alerts for quick on-site responses, Personal Characteristics
including immediate school-wide lockdown. Gender
info.avigilon.com/education | asksales@avigilon.com
Go to http://sp.hotims.com and enter 715 for product information.
Product features and functionalities may not yet be available and, if and when available, may not be as depicted. Images and user interfaces have been simulated for illustrative purposes.
© 2019, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, ACCESS CONTROL MANAGER and AVIGILON APPEARANCE SEARCH are trademarks
of Avigilon Corporation. ONVIF is a trademark of Onvif, Inc. Other names or logos mentioned herein may be the trademarks of their respective owners.
dures, a comprehensive
Perimeter Protection
approach to campus
security must include
prevention-focused
security measures.” Security solution advances drive reevaluation of campus security
Titikul_B/Shutterstock.com
A
ccording to the National Center for Education Statis- Smarter Tools are Changing the Campus Security Game
tics (NCES), 95 percent of public schools engaged in Public perception of school security tends to lag a little behind the
lockdown drills designed to protect students in the times. For many, the idea calls to mind sash-wearing hall monitors,
event of an intruder on campus during the 2015-16 or perhaps a single school resource officer stationed near a high-traf-
school year—a number that has likely grown in the fic hallway. Even the more technology-focused solutions fail to accu-
intervening years. It is an astonishingly high percentage, and it effec- rately represent the tools available today: metal detectors and walls of
tively drives home the ubiquity of campus security concerns in the security monitors might still be a part of the solution in some cases,
United States. There are laws mandating the performance of these but they fall short of representing the depth and breadth of today’s
drills in 32 of 50 states, from K-8 schools to high schools and colleges. access control and monitoring resources.
Ensuring that students can play, learn, and grow in a secure environ- The truth is that, as concern for campus safety has blossomed, so
ment is perhaps the highest priority in the education field. too has the development of more innovative, affordable, and effective
Drills play an important role in keeping students safe, but they tools for monitoring and controlling the perimeter of campus build-
center around understanding what to do when an incident is already ings. The NCES notes that 81 percent of schools include cameras as
in progress. In addition to establishing proper response procedures, a part of their security solution. But what does this mean, exactly?
comprehensive approach must include prevention-focused security While it’s nice to know that a school uses cameras as a security mea-
measures. Today, there are more tools available than ever to establish sure, how those cameras are being monitored matters.
strong perimeter security and help campus security teams identify The difference between traditional, analog security cameras and
intruders and potential threats before they arise. today’s IP cameras is as vast as the difference between the tape deck
engaged with the camera system, and even those schools that can Thermal cameras also represent an interesting way to supplement
afford dedicated security personnel must face the reality that a security. These cameras are generally more affordable than standard
human being really can’t look at a wall of 12-16 cameras and fully video cameras, and maintain their effectiveness in rain, snow, sleet,
process what they’re seeing. For this reason, we have found that fog or any other type of weather. They are an ideal solution for roof-
more cameras do not necessarily imply better security. If the secu- tops or other forbidden areas because they can trigger an alarm as
rity staff monioring a 200-camera system cannot comprehend what soon as an individual is detected.
they’re seeing quickly or reliably enough to take action, what, then, This sort of detection is not limited to potential intruders.
is the point? Adventurous students may decide that the roof is a fun place to be,
putting the school at risk of a lawsuit should they be injured. Effec-
Better Tools Create Better Results tive thermal surveillance can mitigate the school’s liability through
Today’s tools address this challenge in a novel way: by removing the
active detection. This further highlights an important aspect of
human factor. Where analog cameras require someone to notice sus-
this technology: affordability. Not only are the cameras becoming
picious or out-of-place activity, IP cameras can detect it automati-
more affordable, but the reduction in security and surveillance
cally. Security teams can program cameras to alert the appropriate
personnel they enable and the possible lawsuits they mitigate mean
authorities or personnel if certain conditions are met. These param-
that the technology is not only effective but also has the potential
eters might include motion detection to identify intruders, supported
to pay for itself.
by size parameters to prevent a squirrel from tripping the alarm.
These cameras can help campuses increase their surveillance cov- When It Comes to Campus Security, Prevention Is Key
erage with fewer cameras, and those equipped with a radar detector The Partner Alliance for School Safety (PASS), a respected school
are particularly effective. Rather than deploy four cameras to cover a security organization, recently released a revised edition of its recom-
certain area, schools may find that only two IP cameras are necessary, mended guidelines for K-12 school safety, calling for a layered and
with a radar detector on the zoom capable of focusing on incidents tiered approach to security. The guidelines focus heavily on access
that meet the pre-established parameters and providing authorities control and perimeter security, with specific recommendations
with the best possible glimpse at the culprit. regarding security cameras and effective alarms. As tools like IP cam-
This innovative technology can also help secure entry points via eras, radar detectors, thermal cameras, and more become increas-
video/audio intercom access control. Door intercoms allow staff to ingly accessible, it will continue to be easier than ever for campuses
properly vet visitors before they gain entrance—a critical way to to bolster the security capabilities and ensure that their students are
potentially thwart or slow an intruder. Too many school tragedies as safe and secure as they can possibly be.
have begun with the assailant walking through the front door or gain-
ing access via a door that was not properly secured. An intruder will Bruce Canal, CPP, is the business development manager – education,
likely “show their hand” at the main door when they become agitated at Axis Communications.
Ad Index
Circle #.... Advertiser.................................................................. Page.............URL
715............. AVIGILON.............................................................................31....................www.info.avigilon.com/education
709............. CEIA USA.............................................................................13....................www.ceia-usa.com
702............. DESIGNED SECURITY INC...........................................3.......................www.dsigo.com
701............. DSX ACCESS SYSTEMS.................................................36....................www.dsxinc.com
707............. FIRST RESPONDER TECHNOLOGIES......................7.......................www.1stResponderTechnologies.com
710............. GAI-TRONICS.....................................................................33....................www.gai-tronics.com
703............. GARRETT METAL DETECTORS.....................................21....................www.garrett.com
712............. IPVIDEO................................................................................25....................www.ipvideocorp.com
706............. NIGHTLOCK........................................................................19....................www.classroomlockdown.com
718............. MARKS USA Division of NAPCO SECURITY..............11....................www.marksusa.com
713............. PRIMEX WIRELESS..........................................................27....................www.onevue.com/notify
708............. SAFETY TECHNOLOGY INTERNATIONAL.................35....................www.sti-usa.com/sp362
711............. SALIENT SYTEMS..............................................................5.......................www.salientsys.com
717............. SECURITY TODAY ACADEMY.......................................15....................www.securitytodayacademy.com
705............. VIKING ELECTRONICS...................................................2.......................www.vikingelectronics.com
714............. ZENITEL................................................................................29....................www.ic-edge.com
704............. ZKTECO USA......................................................................23....................www.zktecousa.com