Sunteți pe pagina 1din 108

www.securitytoday.

com

Technology | Education | Solutions


October 2019 | Vol. 23 No. 7

Quality Control
is Everything
Like any product, reliability will
keep the end user happy

1019sec_0c1_v2.indd 1 9/13/19 2:19 PM


GEARED FOR
POWER
+ PERFORMANCE

ALTRONIX MIDSPANS AND SWITCHES ARE DESIGNED WITH MAXIMUM FLEXIBILITY FOR
DEPLOYING IP DEVICES. NETWAY PROVIDES THE PRECISE COMBINATION OF SPEED
AND SCALABLE POWER IN VIRTUALLY ANY ENVIRONMENT.
WHAT’S DRIVING
G YOUR PoE?

Now Offering 802.3bt 4PPoE Solutions!

MADE IN THE U.S.A. ALTRONIX.COM LIFETIME WARRANTY


Go to http://sp.hotims.com and enter 9 for product information.

Untitled-10 1 9/4/19 3:10 PM


EMPOWERING through
TECHNOLOGY
Reduce Installation Costs

2x2MP Dual-sensor
Network Dome Camera
DH-IPC-HDBW4231FN-E2-M

Capture Color Details in Low Light

4MP 3.6mm ePoE Bullet


with Night Color Technology
N45EF63

Improve Customer Experience

2x3MP Dual-sensor
StereoVision People Counting Camera
DH-IPC-HDW8341XN-3D

Fewer False Alarms

4MP Vari-focal ePoE Starlight+


Dome with Perimeter Protection
N45DL7Z

Empower your business with the latest technology offerings from Dahua. Contact us for
details on scheduling a demo.
us.dahuasecurity.com | sales.usa@dahuatech.com
Go to http://sp.hotims.com and enter 15 for product information.

Untitled-9 1 9/11/19 1:56 PM


Contents OCTOBER 2019
Education | Technology | Solutions

cover story Video Analytics 32


Changing the Look of Security
Analytics can make searching video possible in
real time, and what this means for you
By Jennifer Hackenburg
Border Security 36
The Technology Role
Today’s solutions will play an increasing,
ever-present role on the border
By Jim Ryan

Quality Control is Everything 16


Like any product, reliability will keep the end user happy
By Michael Stoll

features
Privacy Laws 8
Expanding Cybersecurity Solutions
Five data security questions for SMBs in light of the expanding Storage Security 38
consumer privacy laws Why Are SMBs so Worried?
By Richard Kanadjian Many organizational benefits include flexibility and productivity
By François Amigorena
Media Converters 12
The Mighty PoE Privacy Issues 42
Media converters ply myriad roles in today’s centric world Data Privacy Requires a Security Response
By Frank (Skip) Haight GDPR affords EU residents more control
over personal information
Transportation Security 22
By Mohammed Murad
Theft on Wheels
Cargo theft accounts for as much as $40 billion in annual losses
By John Chigos departments
Border Security 26 Industry Focus 6
Smart City Technologies Wyoming Surveys K-12 Principals
How solutions are deployed to ensure safety By Ralph C. Jensen
and security at the border Security Today Solutions 44
By Kevin Taylor
Advertising Index 49
Privacy Issues 28
Ushering in a New Era Industry Professional 50
Consumers are more concerned with how t A Global Solution
heir activities are being tracked How OSDP is changing the access control market
By Neil Huntingdon By Kaitlyn DeHaven
ON THE COVER: Image courtesy of / Telmo Machado, InfusionDirect.com

Online Communities
Follow us on Twitter: Become a fan on Facebook: Link to Us:
www.twitter.com/SecurToday www.facebook.com/SecurToday http://linkedin.com/company/security-today

4 1 0 1 9 | S E C U R I T Y T O D AY

1019sec_004_TOC_v1.indd 4 9/13/19 2:20 PM


Go to http://sp.hotims.com and enter 20 for product information.

Untitled-3 1 9/12/19 12:29 PM


INDUSTRY FOCUS Products | Technology | Solutions
With Ralph C. Jensen, Editor-in-Chief
www.securitytoday.com
Volume 23, No. 7

EDITORIAL STAFF
Editor-in-Chief Ralph C. Jensen
Wyoming Surveys K-12 Principals Content Editor Sherelle Black

W
Associate Content Editor Haley Samsel
yoming State Superin- Department of Education. Two mass school E-news Editor Brent Dirks
tendent Jillian Balow shootings in 2018, in Santa Fe, Texas and in ART STAFF
is making an effort to Parkland, Florida, have prompted Balow
Art Director Dale Chinn
better understand how and her staff to move forward, in addition to
the state’s 48 school an incident where a student brought a loaded PRODUCTION STAFF
districts’ are protecting their students. I know weapon to a Gillette, Wyoming school. Production Coordinator Teresa Antonio
what you’re thinking. Wyoming is rural and “The state is very diverse in terms of
EDITORIAL ADVISORY BOARD
that’s the last place an incident would hap- campus population,” Balow said. “Some
William Crews, President/CEO,
pen at a school. I know The Cowboy State schools are small and there may be a cop
Security & Resilience Consulting, LLC, Houston
has a rural atmosphere in some places—I that stops by once a day, but we have much
Rob Hile, General Manager,
grew up there. larger schools where there might be a school Florida GC&E Systems Group, Tampa
School principals were emailed a survey resource office in the building. That is why Chris Lanier, LRG Inc., Jasper, Texas
of 20 questions, including what threat as- the threat assessment is the entry point of Jeff Karpovich, CPP, CHPA, CSSP, Chief/Director, Security &
sessment tools they are using; what training our discussion. Transportation, High Point University, High Point, NC
they undergo; how the school secures their “As a parent, educator and state leader it
entrances and other security–related topics. is important to take control and have these SALES
“The intent of the survey is to take the important discussions. We simply can’t just Randy Easton 678-591-2822
temperature on what is happening state- talk about gun control. We have to start with Brian Rendine 972-687-6761
wide,” Balow said. “We’re reaching to every student safety and well-being.” Sam Baird +44 1883 715 697
school to find the sweet spot and establish a I applaud Superintendent Balow for her Peter Kao +886-2-2949-6412
policy and set a baseline for campus security. continuing efforts and her press for improved
INFRASTRUCTURE SOLUTIONS GROUP
Our goal is to begin a discussion statewide school security. Following the results of her
President & Group Publisher Kevin O’Grady
on a threat assessment. Every school has a survey, Balow said she will present them
Associate Publisher, Security Ralph C. Jensen
threat assessment; we just want to see what publicly, which she said will help inform both
Group Circulation Director Irene Fincher
various schools have in place. her department’s security guidelines and po-
Group Marketing Director Susan May
“We understand that there is no silver tential future legislation. No doubt, all states
Group Website Manager Scott Newhouse
bullet; our goal is the well-being and safety are grappling with this issue. Good security Group Webinar Administrator Tammy Renne
of every student.” measures will offer peace of mind and create
School districts in Wyoming vary in pop- a baseline of security protocols. Policymak-
ulation and school size, as you might expect, ers must have a clearer idea of what is being
so one district is most certainly not deploy- offered, and what will help fill their gaps for
ing what another district might have in place. an effective campus solution.
The concern at the state level has been a topic Chief Executive Officer Rajeev Kapur
of discussion in the state legislation, and the Chief Financial Officer Sanjay Tanwani
Chief Technology Officer Erik A. Lindgren

Executive Vice President Michael J. Valenti


ID STATEMENT accuracy, there is no guarantee that the same or similar results may be
Security Today (ISSN 2572-5246) is published 8 times a year,Jan/Feb, Mar, achieved in all environments. Technical inaccuracies may result from print-
Apr, May/Jun, Jul/Aug, Sep, Oct and Nov/Dec by 1105 Media, Inc., 6300 Ca- ing errors and/or new developments in the industry. REACHING THE STAFF
noga Avenue, Suite 1150, Woodland Hills, CA 91367. Periodicals postage
paid at Woodland Hlls, CA 91367, and at additional mailing offices. Compli- CORPORATE ADDRESS
Staff may be reached via e-mail, telephone, fax or mail. A list
mentary subscriptions are sent to qualifying subscribers. Annual subscription Corporate Headquarters: of editors and contact information also is available online at
rates payable in U.S. funds for non-qualified subscribers are: U.S. $119.00, 1105 Media www.securitytoday.com.
International $189.00. Subscription inquiries, back issue requests, 6300 Canoga Avenue, Suite 1150, Woodland Hills, CA 91367
and address changes: Mail to: Security Today, P.O. Box 2166, Skokie, IL www.1105media.com
E-mail: To e-mail any member of the staff, please use the
60076-7866, email SECmag@1105service.com or call 866-293-3194 or following form: FirstinitialLastname@1105media.com
847-513-6011 for U.S. & Canada; 00-1-847-513-6011 for International, fax MEDIA KITS Dallas Office (weekdays, 8:30 a.m. – 5:30 p.m. CT)
847-763-9564. POSTMASTER: Send address changes to Security Today, P.O. Media Kits: Direct your Media Kit requests to Lynda Brown, 972-687-6781
Telephone (972) 687-6700; Fax (972) 687-6799
Box 2166, Skokie, IL 60076-7866. Canada Publications Mail Agreement No: (phone), 972-687-6769 (fax), lbrown@1105media.com
40612608. Return Undeliverable Canadian Addresses to Circulation Dept. or 14901 Quorum Dr., Suite 425, Dallas, TX 75254
XPO Returns: P.O. Box 201, Richmond Hill, ON L4B 4R5, Canada. REPRINTS Corporate Office (weekdays, 8:30 a.m. – 5:30 p.m. PT)
Reprints: For single article reprints (in minimum quantities of 250-500), Telephone (818) 814-5200; Fax (818) 734-1522
COPYRIGHT STATEMENT e-prints, plaques and posters contact:
© Copyright 2019 by 1105 Media, Inc. All rights reserved. Printed in PARS International 6300 Canoga Avenue, Suite 1150, Woodland Hills, CA 91367
the U.S.A. Reproductions in whole or part prohibited except by written per- Phone: 212-221-9595
mission. Mail requests to “Permissions Editor,” c/o Security Today, 14901 E-mail: 1105reprints@parsintl.com
Quorum Dr, Ste. 425, Dallas, TX 75254 www.1105Reprints.com

LEGAL DISCLAIMER LIST RENTAL


The information in this magazine has not undergone any formal testing This publication’s subscriber list, as well as other lists from 1105 Media, Inc.,
by 1105 Media, Inc. and is distributed without any warranty expressed or is available for rental. For more information, please contact our list manager,
implied. Implementation or use of any information contained herein is the Jane Long, Merit Direct. Phone: (913) 685-1301; Email: jlong@meritdirect.
reader’s sole responsibility. While the information has been reviewed for com; Web: www.meritdirect.com/1105

6 X X 1 7 | S E C U R I T Y T O D AY

1019sec_006_IndFocus_v4.indd 6 9/13/19 2:21 PM


Secure operations 24/7 to see all the details, all the
time with the Bosch FLEXIDOME IP starlight 8000i.
With quick installation plus wireless and remote commissioning, camera
adjustments can be corrected whenever needed. Resolutions up to 4K Ultra
HD and starlight technology help you see all the details all the time.

Find out more at boschsecurity.com


Go to http://sp.hotims.com and enter 12 for product information.

Untitled-3 1 7/1/19 12:51 PM


PRIVACY LAWS

Rawpixel.com/Shutterstock.com
Expanding Cybersecurity Solutions
Five data security questions for SMBs in light of the expanding consumer privacy laws
By Richard Kanadjian

W
ith the expansion of privacy laws abroad What Could a Data Breach Cost a SMB?
and in the U.S.—HIPPA, CCPA, and Data breaches are not just a risk for large businesses and govern-
GDPR as examples—data breaches are ment agencies. Small businesses that collect customer and other sen-
serious issues for any company that holds sitive personal information are also at risk in today’s high-threat en-
PII (Personally Identifiable Information) vironment. Verizon found in their 2019 Data Breach Investigations
of consumers and or any other sensitive information. Report that 58 percent of all cyberattacks target small businesses.
California’s Consumer Privacy Act (CCPA) goes into effect on The cost of a data breach for a SMB is a topic of debate be-
January 1 and will affect not only companies in California, but tween leading researchers and companies. The Ponemon Insti-
also companies nationwide with serious financial penalties for tute put the average cost for a small business that was hacked at
businesses. Already in effect is the European Union’s GDPR $690,000 and over $1.2 million for a mid-sized business in 2018.
regulation, where non-complying organizations can be fined up Kaspersky Lab found that the average cost of a data breach and
to 4 percent of annual global turnover or €20 million, about $20 recovery to a small business is $269,000—$120,000 for the data
million-plus U.S. dollars, or whichever is greater. breach and $149,000 for breach recovery. Either way, a data
Under GDPR, companies can be fined for not having their re- breach could lead to more than just loss of money for a SMB.
cords in order, not notifying the supervising authority and those
affected by a breach, or not conducting an impact assessment. How Does the California Consumer
How businesses store, transport and manage consumer and Privacy Act (CCPA) Affect Businesses?
company information has become critical for not only large com- While the CCPA is meant to enhance the privacy rights and con-
panies, but small and medium-sized businesses (SMB) as well. sumer protection for the residents of California in the United

8 1 0 1 9 | S E C U R I T Y T O D AY

1019sec_008_010_Kanadjian_v2.indd 8 9/13/19 2:22 PM


HES KS100
Server Cabinet
Lock for data
center security Adams Rite G100
Digital Glass Door Lock for
interior office entryways

Securitron
AQ Series
Power Supplies

ce
ffi
O
e
Ser

iv
ut
ver

ec
Ex
Roo
m

HES K100 Cabinet Lock


for shared office doors,
drawers and lockers

om
Mai
Ro

n En
ce
en

tran
er
nf

ce
Co

Securitron R100
Card Reader for employee
and visitor management

Wireless possibilities for


online access control
Designed for easy integration into existing access control systems,
our wide range of products with Aperio® technology allows
facilities to add access control to more applications than ever.
ELECTRONIC SECURITY HARDWARE HES | Securitron
ADAMS RITE
800 626 7590 | assaabloyesh.com | adamsrite.com
Go to http://sp.hotims.com and enter 4 for product information.

Untitled-9 1 8/29/19 4:20 PM


PRIVACY LAWS

“BYOD, or Bring Your Own Device, is USB drive encryption can be done through either the device’s
hardware or software. A hardware-centric/software-free encryp-
a key threat to even the most robust tion approach to data security is the best defense against data
cybersecurity plan that a small busi- loss, as it eliminates the most commonly used attack routes. This
software-free method also provides comprehensive compatibility
ness could put in place.” with most OS or embedded equipment possessing a USB port.
States, as with many laws enacted in the state, the law will affect Hardware-based encrypted USB drives are self-contained,
any business that has customers who are based in California— don’t require a software element on the host computer, and
which describes many companies around the world. are the most effective means in combating ever-evolving cyber
CCPA can apply to businesses even if they do not have offices threats. Hardware-encrypted USB drives protect against the pos-
or employees in California. The criteria to determine if this law sibility of brute force, sniffing and memory hash attacks due to
will affect your business are (any one of the three make the law their security being self-contained inside the drive.
apply to your business): Software-based encrypted drives are designed differently.
• Do you have gross revenue over $25 million, or They share a computer’s resources with other programs. The en-
• Do you possess the personal information of 50,000 or more cryption is not done on the USB drive at all. A software program
consumers, households or devices, or on the computer encrypts the data, then stores it on the USB
• Do you earn more than half your annual revenue from selling drive. To read it back, a software program must be run on the
consumers’ personal information? computer to decrypt the data. Because of this computer-based
If the new CCPA applies to your company, the intentions encryption process, the USB drives themselves are vulnerable. In
of the law are to provide California residents (defined broadly some cases, there are compatibility issues with older operating
enough to cover consumers, employees, business contacts and systems that may make the data unreadable.
others) with the ability to know what personal data is collected
about them (and have access to this information); how that data How Can I Protect My Company’s Sensi-
is used, sold or disclosed; ability to say no to the sale of personal tive Data and Not Hinder Productivity?
data; request their data to be deleted, and more. There should be standardization for best practices for what
is known as data “at-rest” or “in-transit.” While the most com-
Do Employees Bring Their Own Storage mon storage medium is the use of inexpensive USB drives, the
Devices For Back Up and Transfer? best practice is to standardize on hardware-based encrypted USB
BYOD, or Bring Your Own Device, is a key threat to even the drives. This practice will provide efficiency and security to mo-
most robust cybersecurity plan that a small business could put in bile data for anyone. Even accessing Cloud storage can be risky
place. The tremendous portability and exceptional ease of USB – while you access the internet at a coffee shop, someone else may
drives have proven to increase productivity to millions of busi- be trying to hack your system. If you carry your data on a hard-
nesses and government agencies. However, since most of these ware-encrypted drive, you can work on your data and keep your
drives are unencrypted, they can pose a major security risk to the internet turned off while in an untrusted open Wi-Fi area.
user storing anything more valuable than public data. So, where do you start? As a small or medium business, you
Their extreme portability means they are very susceptible to more than likely aren’t going to need the same level of protection
being lost, accessed or misappropriated. When that happens, that large companies and government agencies require. There is
there is a fairly good chance that data stored on the device will a range of easy-to-use, cost-effective, encrypted USB flash-drive
end up in the wrong hands, risking the user’s or company’s pri- solutions to choose from that can go a long way toward mitigat-
vacy and security. ing your privacy and security risks, and, quite possibly, save you
Having a company policy of standardizing on the use of hard- money and stress.
ware-based encrypted USB drives is a key factor in a USB drive’s Encrypted USB drive manufacturers provide you with op-
ability to provide the safest, most trustworthy means to store and tions, no matter your needs. For SMBs, Kingston’s DataTraveler
transfer personal, classified, sensitive data. Experts say the use of Vault Privacy 3.0 USB Flash drive provides affordable business-
an encrypted USB flash drive is the best solution for keeping con- grade security. The encrypted solution features 256-bit AES
fidential information what it was intended to be—confidential. hardware-based encryption in XTS mode (this is state-of-the art
From a cost perspective, hardware-based encrypted USBs are encryption). It protects 100-percent of data stored and enforces
not much more expensive than non-encrypted devices—and they complex password protocol with minimum characteristics to pre-
are like insurance against the unthinkable—the loss and breach vent unauthorized access. For additional peace of mind, the drive
of private data that could be exposed otherwise. locks down after 10-incorrect password attempts. It also features
The use of encrypted USB drives can also provide legal pro- a read-only access mode to avoid potential malware risks
tection with regulations such as HIPPA, CCPA, GDPR and oth- Data security and consumer privacy are not only concerns for
er regulations that affect many industries and professions. large businesses. SMBs are facing the same is-
sues with smaller budgets, so identifying cost
What is The Difference Between effective ways to mitigate the risk is paramount
Hardware and Software Encryption? as we prepare for 2020.
Not only is encryption vital in USB drives securing and protect-
ing data, how that encryption is performed is likewise important. Richard Kanadjian is the business manager of
Users have two choices: hardware and software-based encryption. Kingston Technology’s Encrypted USB unit.

10 1 0 1 9 | S E C U R I T Y T O D AY

1019sec_008_010_Kanadjian_v2.indd 10 9/13/19 2:22 PM


Sell More. Earn More.

Avigilon™ Plus Champions is here to reward you REWARD CARD

for selling Avigilon products.

Help your customers protect what matters most,


while earning up to 1% back in rewards for every
Avigilon order placed, to use wherever you want. 4000 1234 5678 9010
VALID THRU
12/20 DEBIT
Don’t miss out! Register today avigilon.com/ JOHN CARDHOLDER
THANK YOU
plus-champions to start earning. VALID ONLY IN THE U.S.

Avigilon Plus Champions can Earn Rewards in Three Simple Steps


REGISTER RECEIVE ENJOY
Visit avigilon.com/plus-champions to Get your Avigilon™ Plus Champions Enjoy your rewards
get started on your first rewards claim. Visa® Prepaid card with rewards wherever you want!
from each invoice submitted.

Go to http://sp.hotims.com and enter 11 for product information.


Use your Visa Prepaid card anywhere Visa debit cards are accepted in the U.S. The card may not be used at any merchant, including internet and mail or telephone order merchants, outside of
the U.S. Card is issued by The Bancorp Bank, Member FDIC, pursuant to a license from Visa U.S.A. Inc.
Eligibility for the program and the grant of any rewards will be subject to terms and conditions set by Avigilon.
© 2019, Avigilon Corporation. All rights reserved. AVIGILON and the AVIGILON logo are trademarks of Avigilon Corporation.

Untitled-1 1 9/9/19 11:32 AM


MEDIA CONVERTERS

The Mighty PoE


Media converters play myriad roles in today’s centric world
By Frank (Skip) Haight

“The number one reason people lightning or other electromagnetic interference. Optical fiber does
not conduct electricity so any lightning strike or EMI will be iso-
use wireless is, so the cabling lated to that location and not a carry back to the headend. These
infrastructure necessary to carry are often used for very short runs in lightning prone regions or
industrial locations.
the signal is not required.”

T
Make the Right Choice
he lowly media converter—the mainstream defini-
So how do you choose the right fiber-optic media converter? They
tion was always an electrical to optical Ethernet
come in lots of different types so here are options you have avail-
transmission device. Traditionally, it was consid-
able to you. The first question is whether you need a fixed optic
ered a device used to convert from copper media
version or a unit that uses a small form factor pluggable, or SFP,
to an optical fiber media and then back to copper,
that slides into the electronic unit and acts as your fiber optic
usually to send the data longer distances than the standard cop-
transmission and receiving piece.
per cabling can handle. But in today’s IP-centric world, media
Next, figure out what type of fiber will be used. There is mul-
converters work on lots of different types of media.
timode or single mode. Then conclude whether it will use one or
The three that this article discusses are fiber optic media con-
two fibers to make the connection. Many systems used two fibers
verters, extended distance media converters, and wireless media
so that you can send data one way on the first fiber and then in the
converters, all of which are transmitting an Ethernet signal.
opposite direction on the second fiber. Also related to the physi-
cal cable that will be used is the type of connector on that fiber.
The Ethernet Band There are ST, SC, and LC connectors, and here we have it shown
Here’s a graphical example of each type. Since all of them are as a dual LC connector for the duplex fiber.
transmitting Ethernet, they are all converting from a standard Ethernet runs at different speeds, so you also have to decide
copper CAT5 or 6 cable, which has a limitation of 100 meters, or what data speed you want running over that fiber. There is 100
328 feet. An optical fiber media converter converts to a fiber optic Mb per second, 1000 Mb per second, also called gigabit, or multi
cable and then back. rate media converters that allow you to slide in either a 100 or a
Although an extended distance Ethernet media converter 1000 Mb per second SFP for flexibility.
stays on copper cabling, it’s converting from a standard CAT 5 You also have to decide on the form factor for the media con-
or 6 to a non-standard copper cable, such as a coaxial cable or an verter. They come in a mini size, a medium mini size, and a full
unshielded twisted pair cable, and then back to a standard cable. size that would fit in a standard 19-inch electronics rack. These
A wireless Ethernet media converter works the same way as the smaller units are good for fitting in small locations like enclosures
above types but it’s converting the Ethernet to a radio frequency or the mounting arms/back boxes of IP cameras. The full size
to be transmitted through the air. variants can be shelf or wall-mounted, or slid in to a 14 slot card
This article is to help you in selecting media converters that cage with no modifications.
fit your application, so here are some important considerations.
Many applications are outdoors and not in climate-controlled Consider All Options
environments. Electronics don’t like to be cold or wet so a harsh The last option to consider is whether you need power over Eth-
environment requires a hardened product that can withstand ex- ernet at the remote location for your camera or other IP device.
treme temperatures, condensation, transient voltages and other ComNet has options for 15 Watts, 30 W, or even 60 W for the
environmental factors. A lifetime warranty on all hardened outdoor rated IP PTZ cameras. And of course, all units ship with
products means the product will work now and as long as long the correct power supply.
as it’s installed. One application to note to consider with fiber-optic media
Because there are so many factors to consider when selecting a converters is pairing appropriate units. When using just one fiber
media converter for a harsh environment, it’s important that you between the transmitter and the receiver you should pair an A
select a good partner to help pick an appropriate product. Fiber unit with a B unit. The model number will tell you which it is.
optic media converters. The number one benefit with this type is When you are using a duplex fiber optic cable between the trans-
the long distances they can carry an Ethernet signal. Standard mitter and receiver, both units have the same model number.
copper cat 6 cables only carry the signal 100m, but a fiber-optic Let’s examine extended distance Ethernet media converters.
media converter can extend that out over 100 km or more! The main reason installations use them is a retrofit application
The second most common reason for using a fiber-optic me- where are you are moving from an analog camera infrastructure
dia converter is to isolate the devices in an outside location from to an IP camera infrastructure. These media converters allow you

12 1 0 1 9 | S E C U R I T Y T O D AY

1019sec_012_014_Haight_v2.indd 12 9/13/19 2:27 PM


THE NEW WIRELESS
SUPERPOWER
TERY ! NO BATTER
BAT
NO TENANC
E HAZARDOU Y
S
N WASTE
MAI

WIRELESS S
IG
POWERED B NAL
SIMPLY PUS Y
HI
THE SWITCH NG
!

CAMDEN PUSH PLATE SWITCHES NOW WITH BUILT-IN


KINETIC™ ‘NO BATTERY’ WIRELESS TRANSMITTERS!!

1.877.226.3369 / 905.366.3377 CALL FOR A FREE PRODUCT SAMPLE TODAY!


www.camdencontrols.com (Limited offer, contact Camden for details)
Go to http://sp.hotims.com and enter 13 for product information.

Untitled-10 1 8/29/19 4:30 PM


MEDIA CONVERTERS

to use the existing coax cable or UTP cable and now run Ethernet the binary code of Ethernet from an electronic signal to a radio
on it instead of the analog signal, and it can represent a huge cost frequency signal and then back again. The number one reason
savings versus pulling out the existing cabling. people use wireless is, so the cabling infrastructure necessary to
The second most common benefit is being able to send an IP carry the signal is not required. Trenching for new cabling is very
signal much farther than the standard hundred meters over cat six expensive, complicated, and difficult to accomplish in many envi-
without having to switch to more expensive optical fiber cabling ronments. This all represents a huge cost savings by using wireless
and optical fiber media converters. Many extended distance Eth- transmission methods. The second big benefit is the speed of de-
ernet media converters can transmit an IP signal over 2,000 feet. ployment. If you have power on site, the installation of a wireless
The third benefit is a good reason installers choose this type of Ethernet media converter can be very quick and effective.
media converter. Pass-through PoE allows one power source, like This application is a simple point-to-point solution. The Net-
a POE switch, power all devices on the line. Power is transmitted Wave NWK 11/M and NWK1 kits include everything needed
from the PoE switch, powering both of the media converters and to set up a wireless link. The kits are preconfigured in the fac-
also passing power up to the camera at the end of the line. This tory and MAC locked so that installation on the bench or in the
makes for a much quicker installation and means you don’t need field is simple, quick, and reliable. These preconfigured kits have
to worry about finding power at the camera location. allowed installers with no previous experience using Radio fre-
Please note that the amount of POE you need at the end quency products to successfully implement a wireless Ethernet
of the line will affect the distances you can successfully travel media converter solution.
over any copper cable, so please consult our data sheets for spe- Since many of these applications are intended to be used in
cific limitations. Although ComNet has several product lines harsh environments, it is imperative that you select a product
that perform this media conversion, our most comprehensive that can handle extreme temperatures and other environmental
and popular segment is Copperline® distance extending media factors. In addition, it’s important to work with a company that
converters. It comes in 15- and 30-Watt models, various useful has expertise in all types of Ethernet media
form factors, five different ways to power the modules, and 1 to conversion and can work with you to deter-
16 channel units. mine what solutions are best suited for your
application.
Consider the Expense
Last in the series of media converters are wireless Ethernet me- Frank (Skip) Haight is the vice president of
dia converters. This is a little different in that we are converting marketing at Communication Networks.

14 1 0 1 9 | S E C U R I T Y T O D AY

1019sec_012_014_Haight_v2.indd 14 9/13/19 2:54 PM


Who says you can’t
control it all?

Many office settings require security on more than one


door in a centralized location. The Alarm Controls RT
Series Wireless Transmitters allow access control for up
to three doors from one device, allowing staff to maintain
security at their station, while controlling multiple entry
points. Put control in your hands, with the click of a button.

Learn more about this solution at www.alarmcontrols.com.


Go to http://sp.hotims.com and enter 5 for product information.

AlarmControls.com

Untitled-8 1 8/29/19 4:08 PM


COVER STORY

Quality Control is Everything


Like any product, reliability will keep the end user happy
By Michael Stoll

Image courtesy of / Telmo Machado, InfusionDirect.com

I
n today’s world, there are a myriad of different manufac- ity means different things to different people. However, when it
turers that produce similar products and there are so many comes to perimeter protection and selecting the right turnstile so-
options available to customers. However, there is only one lution, the word quality translates into reliability, which in return
way to make your product stand out from the rest: deliver creates a safer world.
a quality product that offers reliability and peace of mind With so many product choices out there, quality turnstile
to customers. By delivering a quality product time after time, manufacturers that consistently deliver a superior product will
you not only maintain customer satisfaction and loyalty, but forge ahead of their competitors and retain customers. Security
reduce the cost of replacing a broken product and minimize a manufacturers today must make products that are durable, reli-
customer’s downtime. able and without failure. When it comes to quality perimeter pro-
tection products and reliability, you have to be at the top of your
Reputation of Quality game and build a solid reputation by continually exceeding your
Companies can build a solid reputation for quality by gaining customers’ expectations each and every time.
recognition as the industry standard for quality. The word qual- It is important to offer customers peace of mind with them

16 1 0 1 9 | S E C U R I T Y T O D AY

1019sec_016_020_Stoll_v3.indd 16 9/13/19 2:47 PM


Simple, Secure
Video Surveillance
and IoT Solutions
Video surveillance challenges
• Surge of bandwidth & video storage needs
• Cyber vulnerability in video
• Lack of skilled technical workers
• Costly complex installation and maintenance

Razberi reduces challenges


• Reduce costs through bandwidth & storage optimization
• Reduce risk of being hacked by strengthened cybersecurity
• Reduce time to identify & resolve issues with fewer truck rolls
• Reduce resources required to install and manage network

+ +
Intelligent Video Automated Health
Surveillance Server Cybersecurity Monitoring
Appliances Software Software

Attending ISC East?


Come see Tom Galvin, Chief Product Officer, Razberi Technologies present.
November
November 20,
20, 2019,
2019, 12:15-1:00
12:15 PM, Javits Center Hall, New York City, NY

To the Edge: Protecting Your Video


Surveillance System From Camera to Server

Ready to reduce video surveillance challenges


for your customers?
Americas: 469-828-3380
Contact us for more info. UK/EMEA: 0203 773 3689
Go to http://sp.hotims.com and enter 29 for product information. salesinfo@razberi.net

Untitled-4 1 9/11/19 1:03 PM


COVER STORY

Biopharma Turns to the Turnstile Industry


Another industry that is rapidly turning to turnstile manufacturers is biopharma due to the rise in intellectual property theft. This industry sector
is in a state of improving research and manufacturing methods. Confronted with increasing generic competition and greater regulatory expecta-
tions, it is more imperative today to protect assets as well as staff.
Only fully-locking security turnstiles can be installed in unmanned areas in rear locations as well as multiple levels of a building for added
protections. Many end users are finding that a small field of turnstile manufacturers can meet all of their quality, reliability and security expec-
tations. If they cannot protect these remote locations with a quality device, they must rely on a more expensive, but less efficient solution of
manpower and remote camera viewing.
However, neither value add reliable security. In addition to the biopharma sector, many federal banking institutions and stand-alone corporate
campuses are focused on investing in quality turnstiles with full height-framed forced entry resistant panels that prevent breaches without hu-
man decision-making intervention or potentially climbing over the lower height panels that are a manufacturing limit for most manufacturers.
With physical security professionals and operation vice presidents raising the bar intensely due to the level of asset protection, their purchas-
ing decisions are at the critical decision junction of cost versus security and safety. In making the purchasing decisions at most government and
biopharma facilities, reliability is the key factor to this audience when making a purchase.
Planning on escalating service costs—and shortly down the road (4-5 years)—actually replacing the expensive turnstiles should never be
a consideration when deploying quality, reliable physical-access control equipment. Our current economic state is strong, and most end users
want to buy a turnstile that lasts 20 years, not five years and the good news is that it can be done today without breaking the bank.
Currently there are major changes taking place in the industry, end users and integrators are now easily evaluating the overall costs of the
lower budget products in a very short period of time, which become the absolute most expensive and unreliable to keep operating. Only a product
with a 10-year MTBF should be considered for the front door protection of any facility. As we move forward, turnstile manufacturers will continue
to develop solutions to better protect facilities around the country. However, only the ones that foster a quality-first philosophy will survive and
be around for the long haul.

When it comes to perimeter protection, protecting people is the


“Consistency is the key to suc- number one priority and without the proper internal mechanics
cess and being consistent in in place; turnstiles will not add any value down the road. Quality
is critical to long-term customer relationships and becomes the
every aspect of your business fundamental basis of all buying decisions. When it comes to pur-
chasing and installing turnstiles, being diligent in your research
is the way to rise to the top.” and product reviews is extremely important. Talk to prior cus-
tomers and see if they had any lane failures or replacements over
knowing they will never have to worry about replacing a lane the course of 10 years.
due to malfunction. The best way to keep a 100-percent cus- The test of time is a good indication if your turnstile manufac-
tomer retention rate is to offer customers 100-percent reliability turer is really producing a quality product.
on your product.
It is extremely important for manufacturers to invest heavily Quality Can Help Shape a
in engineering and internal resources. For example, if you have Company’s Brand Reputation
multiple requests from customers that require a specific need such Quality reflects on a company’s brand reputation and can be
as improving throughput on turnstiles in order to maintain the a key differentiator when an end user is looking to purchase a
highest level of security for certain locations, then you need to turnstile. The growing importance of security in our country, and
step up and invest in the proper internal resources to give custom- keeping our buildings secure by being able to track who can enter
ers what they want. and exit a facility, has become a fundamental need for all types
of businesses.
Quality Is the Key to Loyal Customers As a manufacturer, if your company consistently delivers what
Customers will pay more for a product or service that they feel it promises, your customers are much more likely to refer you to
exceeds the industry standard. If a customer knows that a prod- other customers and be your voice in the industry. This can help
uct is top quality, typically they will not mind paying more for you build brand awareness and credibility in the industry without
it if required. As we all know, buying a cheaper product can spending a fortune on advertising. Let your customers be your
end up costing you more money in the short and long-term. By advertisement.
investing in a quality turnstile up front, you are saving your- Consistency is the key to success and being consistent in every
self from costly repairs from product failures that put people’s aspect of your business is the way to rise to the top. It is also
safety in jeopardy. important to bring disruptive technologies to the market that are

18 1 0 1 9 | S E C U R I T Y T O D AY

1019sec_016_020_Stoll_v3.indd 18 9/13/19 2:47 PM


Protect your equipment from tampering and extreme conditions!

Non-Metallic Enclosures
Waterproof, Impact-Resistant, Non-Corroding and Non-Conductive

Over 80 Models In Stock


including air-conditioned, heated
and fan-ventilated models

Mount wireless equipment inside


these UL Listed, NEMA rated and
easily installed enclosures

Clear doors, internal panels or shelves,


pole-mount kits, lock kits, graphic screening
and customization available

MADE I N T
LY H
UD

EU
PRO

SA
FO

S!

R
OV AR
E R 3 0 YE

You name the box, can, cabinet or enclosure: Mier Products has you covered!
1-800-473-0213 | info@mierproducts.com | www.mierproducts.com
Go to http://sp.hotims.com and enter 2 for product information.

Untitled-2 1 1/10/19 10:39 AM


COVER STORY

out of the box and different then what everyone else offers. Qual- Industry Specific Solutions
ity has to be the main driver and philosophy of any manufacturer Producing industry-specific solutions is also an important factor
and bringing a turnstile product to market that can be counted for turnstile manufacturers. When it comes to school security,
on 365 days a year without any failures should be the goal of any turnstiles that can accommodate forced-entry resistant glass—
turnstile company. school guard glass—can be beneficial. The term “school guard
glass” is something that will become extremely popular over the
Exceeding Industry Standards next few years.
Adhering to an industry-quality standard is an important aspect More schools will be implementing bullet-resistant glass at
of quality control. How turnstile manufacturers handle quality entry points with the intention of protecting and saving lives. A
control internally is something that a potential customer should Dual Portal Mantrap Turnstile can be used at critical checkpoints
look at closely. What systems and processes are in place to ensure and can handle a full-height school guard glass set of moving
quality products are produced and delivered consistently? panels, which is an important factor for schools. Only moving
A manufacturer who invests heavily in internal resources panels with a compound motion will keep the leading edge of
such as engineering, quality control, R&D and production man- the barrier midway along the passageway while storing the panels
agement, has a better chance of being a company that exceeds parallel to the passageway. This functionality provides the safest
industry standards. In addition, testing is a huge component of and widest passageways (up to 42” clear).
quality. All mechanics inside the cabinets should be tested for As well as unprecedented ADA compatibility, particularly with
years to ensure that everything is working properly. Custom- service dogs and wheelchair footrests in bi-directional traffic.
izing a turnstile solution while still adhering to strict quality As we move forward, turnstile manufacturers will continue to
guidelines is just as important. Offering different shapes, mate- develop solutions to better protect facilities
rials, finishes, features and items such as companion walls and around the country. However, only the ones
matching structures all need to come together to seal the deal. that foster a quality-first philosophy will sur-
Turnstiles that are poor quality increase costs not only for cus- vive and be around for the long haul.
tomers, but the manufacturers who will have to scrap defective
products and sometimes pay additional production costs to re- Michael Stoll is the vice president of technical
place broken turnstiles. sales and marketing at Aeroturn.

I WANT YOU
TO BUY AMERICAN!
Our Steel Gooseneck Pedestals are
Made in America from American Steel
Our Lexan Polycarbonate
Housings are
Made in America from
American Plastic Resin

Stop Feeding the Foreign Beast


To Save a Buck!
www.thehousingcompany.com - sales@thehousingcompany.com - (770) 529-1040

Go to sp.hotims.com and enter 24 for product information.


Untitled-2 1 3/12/19 11:00 AM

20 1 0 1 9 | S E C U R I T Y T O D AY

1019sec_016_020_Stoll_v3.indd 20 9/13/19 2:47 PM


THIS CENTURY’S BOOTH
TURNSTILES #550

Aeroturn designs, manufactures, tests, delivers and installs the world’s only Zero-Maintenance
standard and custom turnstiles. The company has not stopped delivering quality turnstiles
DQGVHUYLFHVRYHUWKH\HDUVWRLWVKLJKSURȴOHFXVWRPHUVLQDZLGHYDULHW\RIYHUWLFDOPDUNHWV
that includes commercial, private, government, industrial, bio-pharma and education.

WHY CHOOSE AEROTURN:


• Top Tier In-House Engineering Team • 5-year Zero-Maintenance Warranty
• 100% Secure & Reliable Turnstile Solutions • Factory Direct Delivery & Installation
• 100% made in USA Turnstiles • 20-Year Minimum Expected Service Life
• 10 Million Passages Guaranteed • On-site Training & Demonstrations Available

Visit booth #550 WRVHHOLYHGHPRQVWUDWLRQVRIRXUXQLTXHWXUQVWLOHVDQGVHHȴUVWKDQGZK\RXU


WXUQVWLOHVDUHWKHRQO\FKRLFHIRUSHULPHWHUSURWHFWLRQ

&RQWDFWXVDW203-262-8309 or 203-513-1124, or visit www.aeroturn.comWRVFKHGXOHDQRQVLWH


GHPRQVWUDWLRQ)LQGRXWZK\RXUWXUQVWLOHVDUHWKHRQO\FKRLFHIRUSHULPHWHUSURWHFWLRQ

5HSUHVHQWHG([FOXVLYHO\E\

3KRQH 3KRQH
(PDLOVDOHV#WKLQNUHSVFRP (PDLOLQIR#LQIXVLRQGLUHFWFRP MADE IN THE USA

www.aeroturn.com
Go to http://sp.hotims.com and enter 8 for product information.

Untitled-3 1 9/5/19 10:54 AM


TR A N SP OR T A T ION S EC U RI T Y

welcomia/Shutterstock.com
Theft on Wheels
Cargo theft accounts for as much as $30 billion in annual losses
By John Chigos

O
ddly enough, in a world where virtually any trailers and the escape vehicles have one thing in common: license
item is only a mouse click and 24-hour delivery plates. As such, automatic license plate recognition (LPR) tech-
window away, we tend not to think much about nology can be employed to mitigate theft, recover lost cargo and,
how our merchandise gets from some ware- most importantly, bring the perpetrators to justice.
house to our front door. Unfortunately, there
are thieves who do. Preventing Cargo Theft with
While inconsistencies in reporting make it difficult to assign Improved Perimeter Security
specific numbers to cargo theft, Loss Prevention magazine recent- In a report on cargo theft in 2017, the FBI found that nearly 40
ly reported that cargo theft accounts for between $15 billion and percent of all cargo thefts that year occurred in parking lots or
$30 billion in losses annually.1 As for some recent statistics, trans- garages.4 That means thieves were able to commit their crimes
portation trade magazine Transport Topics cited a report from more or less at their leisure, either by stealing trucks/trailers or
the SensiGuard Supply Chain Intelligence Center that found U.S. stealing cargo from them. Even if there was surveillance technol-
cargo thefts increased by 25 percent in Q1 2019, with the average ogy, the perpetrators could have obscured their faces with hooded
loss being nearly $117,000.2 sweatshirts, hats or masks, making them difficult to identify—
When it comes to cargo theft, thieves certainly have ample op- much less apprehend. In short, they committed a crime that ex-
portunity. According to the Bureau of Transportation Statistics perts could argue was relatively low-risk.
(BTS), the trucking industry accounted for 11.5 billion tons of LPR could increase that risk significantly while making it
freight valued at nearly $12.5 trillion in 2017.3 possible to catch the thieves in the act. That’s because cargo
Regardless of how thieves choose to take the cargo—by pil- thieves can’t transport any meaningful amount of cargo on foot.
fering trucks and trailers left in parking lots or executing violent They either need to steal a truck/trailer or need a vehicle of their
hijackings that also risk the lives of drivers—both the trucks/ own on the premises in order to efficiently transfer the stolen

22 1 0 1 9 | S E C U R I T Y T O D AY

1019sec_022_024_Chigos_v2.indd 22 9/13/19 2:30 PM


SAFETY IS AFFORDABLE WITH GARRETT’S
NEW MZ 6100 WALK-THROUGH
• Multi-zone detection technology
• Highly visible LED indicators
• Special programs for schools, special
events and other key applications
• Broad discrimination and sensitivity
selections available
• Budget friendly and simple to program

Let Garrett Metal Detectors help pinpoint potential threats at your facilities.

800.234.6151 • 1.972.494.6151
Go to http://sp.hotims.com and enter 19 for product information. Visit garrett.com to learn more Made in the USA

Untitled-3 1 5/31/19 12:17 PM


TR A N SP OR T A T ION S EC U RI T Y

goods before making their escape. “Cargo theft is no small criminal


An LPR solution using surveillance cameras that cover the en-
tire parking lot or garage as well as the entrances and exits can matter. The losses number in the
capture the license plate of any parked truck or trailer on the lot tens of billions of dollars annually
when it passes a surveillance camera. If the truck or trailer is on a
permission list, meaning it is supposed to be exiting the property,
while the thefts are enacted by
the LPR system will simply log it. If it’s not, the system can be organized networks of criminals.”
configured to send an alert via text, email or telephone to secu-
rity personnel, facility managers—even the police, if the customer Naturally, law enforcement officers who use LPR to inter-
chooses. This lets the right people know that at a minimum, a cept a stolen truck or trailer will also be able to apprehend the
truck/trailer is exiting the property when it is not supposed to. On- perpetrators.
site security can intervene, facility personnel can come to the site
to investigate, and police can be dispatched quickly to the scene. Bringing Cargo Thieves to Justice
As for unauthorized vehicles entering the premises, the LPR While arresting the thieves and recovering cargo can feel like a
system can identify them and send similar alerts when the vehicle victory—and to be clear, it definitely is—the case does not end
passes a camera, either at an entrance or elsewhere within the there. Instead, prosecutors have to begin their work building
parking lot. In some cases, it can capture the plate’s state jurisdic- cases against the suspects. This is no small part of the process,
tion as well as the vehicle make. It will often include an actual as cargo theft is often the work of organized crime, or at least
image of the plate and the vehicle, time-stamped for authenticity. organized rings of thieves. In 2018, for example, law enforcement
LPR can even be deployed to address the most brazen heists. charged 14 individuals in Florida as participating in a cargo theft
Some thieves will impersonate drivers and enter cargo facilities in ring spanning Florida and Georgia.5
an attempt to haul away a trailer full of goods before anyone no- At this point, LPR can provide crucial evidence to prosecutors
tices. However, LPR can thwart this scenario. Because legitimate as they build their cases. Because LPR data is time-stamped, it
drivers still make honest mistakes, like hooking up to the wrong can provide a complete timeline of events, from the theft itself to
trailer, many cargo companies use LPR to identify the truck the fencing of the goods. Furthermore, because the cameras used
plate, trailer plate and trailer ID number to ensure that the right in citywide LPR surveillance have known locations, prosecutors
driver leaves with the right cargo. By extension, this approach can build a map showing where and when the vehicle traveled. Fi-
can be used to keep an opportunistic cargo thief from appearing nally, because LPR can capture actual plate images, there can be
legitimate and leaving the facility with a trailer. no mistake about the identity of the vehicle. This is important, as
authorities could be challenged on the basis of “all trailers look
Recovering Stolen Cargo alike.” The case is made even stronger by the correlation the sys-
tem can make between the trailer ID and its license plate.
via Actionable Data
Cargo theft is no small criminal matter. The losses number in
In its 2017 cargo theft report, the FBI said that of all the cargo
the tens of billions of dollars annually while the thefts are enact-
stolen, only about 26 percent was recovered. For thieves to quick-
ed by organized networks of criminals. Fortunately, license plate
ly fence stolen merchandise makes sense, as it makes it harder to
recognition can be a tool for preventing the crimes from occur-
track or associate with the thieves, and it quickly gives the thieves
ring, recovering the lost cargo and prosecuting the perpetrators.
the payday they were looking for. As such, finding the stolen
truck/trailer as quickly as possible can give authorities an edge in
John Chigos is the founder and CEO of
recovering stolen goods.
PlateSmart.
LPR can help this cause in a number of ways. First, using
the aforementioned example of truck or trailer theft, local law
enforcement that has deployed LPR citywide can monitor for
the stolen vehicle after they are notified of the theft. Authorities 1 Bill Turner and LPC, “Cargo Theft Statistics: Unre-
themselves would add the stolen vehicle’s license plate to a “ho- ported Incidents May Greatly Understate the Num-
bers,” Loss Prevention Media (blog), September 5, 2018,
tlist” of vehicles that law enforcement should be on the lookout https://losspreventionmedia.com/unreported-cargo-theft-
for. When the license plate passes a surveillance camera and the incidents-make-it-difficult-to-grasp-scope/.
LPR system identifies it, the system automatically pushes alerts
2 Dan Ronan, “Cargo Theft Cases Rise in 1Q,” Transport Topics, June 26,
to patrol officers with the location data. Armed with that infor-
2019, https://www.ttnews.com/articles/cargo-theft-cases-rise-1q.
mation, officers can follow the movements of the stolen vehicle
and work to intercept it—before the cargo is fenced. 3 “Freight Shipments by Mode,” Bureau of Transportation Statistics, accessed
As an investigative tool, LPR can also be used to identify the July 29, 2019, https://www.bts.gov/topics/freight-transportation/freight-ship-
ments-mode.
cargo that has been stolen. Remember that many cargo compa-
nies use LPR to tie the truck, trailer and cargo together. Using 4 “Cargo Theft, 2017,” 2017 Crime in the United States (Federal Bureau of
the information about the trailer, such as its ID number, the cargo Investigation), accessed July 29, 2019, https://ucr.fbi.gov/crime-in-the-u.s/2017/
company can tell police what kind of goods were stolen. This in- crime-in-the-u.s.-2017/additional-data-collections/cargo-theft/cargo-theft.pdf.
formation tells authorities where and how merchandise might be 5 “14 People Charged in Multi-Million Dollar Cargo Theft Ring,” News, NBC
fenced so that they can be monitoring those distribution chan- 6 South Florida, October 22, 2018, http://www.nbcmiami.com/news/local/14-
nels, recover the goods and make arrests. People-Charged-in-Massive-Cargo-Theft-Ring-498247951.html.

24 1 0 1 9 | S E C U R I T Y T O D AY

1019sec_022_024_Chigos_v2.indd 24 9/13/19 2:30 PM


Go to http://sp.hotims.com and enter 3 for product information.

Untitled-5 1 8/21/19 2:49 PM


BORDER SECURITY

jamesteohart/Shutterstock.com
Smart City Technologies
How solutions are deployed to ensure safety and security at the border

T
By Kevin Taylor
wo of the biggest trends today, particularly in the city. With the increasing number of devices and systems that can
security surveillance and IoT realms, are border be integrated and interconnected, the size and scope of smart city
security and the emergence of local governments applications is seemingly only limited by the imagination, ingenu-
transforming their communities into smart cities. ity, and, oh yeah, the budget and/or available funding.
On the surface, these two may seem to have little, if Based on these descriptions, it may be hard to imagine where,
anything, in common. But that isn’t necessarily the case. if at all, the two worlds of border security and smart cities would
intersect. Upon closer examination, however, there are similari-
National Security or Humanitarian ties in some of the technologies and systems that are used for
Border security can be seen as a humanitarian issue, a national each of these applications. So, while the actual use cases and ap-
security issue or even a combination of the two. Regardless of plications of the technology may vary, they are more similar in
how you balance your viewpoint, border security is certainly im- function than they appear at first glance.
portant to countries and their citizens. Without a doubt, there The Department of Homeland Security (DHS) Digital Video
is heightened public awareness about securing national borders Quality Handbook recognizes three primary categories for video
around the world. analytics: real-time situational awareness and incident response,
Within smart cities, there are a number of initiatives that can non-real-time forensic analysis/digital media content search, and
be undertaken to address the challenges facing a particular com- business intelligence. For our purposes, we will examine the first
munity. For some people, the most important aspect of smart cit- and third of these.
ies is a comprehensive energy plan. For others, it’s public safety.
Still others see a shared services hub, enabling bi-directional ex- Real-Time Situational Awareness
change of data and information between citizens and departments and Incident Response
of public services, as the most crucial part of a smart city. These In border security, real-time situational awareness can be used
are just a few of the many sub-segments that can make up a smart with perimeter detection analytics to notify an operator if an area

26 1 0 1 9 | S E C U R I T Y T O D AY

1019sec_026_027_Taylor_v2.indd 26 9/13/19 2:32 PM


Brought to you by Volume 9 | Issue 3 | October 2019

Analytics-Driven Solutions
Selecting technology that is a sound and reliable investment
GS12

1019gss_GS001_v2.indd 1 8/28/19 10:44 AM


SAFETY IS AFFORDABLE WITH GARRETT’S
NEW MZ 6100 WALK-THROUGH
• Multi-zone detection technology
• Enhanced zone lights and LED visibility
• Special programs for schools, special
events and other key applications
• Broad discrimination and sensitivity
selections available
• Budget friendly and simple to program

Made in the USA

800.234.6151 • 1.972.494.6151 Visit garrett.com to learn more

Garrett_MayJune_GovSec_2019.indd 1 4/11/2019 1:22:56 PM

Untitled-1 1 4/16/19 12:25 PM


See the
product de
mo:

H5SL Camera Line


GSX 2019
Booth 723
Value and Versatility, Combined

The H5SL camera features wide and long-range lens variants that are available in a variety of
resolutions for clear and detailed imaging. It is one of our easiest-to-install cameras, providing
you with a simple, flexible and cost-effective security solution.

Multiple Lens Options


Choose from various lens types, including a new
long-range lens that allows you to see with more
clarity at farther distances.

Audio Capabilities
Incorporate audio and configure input/output actions
and alarms so that you can respond to events faster.

Ease of Installation
Simple and intuitive to install, with a modular
design that easily snaps into the base of your
choice, helping you to get up and running in minutes.

Patented Bandwidth Saving Technology


Our HDSM SmartCodec™ technology helps you save
on both storage and network bandwidth, helping
keep internet connectivity costs down.

avigilon.com/h5sl | asksales@avigilon.com

Product features and functionalities may not yet be available and, if and when available, may not be as depicted. Images have been simulated for illustrative purposes.
© 2019, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo and HDSM SmartCodec are trademarks of Avigilon Corporation.

Untitled-4 1 8/23/19 1:08 PM


E d i t o r ’s N o t e GOVERNMENT SECURITY
October 2019
By Ralph C. Jensen

EDITORIAL STAFF

Selecting the Proper Technology Editor-in-Chief Ralph C. Jensen

B
Associate Content Editor Haley Samsel
E-news Editor Brent Dirks
ack in the day, talking about to resolve any irregularities to assist first
government security was all the responders.
ART STAFF
rage. In fact, it was about cameras, White delves into several key topics that Art Director Dale Chinn
software and access control. All these are pertinent to the government security
things were and are still vitally important. The market. He will breaks down how to enhance PRODUCTION STAFF
chatter today is all about cybersecurity and safety with video analytics, the tool’s Production Coordinator Teresa Antonio
selecting solutions that are technologically ability to analyze data to extend beyond
sound, and offer a reliable investment. safety, and finally a recap on the fact that EDITORIAL ADVISORY BOARD
This topic is covered in our Cover Story, these capabilities and solutions may seem William Crews, President/CEO, Security & Resilience Constulting
written by Joel White of Bosch Security futuristic, but they are not. They are already LLC, Houston
Rob Hile, General Manager,
and Safety Systems. He writes that video being used in many cities and states across
Florida GC&E Systems Group, Tampa
analytics technology can bring intelligence North America. Alan T. Mather, NASA, Lyndon B. Johnson Space Center, Houston
to infrastructure by delivering solutions for I think you’ll enjoy our cover story, and
traffic flow, which also includes improved the details about the possibilities of a smart SALES
safety, smart parking and data collection. infrastructure to improve safety and security Sam Baird +44 1883 715 697
Safety can be enhanced with video in your jurisdiction. Randy Easton 678-591-2822
analytics. Here’s how it works. Early incident Brian Rendine 972-687-6761
detection enables traffic and transportation
centers to implement necessary workflows INFRASTRUCTURE SOLUTIONS GROUP
President & Group Publisher Kevin O’Grady
Editor-in-Chief/
In This Issue Associate Publisher, Security
Group Circulation Director
Ralph C. Jensen
Irene Fincher
Group Marketing Director Susan May
Group Website Manager Scott Newhouse
Cover Story Group Webinar Administrator Tammy Renne

GS12 Smart Infrastructure


Analytics-Drive Solutions
Selecting technology that is a sound
and reliable investment Chief Executive Officer Rajeev Kapur
By Joel White Chief Financial Officer Sanjay Tanwani
Chief Technology Officer Erik A. Lindgren

Executive Vice President Michael J. Valenti


GS6 Technology at Risk
Are Contractors Ready for DOD’s Cybersecurity Framework?
Technology at Risk REACHING THE STAFF
Staff may be reached via email, telephone, fax or mail. A list
By Stephanie Kanowitz of editors and contact information also is available online at
www.securitytoday.com.
GS8 Cybersecurity E-mail: To e-mail any member of the staff, please use the
Are Contractors Ready for DOD’s Cybersecurity Framework? following form: FirstinitialLastname@1105media.com

The cybersecurity maturity model certification could have a profound Dallas Office (weekdays, 8:30 a.m. – 5:30 p.m. CT)
Telephone (972) 687-6700; Fax (972) 687-6799
impact on the procurement landscape when it goes live next year. 14901 Quorum Dr., Suite 425, Dallas, TX 75254
By Derek B. Johnson Corporate Office (weekdays, 8:30 a.m. – 5:30 p.m. PT)
Telephone (818) 814-5200; Fax (818) 734-1522
GS10 Airport Security 6300 Canoga Avenue, Suite 1150, Woodland Hills, CA 91367

Upgrade Access Status


Georgia airport replaces proprietary system with open solutions
By Kim Rahfaldt

GS16 Facility Security


Stop at the Point of Contact
Making sites less susceptible to vehicle attacks
By Greg Hamm

GS4

1019gss_GS004_Ednote_v2.indd 4 8/29/19 1:24 PM


7800
Electric
Strike

8800 Series Starwheel


Rim Exit Device

74R1
Electric
Device
EX89 Pullman
Rim Exit Device

The RITE pair


for your exit solution
Designed for narrow stile aluminum applications, Adams Rite Rim Exit Devices
have strong, durable construction, a sleek design and are easy to install.
Compatible with the 7800 Electric Strike, the 8800 Series features
the unique Starwheel bolt design that interlocks the door to frame
for enhanced strength and durability. The uniquely rounded EX89
Pullman latch is compatible with the Adams Rite 74R1 for a fully
preload-capable solution that can easily electrify an opening.

Adams Rite exit devices and electric strikes —


providing the perfect pair for your opening. 800.872.3267
adamsrite.com/exits

Untitled-1 1 8/28/19 12:46 PM


Facial Recognition

Technology at Risk By Stephanie Kanowitz

Is banning surveillance tech worth it?

T “Facial recognition technology


he San Francisco Board of Supervisors’ vote to ban the use
of facial recognition technology puts the city at risk of not
only falling behind on technological innovation, but re- is maturing amid calls for greater
turning to what one expert described as archaic processes.
The board’s 8-to-1 vote on the Stop Secret Surveillance ordinance accuracy and transparency.”  
on May 14 affects more than facial recognition tech, however. It de-
fines surveillance technology as “any software, electronic device, sys- Still, the technology is maturing amid calls for greater accuracy
tem using an electronic device or a device that is used, designed or and transparency. The National Institute of Standards and Technol-
primarily intended to collect, retain, process or share” a variety of ogy reported in its “Ongoing Facial Recognition Vendor Test” last
datasets. Those include thermal, olfactory, visual and biometric data, December that the software has improved significantly since NIST
pushing what encompasses “surveillance technology” to well beyond studies of it in 2010 and 2014.
cameras to include cell site simulators, automatic license plate read- The vote also acknowledges pressure from the American Civil
ers, gunshot detection hardware and services, closed-circuit TV cam- Liberties Union’s West Coast offices, which Brooks said tends to be
eras and wearable body cameras. more protectionist than other locations. Matt Cagle, a lawyer with
“For me, this is a bit of an overreach,” said Alison Brooks, research the ACLU of Northern California, told the New York Times last week
director for smart cities strategies and public safety at IDC. “What San that the technology “provides government with unprecedented pow-
Francisco is doing is, in fact, not allowing for the digital workflow to er to track people going about their daily lives. That’s incompatible
occur. I think that they want people to go back to, for example, sort- with a healthy democracy.”
ing through mug shots archaically, manually, and that doesn’t make Part of the problem is that the shortcomings of both the technolo-
any sense from a cost-savings perspective or a work time perspective. gies and uses have been conflated, Castro said. For instance, uproar
It’s just going to cost their police force that much more money to con- over FBI’s surveillance of protesters in 2015 after the death of Freddie
nect all those dots.” Gray was more about improper or unwarranted surveillance of politi-
Some places are experiencing success with facial recognition tech- cal protest than of facial recognition technology itself.
nology. For instance, the Indiana Intelligence Fusion Center has used “Because there is already such organized opposition to some of
it to identify criminals in cases involving petty theft and homicides. this police behavior, the objections are getting tacked on to facial rec-
Additionally, police in Maryland used the technology to identify Jar- ognition because I think that’s seen as an opportunity to push back
rod Ramos, who killed five newspaper employees in Annapolis last on policing in general,” Castro said. “Some of that pushback is com-
year, when he refused to state his name. pletely legitimate, but it’s conflating the technology with the activities,
“It’s not real clear that there’s a good reason for this ban,” said which I think can be separated out.”
Daniel Castro, vice president of the Information Technology and A happy medium exists, but more testing and policies are needed
Innovation Foundation. “There are a whole spectrum of uses for to find it. Castro pointed to a pilot test of real-time surveillance in Or-
facial recognition technology, from very simple organizing photos lando in which police officers tracked themselves—a good example,
to trying to identify a suspect or a witness or anyone involved in he said, of how a police department can start moving forward with
a crime…. There’s lots of benign uses, uses that are completely in the cutting edge of technology before applying it to citizens. (Orlando
line with the manual activity that police do during the day,” such police ended their pilot program with Rekognition in July).
as manually looking through photos or asking the public to help Indeed, the San Francisco board included a number of excep-
identify someone. tions to the ban. For instance, it doesn’t apply to federally controlled
The San Francisco board’s vote is partially in response to studies facilities at San Francisco International Airport and the city’s port,
that have shown that the technology can be inaccurate and racially nor does it restrict business or personal use of the technology.  The
biased. For example, a recent test of Amazon’s Rekognition software ordinance also includes calls for policies that address transparency,
that the company markets to law enforcement, found that it was more oversight and accountability measures as well as rules governing the
accurate in assessing lighter-skinned faces. procurement of surveillance technologies.
“While surveillance technology may threaten the privacy of all of Similar bans were passed in Oakland, Calif., and Somerville,
us, surveillance efforts have historically been used to intimidate and Mass. Earlier this year, and the House Oversight and Reform Com-
oppress certain communities and groups more than others, including mittee held a May 22 hearing on facial recognition software, where
those that are defined by a common race, ethnicity, religion, nation- committee Chairman Elijah Cummings (D-Md.) said lawmakers
al origin, income level, sexual orientation, or political perspective,” largely agree that the technology should be regulated.
according to the ordinance. “The propensity for facial recognition “I think this is an area where it would be helpful for Congress to
technology to endanger civil rights and civil liberties substantially be a little more proactive,” Castro said.
outweighs its purported benefits, and the technology will exacerbate
racial injustice and threaten our ability to live free of continuous gov- Stephanie Kanowitz is a freelance writer based in northern Virginia.
ernment monitoring.” This story first appeared in GCN magazine.

GS6 GOVERNMENT SECURITY OCTOBER 2019

1019gss_GS006_Kanowitz_v2.indd 6 8/28/19 10:46 AM


Untitled-1 1 8/26/19 11:20 AM
Cybersecurity

By Derek B. Johnson

Steve Mann/Shutterstock.com
Are Contractors Ready for DOD’s
Cybersecurity Framework?
The cybersecurity maturity model certification could have a profound impact
on the procurement landscape when it goes live next year

C
ontractors will face big changes and tight timelines next in operation by 2020 [is] going to be difficult,” said Robert Metzger,
year when the Defense Department institutes its new a lawyer specializing in government contracts and commercial litiga-
Cyber Maturity Model Certification framework. An- tion and a consultant who focuses on supply chain security issues.
nounced by DOD officials in June, the framework seeks “Naturally, industry has a lot of questions about the mechanics…
to certify companies’ compliance with federal cybersecurity regula- Companies are understandably uncertain as to how these changes
tions for controlled unclassified information (CUI). It will be used will affect what they’re doing, how they will demonstrate eligibility
to evaluate and rate contractors’ ability to protect sensitive data on a for contracts and what the costs might be upon their operations.”
scale of 1 to 5.
The initial version of the framework is scheduled to go public in Cybersecurity is Not Free
January 2020. By June, its requirements will start appearing in re- High costs, confusing guidance and low return on investment have
quests for information, and it will become a regular feature of defense all been cited as reasons for compliance challenges among defense
procurement by September. That means defense contractors will have contractors. Traditionally, DOD has declined to cover the costs as-
less than eight months to implement the necessary changes to ensure sociated with implementing acquisition regulations related to CUI
that they comply with the Defense Federal Acquisition Regulation cybersecurity, but that has slowly changed over the past 12 months as
Supplement’s and the National Institute of Standards and Technol- military contractors have faced unprecedented attacks from foreign-
ogy’s guidance on protecting CUI. sponsored hackers.
“Any timeline would seem ambitious. One that looks to have this Last year, then-Deputy Secretary of Defense Patrick Shanahan

GS8 GOVERNMENT SECURITY OCTOBER 2019

Untitled-4
1019gss_GS008_009_Johnson_v3.indd 8 8/28/19 10:47 AM
expressed reluctance on the part of DOD to help contractors cover firm Fathom Cyber, told FCW he has serious doubts that many de-
added costs for cybersecurity, saying it should be a baseline expecta- fense contractors will be ready by September 2020. For most com-
tion in contracts. panies, the associated costs are less about assets and technology and
However, at a Professional Services Council event, Katie Ar- more about training employees and allocating personnel to map and
rington, special assistant to the assistant secretary for defense for formalize internal IT policies. The potential for an initial shock to the
acquisition for cyber, announced that the department would allow federal contracting system is real.
contractors to write off a portion of their cybersecurity spending for “I do think that it’s going to hurt us in the short term from a
government contracts, including implementing NIST guidance. product-availability perspective,” said Goepel, who also teaches cy-
Alan Chvotkin, executive vice president and counsel at the Profes- bersecurity at Drexel University’s law and business schools. “The
sional Services Council, welcomed the shift, stating that it would be government is going to miss out on stuff, and there are going to be
contradictory for DOD to refuse to provide financial incentives for companies that go out of business because of this. But in the end, I
cybersecurity while it is also expressing a desire to expand the num- think that it may actually be a better thing for country unfortunately.”
ber of businesses that make up the defense industrial base. Metzger doesn’t go that far but believes a short-term effect could
“To be a smart businessman, let alone a contractor, you ought to be the departure of some companies from the federal contracting
undertake this [level of security] because our adversaries are stealing space. The impact might be hardest on small and medium-sized busi-
everything,” Chvotkin said. “On the other hand, [DOD] is trying to nesses that have fewer financial resources and have typically avoided
entice nontraditional companies and small companies that otherwise the level of scrutiny directed toward large prime contractors.
… might not see the need to incur such significant costs to reach the “I think the short-term impact is that companies of all sizes are
level that is expected as a contractor or subcontractor.” going to be looking at affordable effective ways to improve their cy-
Still, it’s not clear how DID’s reimbursement policy will work, bersecurity,” he said. “Nobody knows exactly today what you will
which contracts it would apply to or what percentage of a company’s need to do to get a security rates score of [1 to 5] ... I’m thinking that
costs would be covered. many companies will be targeting their investments and actions to be
sure that when it comes into place they will get at least a 3.”
A Shake-up of the Contracting Community
James Goepel, CEO and general counsel at cybersecurity consulting Derek B. Johnson is a senior staff writer at FCW.

Online Security Technology Training


Take charge of your security technology training with our online training courses.
Train as an individual or implement a companywide program with a Corporate Account.

Our courses are suitable for everyone in the security


industry. They are available 24/7, making it the most
convenient and cost effective solution for anyone
who wants to improve security knowledge or skills.
Approved for Continuing Education (CE) by various
security associations and government bodies, the
courses include:
+
• CCTV + Digital Video
• IP Networking
• Access Control
• Biometrics Technology
• Fiber Optics
• Basic Electricity
• Wireless Technology

Register today atsecuritytodayacademy.com


W W W . S E C U R I T Y T O D A Y . C O M GS 9

Untitled-4 1 8/21/19 2:28 PM


1019gss_GS008_009_Johnson_v3.indd 9 8/28/19 10:47 AM
Airport Security

By Kim Rahfaldt

Upgrade Access Status


Georgia airport replaces proprietary system with open solutions

V
aldosta Regional Airport in
Valdosta, Georgia offers three
daily commercial flights to and
from Atlanta Hartsfield-Jackson
International Airport, along with general
aviation. The airport contains three runways,
two of which are used by commercial air-
craft. The airport offers ground transporta-
tion, free parking, a Subway restaurant and
many other services, such as hanger space
and flight training, to name a few.
Previously, Valdosta Regional Airport
operated a legacy access control system. The
proprietary system, including the readers,
panels and software, was outdated, making it
difficult and expensive to obtain replacement
parts. Looking for an open solution, Valdosta
Regional Airport turned to Allcom Global
Services for their expertise and upgraded to
AMAG Technology’s Symmetry SR Retrofit
Access Control system with HID readers.
“Symmetry integrates into various video,
intrusion and building automation systems,”
said Kevin Cioffi, the vice president of busi-
ness development in the physical secu- “The security operators found the Symmetry
rity division of Allcom Global Services. “By
choosing an open system, Valdosta has more
solution much easier to learn and use, saving
freedom to research competitive pricing and
alternative options. We are thrilled they have
money and hours in training time.”
chosen Allcom.” the airport’s readers. ing with their old system. Badges are now
“We gutted all the circuit boards and The remaining Airport Operations Areas created on demand and onsite, with no has-
changed to Symmetry panels,” said Tim Reg- (AOA), which are mostly internal doors and sle or extra charge.
ister, the operations manager and airport the main entrance, requires only a proxim- “This Symmetry solution provided us a
security coordinator at Valdosta Regional ity card swipe to open. Thirty-two new HID more economical approach to facilitate the
Airport. “We kept the antennas and how the proximity card readers were installed in total. same thing we used to do with a more expen-
data was transmitted. All the mounts stayed To get the open system the airport re- sive proprietary system,” Register said.
the same; we just swapped in Symmetry, and quired, Valdosta Regional Airport replaced Airport authority employees, TSA, airline
it worked.” older panels. As the system changes and ex- employees, fixed based operators, life flight
The system controls access to the perime- pands, integrating different technologies or helicopter and fixed wing aircraft are all pro-
ter of the airport, including the vehicle access adding more readers will be easy and cost tected by Symmetry. In addition to the perim-
gates and all outside doors facing the Secu- efficient. eter, the solution controls access to all work
rity Identification Display Area (SIDA). The The security operators found the Sym- areas within the airport and to the hangers
SIDA includes all areas that have access to metry solution much easier to learn and located inside the perimeter fence.
the commercial apron and tarmac. The SIDA use, saving money and hours in training
also requires a reader with a PIN-plus-card time. The simple job of creating a badge for Kim Rahfaldt is the director of media rela-
swipe to open, which make up 75 percent of a user was cumbersome and time consum- tions at AMAG Technology.

G S 1 0 GOVERNMENT SECURITY OCTOBER 2019

1019gss_GS010_Rahfaldt_v2.indd 10 8/28/19 10:48 AM


PUSH
TO
EXIT

When we
come together, WAVE TO OPEN

great things
happen

From electric strikes to cabinet locks and maglocks, ASSA ABLOY Electronic Security
Hardware has complete solutions to upgrade access control on any opening.

Discover the difference of our HES and Securitron


product lines at assaabloyesh.com.

Untitled-5 1 12/10/18 1:55 PM


Smart Infrastructure

By Joel White

Christian Mueller/Shutterstock.com
Analytics-Driven Solutions
Selecting technology that is a sound and reliable investment

A
s city streets and sidewalks become progressively more mation for data-driven decision-making.
congested, city planners are facing new safety challenges, As a result, city planners and senior traffic engineers can create a
including distracted pedestrians, a growing numbers of smarter, safer and more sustainable transportation ecosystem.
bicyclists on the road and an increase in public transpor-
tation. At the same time, smart and semi-autonomous vehicles that Reliable Data and Detection
can communicate with each other and with roadside infrastructure Video analytics technology can bring intelligence to infrastructure by
are on the rise in cities and on highways. delivering solutions for traffic flow, improved safety, smart parking
and data collection. Analytics built in to IP cameras enable intelligent
The Right Technology video devices that can send safety risk alerts and deliver valuable data
The challenge for senior traffic engineers and planners is complex. for highway and urban infrastructure planning.
From a broad spectrum of emerging technology coming from new With built-in video analytics on IP cameras, analytics processing
and well-established industry players, how do you choose the right is done at the edge—on the raw video stream at the camera sensor—
technology to improve mobility, safety and efficient use of roadways with no central analytics server required. The key advantages to built-
now and into the future? How do you have a level of assurance that in analytics, as opposed to analytics that are added to the camera af-
the technology selected is a sound and reliable investment? ter the fact or analytics processed downstream on a server, are the
IP cameras with onboard analytics processing capability operat- camera’s architecture, image processing capability and overall system
ing as video sensors are a key component to intelligent transporta- efficiency that is designed from the ground up. Analyzing raw data at
tion systems that help to keep roadways flowing safely and efficiently. the sensor also adds an increased level of precision because the raw
In combination with other systems for city and traffic management, sensor data analyzed is uncompressed with no loss of video fidelity.
smart IP cameras enable detection and monitoring solutions that True analytics at the edge, in the camera, eliminate the need for
instantly alert the right people to safety risks and constantly gather additional computers at the pole or expensive networks for cloud-
information on roadway usage to provide better insights and infor- based analytics while still allowing continuous capture of high quality

G S 1 2 GOVERNMENT SECURITY OCTOBER 2019

1019gss_GS012_014_White_v2.indd 12 8/28/19 10:50 AM


Untitled-4 1 8/23/19 12:18 PM
Smart Infrastructure

data. The result is a distributed network of cameras acting as intel- pedestrians use certain locations to provide insights into possible
ligent processing nodes with no single point of failure, delivering a safety improvements.
cost-effective and reliable video-as-a-sensor solution. Excellent video Multiple cameras can feed data to dashboards that deliver action-
images, intelligent event detection and alerts, and data collection and able information for business intelligence purposes—helping city
aggregation can all come from the single video device. planners understand traffic patterns, congestion points, and more.
With machine learning technology—the latest advancement in Data examples include:
video analytics—cameras can be taught to recognize user-defined • Pedestrian, bicycle, and vehicle counts
object classifiers. For example, machine learning can be used to ac- • Classification of vehicles, such as cars versus trucks
curately count overlapping vehicles queued in front of traffic lights. In • Average speed and direction
many use cases, machine learning capability can improve detection • Road occupancy
accuracy to enable precise vehicle counts with minimal errors. Infrastructure owners can choose whether they want both video
Machine learning also enables customized solutions to solve the and the data or just the data. When only data is needed, low band-
specific needs of cities and transportation departments. For example, width connections can stream it from the sensor into the data ware-
it can detect the formation of icicles or snow buildup on bridges, house, reducing network impact and allowing video to stay private.
overpasses and tunnel openings, where they can pose a significant In busy cities, video analytics can also help monitor parking lot
safety risk to motorists or pedestrians passing underneath. occupancy and curbside parking as well as help enforce no-parking
zones. In lots, cameras can count the number of open parking spaces,
Enhance Safety with Video Analytics specialized spots—such as those for handicap or electric vehicles—or
Improve safety by alerting to risks on the road. Intelligent IP cam- track ingress and egress. The cameras then relay this data to the video
eras deliver automatic incident detection and verification for slow or and parking management systems. Sharing this information, along
stopped vehicles, queues of vehicles at exit ramps, vehicles traveling with alternative parking locations on a dynamic message sign, can
the wrong way, objects in the road—such as lost cargo—and other help drivers find open parking faster, getting them off the road and
traffic events. Alerts can be sent to traffic management centers or, reducing traffic congestion and emissions.
through integration with highway information solution providers, For smart parking applications, machine learning adds the advan-
the IP cameras can trigger third-party systems to notify drivers, im- tage of determining the amount of time a vehicle has been parked
proving situational awareness. and much more. For example, at the airport curbside for passenger
With video analytics: drop-off and pickup, vehicle parking time limit is restricted; machine
• Early incident detection enables traffic and transportation op- learning can detect and alert law enforcement to vehicles that exceed
erations centers to implement the necessary workflows to resolve the maximum time limit. Machine learning analytics technology
road irregularities faster, enable first responders to intervene does not have a timeout dependency as compared to standard analyt-
more quickly, and avoid secondary accidents. ics detections of parked vehicles.
• Integration with dynamic message signs, and dedicated short-
range communication (DSRC) broadcast messages to smart ve- Proven Solution
hicles, ensure drivers are instantly alerted to safety issues. While these types of capabilities and solutions may seem to be part
• Detection of pedestrians in a crosswalk can alert the traffic con- of futuristic solutions, smart connected city and transportation so-
troller to preempt traffic signals to increase safety, enabling smart lutions are already here and are being used in states and provinces
intersection control. throughout North America, whether through full implementation or
• Jaywalkers at night can trigger the IP camera to activate an on- in pilot projects.
board illuminator to make pedestrians more visible to motorists. For example, in one Midwestern state, IP cameras with built-in
• Integration with highway information solutions can broadcast mes- video analytics are helping to improve highway safety by warning
sages to smart vehicles to alert them to the presence of pedestrians drivers of dangers ahead. Some of these alerts include cross-traffic
in the area the vehicle is travelling and display the pedestrian’s GPS warnings, curve-speed warnings, pedestrian detection, queue warn-
coordinates on a live map in the vehicle’s on board unit. ings, work-zone warnings and wrong-way driver detection. Events
detected by the cameras trigger the highway information solution to
Analyze Data to Extend Beyond Safety send messages about these incidents directly into the display units in
With video analytics, the IP camera becomes an intelligent sensor connected smart vehicles. For the majority of unconnected vehicles,
that can classify objects as cars, trucks, bicycles, and pedestrians, and messages are broadcast to dynamic signs and other alert beacons.
detect speed and trajectory. Object classification enables the cameras From improving traffic flow on highways to implementing proj-
to recognize what they are viewing for data-gathering purposes. ects for pedestrian safety initiatives and gathering data for smart in-
Using video as a sensor and software tools for tapping into the frastructure planning, video sensor technology enables a wide range
camera generated metadata, the data can be extracted and stored in of customized solutions to meet the needs of city planners and senior
relational databases allowing city traffic planning directors and senior traffic engineers around the world.
traffic engineers to continuously collect real-time data to analyze flow
patterns on networks of roadways. The camera-generated data can Joel White is the North America vertical marketing manager for
be used for implementing new policies that result in safer and more Intelligent Transportation Systems and Smart Cities at Bosch
efficient intersections. This data can also help them determine how Security and Safety Systems.

G S 1 4 GOVERNMENT SECURITY OCTOBER 2019

1019gss_GS012_014_White_v2.indd 14 8/28/19 10:50 AM


SECURE CLASSROOM IN SECONDS

3 SIMPLE 3 FAST 3 SECURE


FOR EXTREME EMERGENCY SITUATIONS
The Nightlock Lockdown Door Barricade allows a teacher to immediately
lock the door from inside the classroom, eliminating exposure during a
hostile intruder situation. This device makes it virtually impossible for
an intruder to break through an entry door.
• Simply add this safety device to
So
classroom doors afforda

59
ble!
$
• Works with outward and inward

95
swing doors
• No need to replace existing
hardware
• One time solution - easy to install ea.
• Lockdown in seconds

classroomlockdown.com
1-855-644-4856 TOLL FREE

Untitled-9 1 2/6/19 1:23 PM


Facility Security

By Greg Hamm

Stop at the Point of Contact


Making sites less susceptible to vehicle attacks

T
he vast majority of discussions involving security and park- vehicle at the moment of impact. The amount of kinetic energy pos-
ing areas focus on protecting people and property from sessed by a vehicle changes by the square of its velocity. A vehicle
vandalism, theft or violent crimes. Thus, when planning moving at 50 mph has 25 times as much kinetic energy as at 10 mph.
security features for a new or existing parking lot or garage, An armored car weighing 30 times as much as a Toyota moving at 10
the first consideration must be the level of security required for that mph has less hitting power than the Toyota moving at 60 mph.
particular facility. A parking garage for a foreign embassy or federal Because of the relationship of velocity to the total kinetic energy,
courthouse will require far more serious security measures than a mall the security engineer must make every effort to force a vehicle to slow
parking lot. Other primary considerations include the frequency of ve- down before it reaches the barricade.
hicles moving in and out and whether there will be vehicle inspections
performed or a fully automated system at the entrance. Security Starts With an “S”
Straight lines make for faster and easier approaches for vehicles, so
Reviewing Some Basic Physics Principles it’s best to create curves on access roads to your facility as a natural
When evaluating the security risk for a car bomber or crasher for impediment to speeding cars or trucks.
a given facility, focus on the weights and velocities of vehicles that The most frequently used technique is to require a sharp turn im-
could be used to attempt penetration into sensitive areas. A vehicle mediately in front of the entrance. When vehicle speed is reduced
moving towards a barricade has a certain kinetic energy—the major by 50 percent, “hitting power” is reduced four times. If the speed is
measure of how much “hitting power” it possesses. reduced by two-thirds, the force of impact is reduced nine times. Fail-
Mathematically, kinetic energy is derived from the vehicle veloc- ing to understand this and not using the proper equipment to counter
ity and its weight (mass). On impact, some energy is converted to the threat leads to a false sense of security.
heat, sound and permanent deformation of the vehicle. To stop the Upon designing a way to slow down vehicle approach, precau-
vehicle, the stopping point must absorb the remainder. tions should also be taken so that the attacking car cannot make a
The remaining energy depends primarily on the velocity of the “corner cutting shot” at a barricade. Often, only a light post defines a

G S 1 6 GOVERNMENT SECURITY OCTOBER 2019

1019gss_GS016_018_Hamm_v2.indd 16 8/28/19 10:50 AM


Security Today | Networking Security | Campus Security & Life Safety | GovSec

www.securitytoday.com

Technology | Education | Solutions


September 2019 | Vol. 23 No. 6

Deploying
IoT Devices
Best practices for managing
and securing IoT networks

securitytoday.com campuslifesecurity.com

Covering the Whole


Security Market
Every Day
Untitled-1 1 8/29/19 11:43 AM
Facility Security

gating. When a system suspends a tailgating car, it’s literally doing its
job—stopping an unauthorized vehicle from entering a facility. Most
vehicle barrier systems are set up to allow only one car at a time. How
do you avoid these “accidents,” yet avoid weak links? Employ loop
detectors. These little sensor subsystems determine when the first car
has passed by and automatically and immediately drop the gate or
raise the bollards.
Another common planning deficiency occurs when designers
choose non-certified barriers or barricades. No area is more critical
to the vehicle barrier selection process than testing. Without adequate
testing, there is no assurance that the barrier will resist the threat.
Certified equipment has been tested and proven to work under
extreme conditions, giving planners the confidence they rely on. Test-
ing is normally done by an independent testing company or govern-
“Barriers, bollards and other vehicle ment agency, such as the U.S. Department of State (DOS) and mili-
tary. Comprehensive reports of test results are issued and are available
control equipment discourage attempts from the testing agency or manufacturer.
to cause harm and encourage employees Example: Barricades Bolster Security
and visitors to feel secure.” at Miami Federal Courthouse
turning point and a speeding car can take it out and not even hesitate. To regulate traffic, provide a safe place to transfer prisoners and offer
Knolls and other impediments should be considered. secure underground parking for judges, the Miami Federal Court-
Where turns cannot be created, many are turning to an “Early house installed hydraulic barricade systems. Each 10-foot wide barri-
Warning System.” This system is best applied at locations where there cade is a moving ramp that is surface-mounted and rises to 18 inches
is a long and relatively straight run into the facility that would allow a when activated.
large vehicle to build up its speed. A vehicle traveling at 60 mph can In normal operation, these barricades stay up and are lowered
cover 88 feet per second so it is imperative that guards are alerted only to allow passage of authorized vehicles. The speed at which the
immediately. barrier deploys can be fully adjusted to the security site and facility
Intelligent vehicle systems can check the velocity of an approach- requirements. Security personnel at the Miami Federal Courthouse
ing vehicle, or set off an alarm if a car is coming down the wrong can have different speeds on different barriers and change the speeds
lane. Intelligent systems will also protect innocent drivers who might as security warrants.
be trapped between barricades and a speeding, approaching vehicle. To ensure the units will not rise if a car is on or in the way of the
Intelligent vehicle systems also are able to tell if a vehicle is too large barrier, the Miami Federal Courthouse barriers use the afore-men-
to enter a parking structure, potentially saving countless dollars on tioned loop detectors. The loop detector holds the barrier open until
structural repairs. the last part of the vehicle has passed the closing loop, located beyond
Continuous Doppler Radar picks up instantaneous changes in ve- the unit. The detector then gives a pulse on departure, instructing the
locity and addresses the threat scenario in which an inbound vehicle barrier to rise after the vehicle has passed.
approaches at normal speeds and then accelerates to commence the
attack. It will also warn if a hidden vehicle suddenly passes a larger Vehicle Attacks: A Growing Threat
vehicle and attempts an attack. Once alerted, the guards can take ac- Although the obvious goal of such a system is to protect when as-
tion, including raising the barrier systems. saulted, the larger objective for the system is to deter. Barriers, bol-
Security equipment for parking facilities ranges from tire-punctur- lards and other vehicle control equipment discourage attempts to
ing devices to simple swing arm gates to pop-up crash barriers built cause harm and encourage employees and visitors to feel secure.
into the roadway that will stop errant vehicles dead in their tracks. Whether building a new parking structure, or retrofitting an old
one, there are a myriad of ways to protect people and property by
Use the Barrier You Choose using everything from common sense design to the latest technol-
Today’s barriers and bollards are capable of stopping and destroy- ogy innovations. When integrated properly into a total system, in-
ing a truck weighing up to 65,000 pounds and traveling at 50 mph. cluding fences, lights, alarms, gates and other security components,
Such barricades can be raised or lowered at will to stop traffic or let it well planned vehicle barrier systems are a key measure in preventing
through. In an emergency, the thick steel plates or bollards pop out of threats to sensitive resources.
the ground within 1.5 seconds. It’s critically important to consider supplemental gate and fenc-
With any barrier system, frequency of operation is also a key con- ing reinforcements that may be necessary to optimize vehicle bar-
sideration. For example, a sliding gate would not be practical for a rier effectiveness. Failing to understand this aspect, and not using the
business that requires admitting and releasing hundreds of employee proper equipment to counter the threat, may lead to a false sense of
cars per day. In reality, due to the inconvenience to the employees, security.
most operators would simply leave the gate open.
With vehicle barriers, the most common security breach is tail- Greg Hamm is the vice president of sales & marketing at Delta Scientific.

G S 1 8 GOVERNMENT SECURITY OCTOBER 2019

1019gss_GS016_018_Hamm_v2.indd 18 8/28/19 10:50 AM


Fiber Optic Connectivity and Ethernet Network Solutions

ComNet Fiber Optic and Ethernet Products


are on the GSA Schedule

ComNet is Your Source for Made in the USA Transmission Solutions


Available under GSA Contract GS-07F0398W

Signal Transmission Solutions for:


• Security
• Intelligent Transportation Systems
• Control & Automation
• Border and Perimeter Protection GS-07F-0398W

ComNet: Delighting the Customer


 Free Design Center Application Support  The Industry’s Broadest Line of Fiber Optic and
 Pre and Post Sale Technical Support – Ethernet Transmission Products
US-Based Staff  Lifetime Product Warranty
 Our “Customer is Always Right” Attitude

View the Full Product Line at comnet.net and Identify the Fiber Optic, Copper
or Wireless Connectivity Solution for your Application
Contact the ComNet Design Center Now for Free Design Assistance.
Call 1-888-678-9427 or 1-203-796-5300 or email designcenter@comnet.net

Visit www.comnet.net Email info@comnet.net Phone 1-203-796-5300 Toll Free 1-888-678-9427

Untitled-2 1 8/21/19 11:38 AM


They get smooth-flowing traffic.

You get safety alerts and data to


maximize mobility.
Bosch empowers you to build a safer transportation
ecosystem with analytics-driven video solutions.
Bosch intelligent IP cameras enable video as a sensor
technology that delivers automatic incident detection
and data on roadway usage and traffic flow for better
highway and urban infrastructure planning.

Learn more at bit.ly/BoschSolutionsforITS

Untitled-1 1 8/28/19 1:17 PM


has been breached or if there are people in an established sterile “We will only see the proliferation
zone where no one is permitted.
From a smart city standpoint, this situational awareness could of IoT devices continue to acceler-
be provided by anything from video analytics that recognize anom- ate use cases in virtually all vertical
alies in patterns of crowd gathering or flow to audio analytics that
detect things such as gunshots or vehicular accidents. It could also
segments, including border security
include environmental alerts such as flood detection, or anything and smart cities.”
else that classifies as an event and raises operator awareness.
As important as detection analytic technology may be in both cannot be overcome as easily without hard-wired infrastructure.
use cases, of equal importance is the process that flows behind it This is where lighting comes in. Light poles can provide the
for the validation of, and the response to, detected events. To be necessary power infrastructure and vertical real estate to accom-
a true “solution,” situational awareness analytics must be sup- modate these devices and sensors, many of which will be used to
ported by pre-determined, and periodically practiced, validation drive the analytics that will provide valuable intelligence.
and planned response procedures. Lighting is a critical aspect not only of security in both bor-
der and smart city applications, but it also offers a high aesthetic
Business Intelligence value, particularly in urban areas. The trend to upgrade aging
Retailers have long employed analytics to help improve their busi- lighting fixtures from high intensity discharge (HID) lamps, to
ness. Using analytics to gather data, retailers can learn how peo- state-of-the-art light emitting diode (LED) luminaires, provides
ple move throughout their stores and how long they wait in line gains in power efficiency, improved color rendering index from
to check out, among other factors. When the data is presented in the light source, and an ideal opportunity to deploy IoT sensors
graphical form, intelligence is gained which allows them to make in conjunction with lighting upgrades.
actionable decisions regarding merchandising, staffing and opti- This potentially creates a network of “smart poles” that al-
mizing their floor space to create the best possible experience for low sensors and communications antennae to be mounted at a
their customers. height that avoids common attempts of vandalism and provides
There is great potential for these types of “business intelligence” open line-of-sight between wireless communication antennae in
analytics both in border security and smart cities. Stakeholders in- most environments. The poles are also potentially at a height
volved in both use cases can use various IoT sensors to acquire that is more likely to be a safe and healthy distance from radio
data, therein enabling officials to recognize trends, build effective frequency (RF) exposure—though there is lots of debate regard-
processes and ultimately make informed data-driven decisions. ing this, particularly in the telecommunications and in the health
Along a border, officials might use this information to know and safety fields.
how seasonal patterns and weather changes affect which paths In both border security and smart cities, we’re seeing greater
are taken by individuals crossing a border. This allows them to use of these smart poles, which offer the mounting real estate and
make predictive decisions about where to position agents to pro- infrastructure to deploy a wide variety of technologies and de-
duce desired results. vices—everything from servers and processing hardware to public
A smart city could deploy similar technologies to collect data Wi-Fi radios, LTE, and 5G (emerging) technology accommoda-
that will help make decisions for traffic and urban planning. For tions. Those emerging technologies have use cases such as envi-
example, to promote multimodal mobility, would it be beneficial ronmental sensing, audio analysis, traffic, mobility, security and
to build a walkway over a street rather than having pedestrians public safety.
cross at street level, and where would it be best located? Addition- And from a funding standpoint, because LEDs use less power
ally, data about the number and types of vehicles traveling along than HIDs, the resulting cost savings can be used to justify capital
a corridor could be used to determine if lane accommodations expenditures on these other technologies that will enhance both
need to be changed to improve traffic flow. Transportation agen- border security and smart city applications.
cies have collected this data via manual processes for years, but Although the use cases and desired results in border security
IoT and the emergence of analytics now allow them to automate and in smart city applications seem worlds apart, the integra-
the process. tion skillsets, disciplines and technologies deployed can actu-
While the data may drive completely different decisions, the ally be quite similar. By updating networks with IoT sensors,
data is converted to intelligence in both cases, justifying decisions analytics and LED lighting, positive results can be achieved in
that increase efficiency and drive better results. both situations.
Based on trends already in motion such as improved capabili-
Lighting ties in edge processing, advancements in machine learning-based
In addition to the variety of analytics that provide real-time and artificial intelligence applications, and improved performance of
business intelligence, a third key area where similarities exist be- wireless networks, we will only see the prolifera-
tween border security and smart cities is lighting. Before delving tion of IoT devices continue to accelerate use
into lighting itself, it’s important to note that a primary challenge cases in virtually all vertical segments, including
with the proliferation and mass deployment of the Internet of border security and smart cities.
Things (IoT) is finding the infrastructure to both power sensors
and to then move data from the devices. Wireless technology can Kevin Taylor is the business development man-
accommodate data movement in some cases, but power challenges ager, Smart Cities, at Axis Communications Inc.

W W W . S E C U R I T Y T O D A Y. C O M 27

1019sec_026_027_Taylor_v2.indd 27 9/13/19 2:32 PM


PRIVACY ISSUES

jamesteohart/Shutterstock.com
Ushering in a New Era
Consumers are more concerned with how their activities are being tracked
By Neil Huntingdon

P
rivacy issues continue to dominate headlines as The Next Generation of Security
the world’s biggest companies are being chal- Lidar technology promises to usher in a new era of anonymized
lenged on the ways they collect and use people’s security. While lidar is best known for enabling cars to autono-
data. Consumers are growing more concerned mously navigate, lidar is ideal for a wide range of use cases includ-
about how their activities are being tracked across ing security, industrial, IoT, mapping and transport applications.
the web as companies sell information to advertisers for a profit. Lidar works by using lasers to calculate the distance between
At the same time, the public is worried about how different itself and other objects. This creates a point cloud with a three-
types of technologies are tracking them offline. Facial recognition dimensional representation of people and objects in an area.
technology, powered by artificial intelligence to match images With its high-resolution imaging, lidar offers a number of ad-
against various databases, has become particularly controversial. vantages over both traditional security systems and modern facial
While consumers are fine with some implementations of facial recognition systems. However, the biggest differentiator is that
recognition technology, such as unlocking their smartphone or lidar enables robust surveillance while still protecting people’s
tagging their friends in photo albums, the bigger concern is how privacy. With the ability to detect, track and classify objects, li-
it could be used for surveillance. dar systems can be configured to only highlight potential threats,
In May, San Francisco banned the use of facial recognition guaranteeing the anonymity of people or objects not deemed a
technology by city agencies, as legislators argued that the technol- threat. While lidar does not show facial features, the imaging data
ogy infringes on people’s privacy. Other cities are also considering is high resolution and 3D, providing valuable information about
regulating facial recognition technology as the debate around it an object’s location, velocity and size.
continues to heat up. As businesses look to upgrade their security Compared to current technologies where everyone’s biometric
systems, privacy concerns will increasingly be a key factor in pur- data is captured and stored, regardless of whether they are in-
chasing decisions. So what alternatives do businesses have as they volved in a security incident, lidar is a considerable step forward
work to keep people safe and protect their assets? for anonymized surveillance.

28 1 0 1 9 | S E C U R I T Y T O D AY

1019sec_028_030_Huntingdon_v2.indd 28 9/13/19 2:36 PM


2019 WINNER

WINNER
Residential &
Monitoring
Solutions

Go to http://sp.hotims.com and enter 10 for product information.

Untitled-4 1 9/6/19 1:50 PM


PRIVACY ISSUES

Security Pain Points “It’s clear that lidar represents a step


Currently, some of the most commonly deployed technologies in
security systems are radar, cameras (including thermal cameras)
forward for the security industry,
and microwave sensors. While they each have a number of advan- enabling companies to accurately
tages, none can form a complete and robust system alone, as each
track and detect threats in real time
technology has its own shortcomings, including:
• Low accuracy: Radar, for example, is not able to deliver reso- without alert fatigue.”
lution high enough to accurately identify potential threats.
• Constrained operating environment: Most cameras require lance system is quite competitive compared to other security solu-
good lighting conditions to collect high resolution data. Ther- tions. As lidar starts to be produced at scale for autonomous cars
mal cameras can see in the dark but will struggle with situa- and other smart machines, the costs will be driven down further.
tions where the thermal signature of the target object matches
with that of its surroundings. Microwave sensors are affected Setting up Lidar Systems
by moisture, so security systems using that technology tend to Lidar technology helps to fill the gaps of other security solutions
have poorer performance in bad weather. and can be integrated into systems that use cameras, radar and
• Only 2D imaging: While the human eye can identify 3D per- other types of sensors. For long range detection, radar technol-
spectives of an object, camera image analytics is still strug- ogy is useful for triggering an initial response or alarm. For me-
gling with that. And without reference points, even the hu- dium range detection – up to 150 to 300 meters, depending on
man eye cannot perceive the size of an object accurately. the sensor – lidar can detect and classify threats and trigger a
Other 3D information that is critical for security applica- secondary response or alarm.
tions, such as location and velocity, is difficult to determine Lidar sensors can be set up in combination with edge com-
in 2D imaging. puting devices to process information directly at the edge—or
• Interference: Electromagnetic interference is a problem for “locally”—to use less computing power than traditional security
technologies like radar and microwave sensors, so they cannot solutions. Processing information at the edge also helps security
be used for critical infrastructure with a lot of steelwork. systems analyze information faster. If an intruder is entering a
• Data storage and transmission: The data capacity from cam- secured area, for example, it’s critical that security systems can
era-based systems is extremely large, which poses a challenge immediately detect the threat so companies can handle the situ-
to store, transmit and process the data for immediate percep- ation before it becomes dangerous. Additionally, lidar transmits
tion and analytics. only a fraction of the information a video would and uses far
less data storage and network bandwidth. This enables lidar to be
used for more mobile installations, such as sensors set up along
Advantages of Lidar Technology the perimeter of a remote field.
Lidar enables security systems to automatically detect many
different types of threats, such as when a perimeter has been Use Cases for Lidar Technology
breached, and classify objects, such as a person or a car. Compa- Enabling high-resolution 3D perception at an affordable price,
nies can also classify alarms for different types of situations. With lidar-based solutions will be ideal for airports, corporate cam-
lidar systems that integrate the sensor with perception software, puses, government facilities, ports, schools, retail, tourist and rec-
companies can immediately identify threats and respond to a sit- reational sites and transport infrastructure. Because lidar can be
uation to resolve the issue. Lidar also reduces the number of false integrated with cameras, radar and other types of sensors, it can
positives with its advanced object detection capabilities, enabling be used in a wide variety of security applications.
security teams to more efficiently use their resources. In areas where there is a risk for crime, such as a parking lot
Lidar produces high resolution three-dimensional point cloud where break-ins might happen, lidar can help owners keep their
data, providing an extremely accurate map of an area. This data property safe even with limited security personnel. Critical in-
can be supplemented with information from other data sources frastructure and facilities can also benefit from lidar technology,
for an even more detailed scan of an environment. Additionally, even for vast areas of land where a large number of security sys-
lidar technology can see in the day and at night, providing com- tems need to be deployed. Lidar can be used in crowded stadiums,
panies with reliable 24/7 surveillance. theme parks and arenas to monitor crowd flow, or airports and
Another benefit of lidar is it has a high tolerance to interfer- train stations where security systems need to identify suspicious
ence, making it difficult to hack. While someone with a special incidents like someone leaving unattended baggage behind.
device and custom clothing might be able to trick thermal cam- Most importantly, lidar protects the public’s privacy, so peo-
eras, it’s much tougher to fool lidar technology. Radar and other ple who are not involved in security incidents can remain anony-
microwave sensing technologies are also subject to interference mous. As companies upgrade their security
with metal, whereas lidar works fine even in environments with a systems from traditional setups to modern so-
lot of steelwork. lutions, lidar will help deliver on the promise
While traditional lidar systems were expensive, lidar has be- of smarter and more connected cities that also
come much more affordable over the past few years. Factoring respect people’s privacy.
in the number of lidar units needed for a particular environment
and the cost per unit—taking into consideration a lidar sensor’s Neil Huntingdon is the vice president of busi-
range, angle and resolution—the overall cost of a lidar surveil- ness development at Cepton Technologies Inc.

30 1 0 1 9 | S E C U R I T Y T O D AY

1019sec_028_030_Huntingdon_v2.indd 30 9/13/19 2:36 PM


SecurityToday_Jul2019_Viking.ai 1 6/11/2019 11:22:18 AM

It takes a Viking to...

KEEP THINGS SECURE.

CM

MY

CY

CMY

DON’T MESS
AROUND WITH
WIMPY SECURITY

Keep the good things in and the bad things out.


At Viking, success is when your building is
secure. Day in and day out. Year after year.

Access and communication have to work and


have the features you need.

It’s why our engineers work tirelessly to improve


your gear. It’s why our support team loves
getting your phone calls and ideas. You need it
715.386.8861
VIKINGELECTRONICS.COM
secure and battle-tested. YOU NEED A VIKING.
Go to http://sp.hotims.com and enter 26 for product information.

Untitled-1 1 6/13/19 11:20 AM


V I D E O A N A LY T I C S

BrandonKleinVideo/Shutterstock.com
Changing the Look of Security
Analytics can make searching video possible in real time, and what this means for you

V
By Jennifer Hackenburg
ideo analytics have been around almost as into the consumer surveillance market (see Nest, Ring).
long as CCTV itself, rescuing security opera- On the camera and recorder side, better hardware lets devices
tors from the nearly impossible task of contin- react to event detection faster and more accurately. An increase
uously and effectively monitoring video sur- in processing power allows for more sophisticated analytics at
veillance feeds. The concept of video analytics the edge. Inexpensive recorders work in conjunction and provide
is simple enough: algorithms allow a device to analyze video in sophisticated suites of analytical capability. Now the only thing
real time and send alerts to the user. keeping end users from adopting video analytics is education.
Analytics can also categorize aspects of recorded video so it is
more easily searchable. While modern technology has made ana- Breaking the Barriers to Adoption
lytics more accurate and more affordable than ever before, we are One of the most basic barriers that prevents users from incorpo-
still seeing some barriers to adoption. Here is how video analytics rating analytics into their security system is lack of understand-
are changing the way we look at security, and how you can lever- ing. “Video content analysis” gets lost amongst buzzwords like
age this to provide more value to your customers. “Artificial Intelligence (AI)” and “deep learning.” It is important
to distinguish video analytics from the more advanced forms of
History of Video Content Analysis AI. Technically, AI means “getting a machine to mimic human
One of the earliest developed iterations of video analytics was behavior in some way.” 
motion detection. While video surveillance systems did correctly Most video security equipment today uses rule-based analyt-
identify suspicious motion within a scene, such as that of an in- ics, and at the edge (embedded into cameras). This form of AI
truder, they were also great at identifying tree branches blowing does not improve their analysis and accuracy through continued
in the wind, or rain falling in front of the camera lens. The preva- examination of data.
lence of false alarms gave video analytics a bad rap, and rightfully Rule-based analytics are a cost-effective solution that enables
so. Like the boy who cried wolf, video analytics were so unreliable the system to examine many events and objects simultaneously in
that camera operators started ignoring them–defeating the pur- a way that would be impractical or impossible for humans to do.
pose of having analytics at all. However, rule-based analytics do not have the cognitive ability to
Advances in hardware and software greatly improved accuracy, interpret activity as well as humans can. 
but for a time, the highest-performing analytics were only available The prevalence of video content analysis in procedural foren-
in the most expensive equipment. Fast forward to today, where an- sics crime dramas on TV has also negatively impacted the practi-
alytics have become mature enough that we are seeing them creep cal application of video analytics in real-life situations. The hopes

32 1 0 1 9 | S E C U R I T Y T O D AY

1019sec_032_034_Hackenburg_v3.indd 32 9/13/19 2:37 PM


CHICAGO • WASHINGTON, D.C. • LOS ANGELES • MILWAUKEE

ALARM MONITORING

In-house engineers Branded answering Fully redundant, 50+ years of helping


quickly adapt services service, apps and mission-critical dealers grow their
to dealer needs web portal infrastructure businesses

EMERgency24
999 East Touhy Avenue, Suite 500 ®

Des Plaines, Illinois 60018

1.800.800.3624 | EMERgency24.com
Go to http://sp.hotims.com and enter 18 for product information.

Untitled-6 1 6/25/19 3:25 PM


V I D E O A N A LY T I C S

an avid crime show watcher may have for their video surveillance “Video analytics are truly chang-
system can be unrealistic. This “CSI effect” means that integra-
tors should set expectations early on and focus on educating the ing the way we use security. They
user what the system can do instead of cannot do. turn our security cameras into data
collectors that help businesses run
How Analytics Improve
Return on Investment more smoothly.”
Given the innovative abilities of today’s surveillance systems, us- nightclub or bar lets security staff know when the establishment
ers should be looking beyond simply getting a clear picture. They is approaching the capacity defined by fire code.
should be striving for a system that arms them with intelligence
during the process of capturing video. This means not only in- Search and Review
stalling devices with analytical abilities but learning how to use Metadata – a set of data that describes and gives information
those functions as well. about other data – collected through video analytics helps cat-
A simple sales pitch is that video analytics improve the ability egorize and organize footage so that it is easier to search. When
of a surveillance system to detect specific events in real time, and there is no known event to search for, surveillance systems pro-
permit the user to easily search footage upon playback. Utilizing duce a seemingly endless amount of camera footage and histori-
video analytics has an array of benefits: making the system op- cal data that is not viewed at all. Now, video analytics allow for
erate more efficiently, reducing manpower requirements, provid- certain attributes to get tagged to the footage before it gets stored
ing business intelligence (such as improving customer service or on the recorder. For example, face capture functionality can also
better understanding staffing requirements), hastening forensic store facial attribute metadata – such as gender, age, expression
analysis and enhancing detection accuracy. and whether the person is wearing glasses and/or has facial hair
All of these attributes add up to increased ROI for the user, – along with a snapshot of the face. Once such metadata is intro-
who can get more out of their security system and share the se- duced, smart search is possible.
curity budget across multiple areas of the business. This is an Smart search opens a world of possibilities in locating very
incredibly significant selling point to someone who is investing specific footage. Operators can find, say, vehicles detected in a
thousands or even millions of dollars into video surveillance. tripwire area on a certain evening, or use the facial attributes
function to display all clean-shaven people with glasses who
Analytics at the Edge passed through a particular train station in the past week. This
Thanks to the hardware improvements and more accurate algo- will yield a thumbnail gallery you can examine in minutes rather
rithms mentioned earlier, many highly-effective video analytics than hours. Shortcuts like these let users efficiently review the
are available at even the lowest price points. Among the analytics data they have and glean deeper information from it.
that are most widely available are camera-based analytics, also Video analytics have given rise to an exciting advancement
called edge analytics. These are particularly well-suited to chal- in playback: a time-compressed view where moving objects are
lenging locations or budgets because they require lower band- tagged with the time of day, such as BriefCam’s VIDEO SYN-
width and fewer servers. In addition, they are easily implemented OPSIS and RapidRecap from Lorex. A report of a thirty-minute
in real time. The line crossing / tripwire function is one of the sequence, for example, generates a video synopsis that is only 53
most commonly deployed edge analytics. seconds long because the view simultaneously displays events that
Expanding upon line crossing is perimeter protection, where have occurred at different times. People and vehicles that move in
analytics support detection of invasion in a defined area. Well- and out of the field of view are superimposed on a stationary
suited for industrial parks, school campuses, factories and ware- background along with a time stamp “affixed” to them. It’s a fas-
houses; perimeter protection employs algorithms that differenti- cinating glimpse into the future conveniences video analytics may
ate humans and vehicles. For example, enabling an object filter have yet to offer.
and selecting “human” will tell the system to send an alert when
humans are detected and ignore vehicles and animals. Another It is Up to Us
filter could detect if vehicles are entering pedestrian areas and Video analytics are truly changing the way we use security. They
vice versa. turn our security cameras into data collectors that help businesses
Today’s perimeter protection solutions have achieved better run more smoothly. They save time by only giving us the infor-
accuracy than previous versions, where frequent false alarms mation we need, whether we need to know about it as soon as it
were caused by environmental conditions or wild/stray animals. occurs, or after the moment has passed.
People counting is another easy-to-use edge analytic. The Now that analytics are less likely to produce false alarms and
operational capabilities of people counting give users valuable are more widely available in budget-friendly products, a growing
data to run businesses, such as discerning how many people are number of end users can benefit from them. It
gathering in a given area and even keeping track of how much is up to us, the manufacturers and installers,
time they have been standing there. By setting rules to trigger an to clear up misconceptions and show the true
alarm if, say, three or more people stand in line at the grocery value that analytics can provide.
store for more than three minutes, store managers can be instant-
ly alerted when they need to send more staff to the cash registers Jennifer Hackenburg is the senior product mar-
and reduce wait times. Using people counting at the entrance to a keting manager at Dahua.

34 1 0 1 9 | S E C U R I T Y T O D AY

1019sec_032_034_Hackenburg_v3.indd 34 9/13/19 2:37 PM


Go to http://sp.hotims.com and enter 21 for product information.

Untitled-5 1 9/6/19 2:41 PM


BORDER SECURITY

The Technology Role


Today’s solutions will play an increasing, every-present role on the border

W
By Jim Ryan
hile the political discussions that focus on huge machines can now be put into handheld devices that are
how to secure America’s borders rage on ultra-portable, effective and safe, like X-ray screening tools that
without a clear resolution regarding what let officers see into sealed areas of vehicles. Handheld-screening
or how policies and procedures could tools have already been deployed and are currently in use by law
change, one element of the discussion re- enforcement officials throughout the country and at the southern
mains clear and present–that technology must and will play an border. Searches, which traditionally require officials to manually
ever more significant role at the U.S. border. dismantle a vehicle over the course of hours, can now be com-
pleted in minutes.
Managing the Border Similar technology found in handheld x-ray screening tools
The job of managing daily border crossings includes screening is now being scaled up into full, drive-though vehicle portal so-
vehicles, pedestrian traffic and fleets of trucks for contraband lutions that will help officers find more contraband like this, al-
like cash, weapons and drugs at a speed that protects U.S. citi- lowing officials to remove inventory and dollars from the illegal
zens as well as the half a trillion dollars in annual trade between drug-trafficking industry and even make human trafficking much
the United States and Mexico. Customs and Border Protection more difficult. The objective of these portal systems is 100 per-
(CBP) screens between half a million and a million pedestrians cent inspection. Similar to how today’s airport checkpoint scans
and 400,000 vehicles through 330 ports of entry across 2,000 all carry-on baggage, drive-through portals at the border will ef-
miles every day. fectively scan all passenger and commercial vehicles for increased
It is a daunting task where the stakes are high with an average security and efficiency. Demonstrations for these portal solutions
of 130 Americans daily falling prey to an opioid epidemic that is will be starting in the coming months to select the optimal-secu-
now being fed by synthetic opioids like fentanyl that can be fatal rity solutions for a decade (plus) of investment.
in very small doses. CBP officers and law enforcement officers As an industry, the expectation is that congressional funding
risk their lives and risk exposure to these substances daily in or- mechanisms will recognize the benefits of putting dollars toward
der to perform their jobs. But new technologies and new develop- further development of solutions that can be part of a multi-lay-
ments in technology could change all of that. ered system, solutions that use open-source architecture (so they
Technology at the border is good news for the good guys and can learn to talk to each other), solutions that utilize AI and ma-
bad news for the bad guys. chine learning to rapidly analyze and integrate massive amounts
Innovations in security technology are coming faster and of data, and set new standards in border security technology.
faster, integrating capabilities that were developed for other envi-
ronments including consumer products–facial recognition tech- The Role of Small Business and Innovation
nology for instance has clear application for security. But what Security technology is big business, and research and develop-
if it were possible to develop parallel technologies like vehicle ment does not come without cost. However, research and de-
recognition software that does not rely on license plates or VIN velopment (R&D) is the key factor in getting real innovation
numbers to identify specific vehicles? to the marketplace. While companies in the United States now
What if certain materials that are commonly used to disguise outsource so much of manufacturing, innovation is still one of
contraband or fool current technology could be identified and the our most significant domestic products and one of our most im-
mere presence of that material in a vehicle could alert officers to portant exports with small businesses accounting for significant
a problem? What if the 400,000 vehicles that need to be screened advances in industries including homeland security technology.
every day could go through a portal that could detect those items Engineering (rather than financial engineering) focuses on devel-
of concern and accurately clear other vehicles? oping new solutions to old problems that change the landscape of
And what if all of those factors could be identified across the the security industry every year.
330 points of entry, forming an integrated, multi-layered technol- While consumer technologies like Ring doorbells, smart ther-
ogy net that could make it easier and faster for everyone to cross mostats and Alexa-enabled household devices come into homes
the border and preserve or accelerate the “speed of commerce” as and get smarter and gain new functions; facial-recognition tech-
it is sometimes called? That would be good news for people who nology matched with vehicle-recognition technology, handheld X-
are legitimately crossing the border and bad news for those with ray technology that can see through steel and other materials in
nefarious purposes. And that is what is happening. vehicles, and full drive-through vehicle portals
are coming to the security industry. This level of
The Future is Now innovation will form that protective-technology
Security solutions that are capable of functioning on their own net that can catch the bad actors while letting
or as part of a multi-layered solution are already in use, and ad- everyone else be about their business.
ditional advancements are in development. New innovations that
shrink and ruggedize technology that once was only available in Jim Ryan is the CEO of Viken Detection.

36 1 0 1 9 | S E C U R I T Y T O D AY

1019sec_036_Ryan_v2.indd 36 9/13/19 2:38 PM


®
Rely on STI

…to help prevent


false fire alarms
Stopper® Covers Proven Effective for Almost 40 Years
STI’s protective covers help prevent false fire alarms
without restricting legitimate operation of the pull station.
When the cover is lifted, it flashes and sounds an internal
105 dB horn. Immediate attention is drawn to the area and
the prankster will either run or get caught before the false
alarm is pulled.
· Super tough, easy to install · Prevents tampering
· Helps stop false fire alarms · Protects from vandalism
· Flashes and sounds a horn · Ready for emergencies
when activated · Does not restrict legitimate
· Reduces disruptions operation

Learn more at sti-usa.com/sp367


or call 800-888-4784
Go to http://sp.hotims.com and enter 23 for product information. 2019

Untitled-5 1 8/28/19 3:04 PM


STORAGE SECURITY

Why Are SMBs so Worried?


Many organizational benefits include flexibility and productivity
By François Amigorena

C
loud storage is most used by small-and-medium stored on premise, a natural boundary is created against unau-
businesses (SMBs). The reason is that it comes thorised access by the need to be physically present in the office
with many benefits for organizations in terms of to access the data. For remote employees or partners using VPN,
flexibility and more importantly productivity. access can be restricted to specific devices only. On the contrary,
However, it also comes with a number of once your data is stored in the cloud, it can be accessed from any-
technical-and-human risks that worries a majority of SMBs. A where in the world and on any device, significantly increasing the
recent research shows that 61 percent of SMBs believe their data chance of unauthorised access.
in unsafe in the cloud. Let us see the reasons why and what they The second risk pertains to employees stealing data before
can do about it. they leave the job. For the exact same reasons, it is easier for
them to do so when data is stored in the cloud and much harder
Technical Risks for the IT team to detect or stop it.
What is worrying SMBs is that when you store your data in the The third risk has to do with complex hybrid-storage envi-
cloud, you are not in control of it anymore, so they find it pretty ronment (mix of on premise and cloud storage). Working with
hard to trust a third party with their valuable information. a hybrid environment increases productivity but makes manag-
The first technical risk concerns detecting unauthorised ac- ing the security of the data stored across multiple environments
cess. It is harder when your data in stored in the cloud. When very hard.

38 1 0 1 9 | S E C U R I T Y T O D AY

1019sec_038_040_Amigorena_v3.indd 38 9/13/19 2:39 PM


3UHVHQWLQJ
1RWKLQJ 1HZ
But in the security world, its no
surprise that often the best solutions
aren’t new at all. When the situation
happens where all your preparations
and training are put to the test, the
best and most reliable solution is
often “boots on the ground”.
You trust your trained security force
and you can trust Par-Kut
International to provide security
booths and guard shelters to help you
keep your boots on the ground, where
they are needed, when they are
needed.
Par-Kut buildings are not the most
high tech solution out there, but when
you need something that “just works”
(and will continue to do so for a long
time) think Par-Kut. We’ve got you
covered.

BULLETRESISTANT•ARCHITECTURAL•SECURITYBOOTHS•GATEHOUSES
PARKUT.COM
800.394.6599
Go to http://sp.hotims.com and enter 22 for product information.

Untitled-5 1 3/8/19 2:23 PM


STORAGE SECURITY

“The easiest way to ensure your How to Ensure Your Data


is Secure in the Cloud?
data is protected (whether in the First of all, the attitude of “my data is more important than
cloud or on a mixture of on-premise yours” has to change. A huge number of organisations share
and cloud) is to invest in technology.” sensitive data with their clients over email and via the cloud
—and with the rise of supply chain attacks, all it takes is one
Fifty-six percent of SMBs say that it is difficult managing the mistake from one supplier to compromise your data. More and
security of data living in hybrid infrastructures. more, organisations inspect the cybersecurity of their partners
before choosing to work with them. It is therefore crucial that
Human Risks organisations can demonstrate that they can keep their clients’
A lot of organisations think their own data is more important data safe.
than their clients’ data. This is pretty concerning knowing that The easiest way to ensure your data is protected (whether in
third-party and insider breaches are increasing. the cloud or on a mixture of on-premise and cloud) is to invest
This way of thinking will worry those that work with large in technology. It needs to proactively track, audit and report on
supply chains given the lack of control over data security once all access to files and folders and alert IT teams to sceptical file
it lives on third-party systems. Plus, like we said before, many activity the moment it occurs.
organisations are using a hybrid environment, and they are hav- Having a solution in place that can give you a consistent
ing trouble managing the security of data—either their clients’ or and unique view of the security of your data across all your
their own. storage servers allows you to be the first to know if someone
Almost half of SMBs said that moving to the cloud for storage other than an authorized employee attempts
has harmed their security. Fifty-nine percent consider that the na- to access your data. You will then be able to
tive security of cloud storage providers is not strong enough to pro- react quickly.
tect their data. Knowing that, 80 percent are simply relying on the
native security of whichever cloud storage provider they are using. François Amigorena is the founder and CEO of
There is a clear need for a solution to ensure data in the cloud IS Decisions.
remains safe.

Online Security Technology Training


Take charge of your security technology training with our online training courses.
Train as an individual or implement a companywide program with a Corporate Account.

Our courses are suitable for everyone in the security


industry. They are available 24/7, making it the most
convenient and cost effective solution for anyone
who wants to improve security knowledge or skills.
Approved for Continuing Education (CE) by various
security associations and government bodies, the
courses include:
+
• CCTV + Digital Video
• IP Networking
• Access Control
• Biometrics Technology
• Fiber Optics
• Basic Electricity
• Wireless Technology

Register today atsecuritytodayacademy.com


Go to sp.hotims.com and enter 6 for product information.
40

Untitled-2 1 8/12/19 11:15 AM


1019sec_038_040_Amigorena_v3.indd 40 9/13/19 2:39 PM
© 2019 Genetec Inc. Genetec, ClearID, the Genetec logo, the Mobius strip logo, and the Genetec ClearID logo are trademarks of Genetec Inc., and may be registered or pending registration in several jurisdictions.

Security that keeps you moving


Traditional systems and manual procedures can be complicated and time consuming. Genetec ClearID is a
smarter solution. It’s a fully automated, self-service identity and access management system that improves
the flow of people in your organization. By empowering employees to take control of their own access
requests, the pressure is taken off administrators.
 Whether adapting to changes in employee profiles, verifying contractors’ credentials or streamlining
visitor admissions, Genetec ClearID helps keep your business moving confidently and efficiently.

Find out about our new physical identity and access management software at genetec.com/ClearID
Go to http://sp.hotims.com and enter 17 for product information.

AdPrint_EN_Genetec-ClearID-2019_RHP_8.25x10.875in.indd 1 2019-08-26 11:49 AM

Untitled-2 1 9/9/19 11:43 AM


PRIVACY ISSUES

Data Privacy Requires


a Security Response
GDPR affords EU residents more control over personal information
By Mohammed Murad

R
ecent hacks into databases of some of the world’s “We need to employ tools readily
biggest corporations and government organiza-
tions put the personal information of billions of
available to restore citizens’ sense
people at risk. Data intended to remain private is of privacy whether they are com-
showing up for sale on the internet, privacy has pleting an online transaction or
become a worldwide concern, and citizens are losing faith in the
way their data is collected, stored and protected. engaging with a security system.”
The European Union took a big step last year to ease its citi- the card or entering a Personal Identification Number (PIN) has
zen’s concerns with the enaction of the General Data Protection been authorized to do so.
Regulation (GDPR). EU residents now have much more control This is where biometrics can play an important role in secur-
over their personal information. The GDPR requires they know ing databases. Passwords, cards and PINs can be hacked, shared
what data is being collected, how it is being used and how they or stolen; a biometric identifier cannot. Biometrics offer a way
can opt in, not out, of a company’s database. for our industry to meet security goals for the protection of data
What constitutes personal data? That’s broadly defined to in- while also restoring public confidence.
clude just about anything that could be used to identify a person, Biometrics involve the measurement of physical characteristics,
including name, home and email addresses, birthdate, driver li- something only the owner can possess. The most commonly used
cense number, gender, race, political affiliations and much more. biometrics include iris patterns, fingerprints and facial recognition.
Although the GDPR specifically applies to nations within the Combining biometric and access readers or a keypad at the PC cre-
EU, it has worldwide implications. Any organization, no matter ates true two-factor authentication. Passwords can be eliminated
where it’s based, that collects data gathered from an EU citizen while the database remains accessible only to authorized users.
must comply with the regulation. Failure to do so can result in The use of biometric technologies is now commonplace
penalties of up to €20 million or 4 percent of a company’s annual worldwide. You see them embedded in smartphones, at border
global revenue. crossings and in use for time and attendance, national ID cards,
The European privacy movement has sparked a worldwide voter registration and more. Biometric readers can also authenti-
response. In the U.S., more than 10 states have enacted tougher cate consumers registering for websites or making purchases on
regulations to protect its citizens’ personal data. Perhaps the most the internet.
GDPR-like will take effect on January 1 in California. Online Among the major biometric technologies, iris recognition is
sites will be required to conspicuously post a “Do Not Sell My widely considered the most accurate. No two people, even identi-
Personal Information” link. Parental consent will be required be- cal twins, have the same iris patterns. The technology works with
fore selling data about a child under the age of 13. people wearing glasses, contact lenses and safety goggles. It’s not
The security industry was not a prime target of the GDPR, but affected by grease, dirt or scars as are fingerprint readers. Iris
it will feel an impact in the way organizations collect and use video technology works with very large databases where facial recogni-
surveillance and access control data. In the EU, video is considered tion has been shown to be less effective.
to be personal data belonging to those captured in live or recorded GDPR and its goals have arrived with the simple concept
images. By its nature, access control requires personal information that citizens have a right to know the information being collected
from employees and vendors in return for a pass to enter facilities. about them, how it is used and be provided with an easy way to
Organizations must have clearly defined goals for its security delete their data at any time.
functions. That means being ready to explain camera placements, The security industry should see GDPR and efforts at the state
what images they expect to capture, and how the video will be level in the U.S. as driving positive changes and eliminating inef-
used, stored and shared. How video will be shared may be the ficient data protection efforts. At the same time, we need to employ
most critical component. tools readily available to restore citizens’ sense of privacy whether
Strict cybersecurity controls are required to ensure security- they are completing an online transaction or
related data can be viewed only by authorized personnel that may engaging with a security system. A failure to
include corporate staff, law enforcement or even a hosted or man- act now may result in a more severe backlash
aged service provider or central monitoring station. that could negatively impact how we protect
It is obvious passwords protecting data can be hacked. They people and their personal data.
can also be shared.
Adding a card reader or keypad to a workstation provides a Mohammed Murad is vice president, global
second layer of security. Yet there’s no guarantee the person using development and sales for Iris ID.

42 1 0 1 9 | S E C U R I T Y T O D AY

1019sec_042_Murad_v2.indd 42 9/13/19 2:40 PM


Still using an
old fashioned phone line
to connect your
Telephone Entry System?

FACT: while your old style telephone line may still be working
with your Telephone Entry System, telecommunication
companies are switching to a fiber and digital infrastructure
which often makes programming these systems via modem
communications a challenge – if not impossible.

The good news is that you can keep your existing Telephone
Entry System and upgrade it to a cellular connection with
DKS Cellular. Besides getting 4G LTE service, DKS Cellular
can save you money in two ways. 1) There’s no need to
replace your existing Telephone Entry System, and 2) The
monthly cost of the DKS Cellular service is typically half the
cost of a business telephone line.
Easily retrofit existing
DKS 1800 Series
Even more good news: the best part about retrofitting
Telephone Access Control Systems
ystems your Telephone Entry System connection service with DKS
with Cellular Connectivity and help your is there’s no digging or trenching – just plug it in and activate
customers stay active. the service!

Learn more about our Cellular retrofit options


- and -
download a printable info sheet designed to help
educate your customers about the ease and benefit
of going Cellular here: doorking.com/retrofitnow
Traffic Control Access Control Telephone Entry Gate Operators

Member: AFA, DASMA, NAA, IDA, NOMMA, NPA, SIA, SSA, CANASA 800-673-3299 info@doorking.com
Go to http://sp.hotims.com and enter 16 for product information.

Untitled-11 1 9/4/19 3:35 PM


SECURITY TODAY SOLUTIONS
Compiled by Sherelle Black, Content Editor

Door and Gate Controller Power Harvesting Wireless System 4K Dome Camera
ProdataKey has introduced its “pedestal io” door Camden has launched its newest offering in the Vicon has introduced its new SN688D-WIR PTZ
and gate controller, which is designed for use in wireless market with the Kinetic by Camden “pow- dome camera, offering 4K resolution and highly-
all-weather outdoor applications. The controller is er harvesting” wireless system. The product uses detailed image quality to large area surveillance op-
ideal for securing parking lots, gated communi- the energy created by the operation of the switch erations. In addition, the camera offers high-speed
ties, storage facilities and other exposed outdoor to power the wireless transmitter. No batteries are pan/tilt and zoom functions alongside 360-degree
locations. Compatible with any ProdataKey cloud- required to maintain or replace the system. Kinetic rotation that allow the camera to quickly move and
based, network or wireless access control system, also does not generate hazardous waste, which focus on different objects in a scene. The product
the unit can be mounted quickly to goosenecks or makes the product greener and less harmful to the also features an autoiris lens that maintains proper
walls and comes ready for plug-and-play installa- environment. The company says Kinetic is the only light levels to provide high video quality under di-
tion. The product can come with an optional rug- “power harvesting” wireless system to feature an verse and changing outdoor lighting conditions. De-
gedized touchpad reader to work with proximity ultra-compact receiver with field selectable mo- signed for both day and night conditions, the cam-
cards or fobs. Two reader inputs support applica- mentary, delayed or latching relay operation. Ki- era has a removable IR cut filter for superior image
tions that require credential presentation, and the netic is also designed to be installed in automatic quality that can be adjusted depending on time of
second reader input can also be assigned to trig- door operator cabinets. Designed for both indoor day. Synchronized IR LEDs automatically adjust in-
ger automated events. Instant alerts can be sent and outdoor applications, the product could be de- tensity with the optical zoom of the lens, making
to managers either on their screens or via text or ployed for reliable door activation in any commer- the camera more versatile in case operators decide
email if any issues arise. cial, industrial or institutional application. to change its permanent location.
Go to sp.hotims.com and enter Go to sp.hotims.com and enter Go to sp.hotims.com and enter
300 for product information. 301 for product information. 302 for product information.

H5SL Camera Line Access Control Platform School Intelligence Monitoring


Avigilon launched its latest line of cameras with SALTO Systems showcased its latest releases at Rekor Systems announced its first implementa-
the introduction of the H5SL camera, which has GSX 2019 in Chicago, with a particular focus on its tion of its OnGuard School Safety intelligence moni-
a modular design that easily snaps into a variety SALTO KS Keys as a Service platform. The platform toring solution in Fallsburg, New York. The school
of base options. End-users can have the camera provides a flexible, cloud-based access control district there will take advantage of OnGuard’s so-
up and running in minutes. In addition, customers management system to customers without any re- cial media monitoring solution, FIRSTSight, which
have flexibility to choose from various lens types quired software installation or the added costs of a identifies potential threats within publicly posted
depending on their security needs, including a new fully-wired electronic product. All end-users need content and provides recommendations for action.
long-range lens that allows them to see with more is an online device with an Internet connection. The In addition, OnGuard will provide the district with
clarity at farther distances. Audio and input con- dashboard provides a simple tool that gets all doors automatic license plate reader cameras that allow
nections also help operators configure actions and online and allows administrators to define who can schools to monitor vehicles entering and exiting
alarms for efficient event response. The camera enter which doors during which time periods. Oper- lots. The district can upload approved or black-
aims to save storage and network bandwidth and ators can also receive notifications regarding door listed vehicles, flagging when suspended students,
therefore keeping internet connectivity costs down. and user activity using a message center. Settings known criminals or other banned individuals drive
The H5SL camera line incorporates Avigilon’s mo- can be adjusted to determine who receives which on or near campus. Lastly, OnGuard aims to en-
tion detection software that can notify operators of alerts and on what platforms they are sent on: force school bus passing violations with cameras
unusual events they might otherwise have missed. email, SMS and push notifications through an app. bus stop-arm cameras to capture video of violators.
Go to sp.hotims.com and enter Go to sp.hotims.com and enter Go to sp.hotims.com and enter
303 for product information. 304 for product information. 305 for product information.

44 1 0 1 9 | S E C U R I T Y T O D AY

1019sec_044_046_STsolutions_v3.indd 44 9/13/19 2:40 PM


IT STARTS WITH
LISTENING
WE BELIEVE THE KEY TO SOLVING ACCESS CONTROL
PROBLEMS IS COLLABORATION—between our customers
and our innovation specialists. It involves listening, observing
and analyzing—turning the full force of our experienced team to
your challenge. Tell us about your toughest access control problems.
Our team is ready to listen and create a solution for you.

sales@cyberlock.com | 541-738-5500 | www.cyberlock.com


Go to http://sp.hotims.com and enter 27 for product information.

Untitled-6 1 9/6/19 2:50 PM


SECURITY TODAY SOLUTIONS

Optical Media Shredder Multi-Sensor Camera License Plate Camera


Security Engineered Machinery Co., Inc. has Hanwha Techwin America introduced its latest Nortech announced it is now offering Nedap’s
introduced its OfficeShredHS dual paper and opti- multi-sensor camera at GSX 2019. Designed to ANPR Lumo, which is an advanced license plate
cal media shredder. The product was designed to be cost efficient, the camera features motorized camera for vehicle access control. Features in-
destroy classified and unclassified information on varifocal lenses for precise control of focal length, clude standalone solution, high accuracy with
CDs, DVDs or Blu-ray Discs in office environments. angle of view and zoom for each direction. The non-standardized license plate formats, libraries,
The company says the shredder is low volume and compact camera has sensors that support remote user-friendly configuration, REST interface, easy
can accept up to seven sheets of paper per pass. pan, tilt, rotate and zoom control, making it easy to installation, communication interfaces and Wie-
The optical media shredder can not only shred adjust. Additionally, it requires fewer ports on the gand interface. The product comes with a mounting
DVDs but also EMV credit cards, magnetic stripe switch, uses les cable and has ore pixels focused in bracket that can be used to mount the camera on a
cards, Common Access Cards IDs and SIM cards. each direction than fisheye lenses. The camera also wall or pole. Beyond vehicle access control, it can
Paper is destroyed to a 1mmx5mm particle and has a built-in IR illumination for each sensor and also be used to give vehicles access temporarily or
optical media to a 2mm particle. The paper waste H.265/WiseStream II compression technology. The incidentally or for automatic toll collection. It can
is collected in a 20-gallon internal bin. There is a technology is intended to reduce users’ bandwidth also identify Kemler Codes, which are used for the
3-gallon vacuum included to collect the optical me- and storage as well as reduction in camera place- road transport of dangerous goods. The ANPR Lumo
dia waste. The dual product is the first National Se- ments surrounding a facility. All sensors feature up is equipped with an analyser and IR Illuminator. It
curity Agency (NSA) listed combination destruction to 60fps per channel for motion capture and up to supports the industry-standard communication in-
device to meet the NSA’s new DVD/BD requirement. 150db wide dynamic range (WDR) for enhanced terfaces, enabling seamless integration into access
It is also TAA complaint. image quality. control systems.
Go to sp.hotims.com and enter Go to sp.hotims.com and enter Go to sp.hotims.com and enter
306 for product information. 307 for product information. 308 for product information.

Security, Alarm and Control Cables Guard Tour System Worker Safety App
Remee Wire & Cable announced the launch of its TrackTik Software announced the launch of its Vismo announced the launch of its app-based Lone
expanded line of security, alarm and control cables, guard tour system, which uses automation for se- Worker Safety Solution at GSX. The app allows em-
featuring the Vigilance Series. The cables, which curity workforce management. The software allows ployees who are working alone to activate a panic
can be used in commercial and residential mar- security managers schedule staff, send out alerts, button if they feel like they are in danger. Once the
kets, can be used in security and alarm systems. log incident reports and send out messages in real panic button is pushed, the administration teams
The new Vigilance security and alarm cable prod- time. The system also features GPS tracking, which are notified of the user’s location. It also offers a
ucts include the 725 series, 900 & R00 series and can help guards enhance their operations by im- timed check-in and check-out function. The feature
a Video/CCTV series. The electronic wire and cable proving transparency and accountability. It can pro- works by automatically alerting the administration
company also includes control cables for lighting, vide a live picture of the security environment in team when the time frame expires, or has not been
window shade and temperature controls. The light- which security staff are operating. Through watch deactivated by the lone worker. The team can then
ing cables have been designed to be compatible mode, security managers are able to inform staff contact the employee and see if they are in danger,
with several automation systems including Elan of dangerous situations, which could help staff pre- or will be. The function can be customized to in-
and Lutron. All of the lighting cables are Plenum- pare or avoid high-risk situations. Special protocols dividual employees or job roles by administrators.
rated with RemGuard Plenum Polymer jackets. In for specific locations can be assign and permitted The app helps eliminate the risk of working alone
addition to the Vigilance line, the company also of- and restricted zones established. The software is and without constant communication with their
fers fire alarm cables and LAN & premise cables. aimed to be “a coach in their back pocket.” management team.
Go to sp.hotims.com and enter Go to sp.hotims.com and enter Go to sp.hotims.com and enter
309 for product information. 310 for product information. 311 for product information.

46 1 0 1 9 | S E C U R I T Y T O D AY

1019sec_044_046_STsolutions_v3.indd 46 9/13/19 2:40 PM


SECURE CLASSROOM IN SECONDS

3 SIMPLE 3 FAST 3 SECURE


FOR EXTREME EMERGENCY SITUATIONS
The Nightlock Lockdown Door Barricade allows a teacher to immediately
lock the door from inside the classroom, eliminating exposure during a
hostile intruder situation. This device makes it virtually impossible for
an intruder to break through an entry door.
• Simply add this safety device to
So
classroom doors afforda

59
ble!
$
• Works with outward and inward

95
swing doors
• No need to replace existing
hardware
• One time solution - easy to install ea.
• Lockdown in seconds

classroomlockdown.com
1-855-644-4856 TOLL FREE
Go to http://sp.hotims.com and enter 30 for product information.

Untitled-9 1 2/6/19 1:23 PM


Go to http://sp.hotims.com and enter 28 for product information.

Untitled-10 1 9/11/19 2:17 PM


FREE PRODUCT INFO
AD INDEX Quick, Easy and Direct...get the info you need NOW!
Go online to www.securitytoday.com/productinfo to request free information from advertisers in this issue.

Info No. Company Name Page Info No. Company Name Page Info No. Company Name Page

ADVERTISERS 21........ Hanwha Techwin America............................... 35 309...... Remee Wire & Cable....................................... 46

8.......... Aeroturn LLC................................................... 21


2.......... MIER PRODUCTS INC...................................... 19 304...... SALTO Systems............................................... 44

9.......... Altronix............................................................. 2
30........ Nightlock........................................................ 47 306...... Security Engineered Machinery Co., Inc.......... 46

10........ Alula............................................................... 29
22........ Par-Kut International, Inc................................. 39 310...... TrackTik Software........................................... 46

4.......... ASSA ABLOY EMS/Electronic Security Hardware... 9


28........ ProdataKey..................................................... 48 302...... Vicon.............................................................. 44

5.......... ASSA ABLOY EMS/Alarm Controls.................... 15


29........ Razberi Technologies...................................... 17 311...... Vismo............................................................. 46

11........ Avigilon USA Corporation................................. 11


23........ Safety Technology Int’l, Inc.............................. 37 GOVERNMENT SECURITY

12........ Bosch Security Systems, Inc............................. 7 ............ Avigilon USA..................................................... 3


20........ Salient Systems Corporation............................. 5

13........ Camden Door Controls.................................... 13 ............ ASSA ABLOY/Adams Rite................................... 5


6.......... Security Today Academy................................. 40

14........ ComNet Communication Networks.................. 51 ............ ASSA ABLOY/Electronic Security Hardware...... 11


24........ THE HOUSING COMPANY................................. 20

27........ Cyberlock........................................................ 45 ............ Bosch Security................................................ 20


26........ Viking Electronics............................................ 31

15........ Dahua Technology, USA Inc............................... 3 ............ Comnet .......................................................... 19


Security Today Solutions

16........ Door King........................................................ 43 303...... Avigilon........................................................... 44 ............ Designed Security Inc....................................... 7

1.......... DSX Access Systems...................................... 52 301...... Camden.......................................................... 44 ............ Garrett Metal Detectors..................................... 2

18........ EMERgency 24................................................ 33 307...... Hanwha Techwin America............................... 46 ............ Identiv Group.................................................. 13

3.......... First Responder Technologies, Inc.................... 25 308...... Nortech........................................................... 46 ............ Nightlock........................................................ 15

19........ Garrett Metal Detectors................................... 23 300...... ProdataKey..................................................... 44 ............ Security Today................................................ 17

17........ Genetec Inc..................................................... 41 305...... Rekor Systems................................................ 44 ............ Security Today Academy................................... 9

Reprints: For single article reprints List Rentals: This publication’s Media Kits: Direct your Media Kit
(in minimum quantities of 250-500), subscriber list, as well as other lists requests to Lynda Brown, (972) 687-6710
e-prints, plaques and posters contact: from 1105 Media, Inc., is available for (phone), (972) 687-6750 (fax),
PARS International rental. For more information, please lbrown@1105media.com
(212) 221-9595 contact our list manager, Jane Long,
1105reprints@parsintl.com Merit Direct. (913) 685-1301;
www.1105Reprints.com jlong@meritdirect.com;
www.meritdirect.com/1105

W W W . S E C U R I T Y T O D A Y. C O M * ADVERTISERS IN THIS SECTION MAY NOT APPEAR IN ALL ISSUES. 49

1019sec_049_Adindex_v2.indd 49 9/13/19 2:41 PM


INDUSTRY PROFESSIONAL
With Kaitlyn DeHaven

A Global Solution
How OSDP is changing the access control market

O
SDP, or Open Supervised Device Protocol, is
an access control communications standard de-
signed to improve interoperability among access
control and security products, and it’s becoming
the new standard for access control technology.
According to The Security Industry Association (SIA), the prod-
uct is more secure than the most common access control commu-
nications protocol and supports high-end AES-128 encryption,
which is required in federal government applications. In addition,
OSDP meets federal access control standards such as Public Key
Infrastructure (PKI) for Federal Identity Credential and Access
Management (FICAM).
Paul Ahern, president and CEO of Cypress Integration Solu-
tions, said that as this technology starts to become the standard,
Cypress is finding ways to step into the market, primarily by

Brian A Jackson/Shutterstock.com
reaching out to a global OSDP market.
Ahern has personally been working with OSDP for about
eight years. The technology is not brand new, but it has recently
started becoming more mainstream. When the market for key
card access control systems grew rapidly, manufacturers did not
have much time to focus on how to make the system as secure as
possible, Ahern said. In the process, some of the security a physi-
cal key brought was lost, and now, OSDP is bringing that security
back to the market. “I’m hearing more and more questions about [OSDP],” Ahern
While the technology is easily accessible in the U.S., there is said. “People are starting to take it more seriously, and it’s some-
a serious gap in the global OSDP market, according to Ahern. thing that we’re passionate about getting out to the market.”
“OSDP is a new standard in the industry that’s being adopted With so many questions surrounding the technology, Ahern
as a more secure way of communicating in access control of se- said it’s an excellent time to step into the market and address
curity systems,” Ahern said. “We’ve kind of taken a lead role in the concerns on a global level. To do this, Cypress is developing
developing products that will allow that technology to go forward products to make it easier for organizations to adopt the standard
and allow end users, integrators and manufacturers to speed up globally.
adoption of that new protocol, or that new standard.” Ahern said one of the steps the company has taken to ensure
In the past few years, Ahern has been traveling to global trade the products can be used internationally is to make sure the wire-
shows in an evangelizing mode to see if the market needed what less frequencies they use on their wireless products are allowed in
the company had to offer in terms of OSDP. Based on those ef- countries overseas. In addition, the company makes sure that it
forts, he said the company has been able to grow business sig- sources the connectors they ship overseas.
nificantly overseas, bringing them into the global market just by This is one of the primary goals of Cypress’ current research
talking to individuals. and development for future products. The company is continu-
To continue these efforts and grow the success of the global mar- ously studying the development of OSDP and the adoption of
ket push, Cypress decided to exhibit globally at the IFSEC Interna- the technology in hopes of discovering easy migrations paths
tional Security Event & Conference in London this past summer. from older technologies to OSDP. This will allow for easy transi-
It was the first time Cypress exhibited outside of the United States. tions of technology for organizations and companies around the
”We thought, if we’re going to be serious about this, we need world.
to let everybody know what’s going on,” Ahern said. “So, we de- “We’ve been successful in the U.S. market for 36 years, we’ve
cided this year was going to be our first year to do an interna- been somewhat successful in the European market for about eight
tional show.” years, and we’re just seeing a great opportunity now,” Ahern said.
Many of the questions Ahern was asked at IFSEC were in re- “We think it’s the right time to strike.”
gards to OSDP. Companies in attendance were wondering where
Cypress saw the OSDP market going and how they could be more Kaitlyn DeHaven is a former associate content editor for Security
successful in implementing this protocol. Today magazine.

50 1 0 1 9 | S E C U R I T Y T O D AY

1019sec_050_IndPro_v2.indd 50 9/13/19 2:42 PM


The Shortest Distance
Between Two Points

Audio, Video, Data, and Ethernet Transmission Solutions

ComNet is Your Solution for


Fiber Optic, Copper, and Wireless Transmission

Your transmission challenge has always been getting your audio, video,
data and ethernet signals from here to there.

ComNet offers the most comprehensive line of products designed to


solve every transmission challenge.

View the Full Product Line at comnet.net and


Identify the Fiber Optic, Copper or Wireless
Connectivity Solution for your Application
Contact the ComNet Design Center Now for
Free Design Assistance.
Call 1-888-678-9427 or 1-203-796-5300
or email designcenter@comnet.net

Visit www.comnet.net Email info@comnet.net Phone 1-203-796-5300 Toll Free 1-888-678-9427


Go to http://sp.hotims.com and enter 14 for product information.

Visit us at ISC East 2019 | New York City | Booth 718 | 20-21 November

Untitled-11 1 8/29/19 5:06 PM


Go to http://sp.hotims.com and enter 1 for product information.

Untitled-5 1 9/5/19 1:12 PM


education | healthcare | corporate SEPTEM BER/ O CTO BER 2019

Campus Security
& Life Safety
campuslifesecurity.com

Security Technology
is a Top Priority

0919css_CS001_v1.indd 1 8/29/19 10:19 AM


CSLS_Jul2019_Viking.ai 1 6/11/2019 11:31:04 AM

It takes a Viking to...

KEEP THINGS SECURE.

CM

MY

CY

CMY

DON’T MESS
AROUND WITH
WIMPY SECURITY Visit us at GSX, Booth #1871

Keep the good things in and the bad things out.


At Viking, success is when your building is
secure. Day in and day out. Year after year.

Access and communication have to work and


have the features you need.

It’s why our engineers work tirelessly to improve


your gear. It’s why our support team loves
getting your phone calls and ideas. You need it
715.386.8861
VIKINGELECTRONICS.COM
secure and battle-tested. YOU NEED A VIKING.
Go to http://sp.hotims.com and enter 705 for product information.

Untitled-9 1 8/13/19 4:03 PM


Go to http://sp.hotims.com and enter 702 for product information.

Untitled-3 1 7/26/19 5:02 PM


table of contents SEPTEM BER/ O CTO BER 2019

cover story

Security Technology is a Top Priority 16


By Ralph C. Jensen

features
20 Securing Campuses
Confronting Active Shooters
Five tips for implementing shot detection technology
By Thomas W. Connell II

24 Campus Technology
Teaching Evolution
Security’s growth and innovation in the education sector
By Lynn Wood

28 Best Practices
Meeting Today’s School Safety Challenges
8 Unsung Security Giving staff a voice to ensure employees have
HERO Unit Provides School Security healthy working conditions
Nationwide school shootings prompt formation By Michael Sander and Tom Strasburger
of safety team
32 Best Practices
By Rob Moore
Perimeter Protection
10 Security Partnership Security solution advances drive re-evaluation
A Crucial Collaboration of campus security
How police departments and integrators can come together By Bruce Canal
in partnerships for the well-being of the communities
By Kaitlyn DeHaven departments
14 Data Challenge 6 Editor’s Commentary
Intelligent Campuses Require an Run, Hide and Let Law Enforcement Fight
Advanced Security Strategy By Ralph C. Jensen
The digital revolution has opened the door to a
flurry of incoming data from numerous entities
By Jeffrey Lewis

4 c a m p u s l if e s e c u r it y.c o m | S E PTE M B E R/ O CTO B E R 2019

0919css_CS004_TOC_v1.indd 4 8/30/19 12:30 PM


Go to http://sp.hotims.com and enter 711 for product information.

Untitled-1 1 9/3/19 11:10 AM


editor's
commentary
SEPTEMBER/OCTOBER 2019
EDITORIAL STAFF
Editor-in-Chief Ralph C. Jensen
By Ralph C. Jensen Content Editor Sherelle Black
E-news Editor Brent Dirks

ART STAFF

Run, Hide and Let Law Enforcement Fight Art Director Dale Chinn

I
PRODUCTION STAFF

n May of this year, Florida’s House of Representatives passed a bill so controversial that Production Coordinator Teresa Antonio
a clear line of sides was drawn. The bill was already approved by the state’s Senate and EDITORIAL ADVISORY BOARD
will now permit classroom teachers to carry guns … in school. Gov. Ron DeSantis (R) Mike Seger, Director of Safety and Student Services at
has signed the bill and teachers can carry guns. It’s the law. Penn-Harris-Madison School Corp., Mishawaka, IN
Republicans favor the bill, citing a commission’s recommendation to allow teachers to Jeff Karpovich, CPP, CHPA, Chief Director of Security & Trasportation at High
be armed. Following the mass shooting at Marjory Stoneman Douglas High School in 2018, this Point University, High Point, NC
panel studied the concept of arming educators. Joseph Souza, Director of Security and Technology at University of Florida,
Gainesville, FL
State Sen. Oscar Braynon (D) cited his concerns about bringing guns to campuses in areas
Alison Kiss, Executive Director at Clery Center, Strafford, PA
that are already flooded with firearms. Braynon’s district includes part of Broward and Miami-
Dade counties. SALES
“I unfortunately have to deal with parents who have lost children often because this gun vio- Sam Baird +44 1883 715 697
lence is prevalent in my community,” said Braynon, who voted against the bill. “A gun being in a Randy Easton 678-591-2822
classroom, however it is that they’re planning to do it … just the concept brings a different envi- Brian Rendine 972-687-6761
ronment for those children.”
INFRASTRUCTURE SOLUTIONS GROUP
In a similar fashion, Utah is one of 14 states where teachers can carry a gun at school. Follow-
President & Group Publisher Kevin O’Grady
ing the shooting that killed 17 people in Parkland, Rowdy’s Range, I n Hurricane, UT, started
Editor-in-Chief/
offering the class – which normally costs almost $800 – is free of charge to teachers. Associate Publisher, Security Ralph C. Jensen
One of the Utah course instructors, Brett Pruitt, 38, believes that teachers have the right to be Group Circulation Director Irene Fincher
armed if they choose: “We give our children to educators for four to six hours a day and trust Group Marketing Director Susan May
them with their safety. My personal opinion is we should give them the means to [keep those Group Website Manager Scott Newhouse
children safe].” Group Webinar Administrator Tammy Renne
The lines of pro and con are pretty clearly drawn. Like just about anything these days, the
debate of arming teachers is highly charged and most often emotional. How would you feel if
your child’s teacher had a gun in the classroom? Would you feel better or feel that your child is
more protected?
Utah law allows licensed gun owners to bring their concealed weapons in public schools, and Chief Executive Officer Rajeev Kapur
is one of several states in the country, including Florida and Texas, to do so. Chief Financial Officer Sanjay Tanwani
“If teachers are going to be bringing firearms into schools, let’s make sure they know how to Chief Technology Officer Erik A. Lindgren
handle them safely,” said Utah County Sheriff Mike Smith.
I thought a lot about this in late August as I took my granddaughter to her first day of school. Executive Vice President Michael J. Valenti
While most parents are as excited as any child would be, I walked into the school looking for
security solutions and devices. A teacher or administrator carrying a gun never crossed my
REACHING THE STAFF
mind. I do think, however, we should start with the basics. Close and lock the doors. When
Staff may be reached via email, telephone, fax or mail. A list
someone comes to the school, let’s keep that person in a vestibule or the office until credentials of editors and contact information also is available online at
can be verified. www.campuslifesecurity.com.
Schools, or more particularly, teachers in a school is no place for a weapon, even if that person E-mail: To e-mail any member of the staff, please use the
has undergone firearms training. I trust school resource officers with a gun, and they should have following form: FirstinitialLastname@1105media.com
them. I’m completely in favor of teachers doing what they do best … teaching, to include how to Dallas Office (weekdays, 8:30 a.m. – 5:30 p.m. CT)
react if an active shooter is on campus. All respect to teachers nationwide, but I would never Telephone (972) 687-6700; Fax (972) 687-6799
expect a classroom professional to be the one to fire a weapon. Let’s teach the student to run or 14901 Quorum Dr., Suite 425, Dallas, TX 75254
hide and allow law enforcement to fight back. Corporate Office (weekdays, 8:30 a.m. – 5:30 p.m. PT)
Telephone (818) 814-5200; Fax (818) 734-1522
6300 Canoga Avenue, Suite 1150, Woodland Hills, CA 91367

6 c a m p u s l if e s e c u r it y.c o m | S E PTE M B E R/ O CTO B E R 2019

0919css_CS006_EdNote_v1.indd 6 9/3/19 11:06 AM


Go to http://sp.hotims.com and enter 707 for product information.

Untitled-5 1 8/21/19 2:49 PM


unsung security

By Rob Moore

HERO Unit Provides


“We’ve got the best of both
worlds is what we have.”
School Security
Nationwide school shootings prompt formation of safety team

A
s the new school year wasn’t working basically.” transpire,” Speed said.
approaches, the Banks After looking at what was going on in the Speed and other officials are very quick to
County, Ga. Board of Edu- state, the region and the nation, Speed said say that most details of the program are con-
cation and Banks County he and Chief Deputy Shawn Wilson realized fidential to protect its integrity and effective-
Sheriff ’s Office are banking they couldn’t find something suited to Banks ness. That’s why specifics are guarded and
on a unique HERO Unit to add an unseen County’s needs. known only to those involved in the HERO
layer of security in the county’s schools. “That’s when Chief Wilson and myself sat Program and vested leadership.
The Heightened Enforcement Response down and talked about it at length and with “We have somebody in place in the system
Officer (HERO) Unit consists of specially his military background, we sat down and at locations within the school system that
trained and experienced deputies who talked about coming up with a solution to can respond at a moment’s notice,” Speed
receive specialized tailored HERO training. where we had somebody on premises at the said. “They also have the ability to monitor
“The HERO Unit provides the school sys- school system that if we did have an active the school system as a whole, not only from
tem with an instantaneous response by a shooter come into the school, we could one location but from multiple locations.”
heavily-armed, highly-trained, proactive respond with an efficiency to stop that per-
protection detail,” said Sheriff Carlton Speed. son in the fastest, most efficient manner Working Behind the Scenes
“Most deputies assigned are longtime law with keeping any devastation to a mini- But visitors to the schools should not expect
enforcement veterans with a former SWAT mum,” Speed said. “At that point, he sat to see members of the specialized unit or
or military background. The need for the down and talked to one of his good friends, even observe evidence of its existence.
HERO Unit became an increasingly apparent SWAT instructor Lt. Mark Gerrells in “The HERO program is designed to work
reality due to the frequency of nationwide Rabun County, GA.” behind the scenes, much like the personal
school shootings. As with many area schools, After brainstorming for a couple of weeks, facility detail assigned to the White House,”
our school system, along with the sheriff ’s Wilson and Gerrells presented their concept Wilson said.
office, has investigated several unsubstanti- to Speed. Hopkins said the program is worth any
ated threats against our school system after “We looked at it,” Speed said. “We went cost, as it increases the safety for the students
the 2018 Parkland High School incident.” back to the drawing table a couple of differ- and allows them to effectively teach.
ent times. We refined it. Then, when we had “It’s worth any cost, because they know
Getting Started something we thought we could work with, what they’re doing,” Hopkins said. “We pray,
When asked how the unit got its start, Speed we brought it down to the school system.” just like everybody else, that it never comes
explained it was in response to concerns to our door. You hope at the end of it you can
about how the sheriff ’s office could quickly Telling the Board say we paid for that, but that’s ok because
and efficiently address active threats in the When presenting it to the Banks County that’s exactly what we’re willing to do. We
county’s schools to minimize their impact. Board of Education, Speeds said he told the can’t teach our kids if they’re not safe, and
“We actually sat down as a group, the board, “We think it’s outside the box, but we they have to feel safe.”
sheriff ’s office to start with, and we tried to think it will work. Once we get this into place
come up with something outside the box in and go down this path, we think it’s the best Speed Agrees
case we did have a situation where we did thing out there.” Speed emphasized that it’s a partnership
have an active shooter in Banks County,” Speed commends Dr. Ann Hopkins, between law enforcement and educators.
Speed said. “We looked at everything around superintendent, and Dr. Hank Ramey, assis- Speed said the Banks County Board of
us in the region. We even had folks looking tant superintendent, for working with sher- Education pays 100 percent of the salary of
nationwide to see what people were putting iff ’s office leadership to bring the program each assigned HERO and SRO, while the
together to respond and see what kind of into being. sheriff ’s office provides the training and
situation they were putting their folks into, “We’ve been fortunate in the fact that all equipment.
how they were going to respond, what they the administrators, Dr. Hopkins and the pre- “While we think we’re the experts in edu-
were going to do. We were looking for an vious superintendent as well, were very cation, we’ve got to listen to what the
answer, because at that time we felt like it interested in seeing how this thing would experts in safety tell us,” Hopkins said.

8 c a m p u s l if e s e c u r it y.c o m | S E PTE M B E R/ O CTO B E R 2019

0919css_CS008_009_Moore_v2.indd 8 8/29/19 10:25 AM


Michele Paccione/Shutterstock.com
“That’s what we learned from the shooting purpose and function is different from the started looking for something that we could
in Florida is that education people don’t HERO Unit. do differently to try to make sure everybody
know enough. We are so thankful for the “The school resource officers will remain was safe, I had no qualms at all about saying
relationship that we have. They are putting in the schools,” Wilson said. “They’re going look at this and see what you can come up
their money where their mouth is, and we to be very visible and they’re going to be out with and let’s go down this path and make
can’t appreciate that enough.” in the hallways, they’re going to be teaching something that’s unique and different that’s
Deputies assigned to the HERO Unit classes. Our CHAMPS program is still going going to work.”
undergo a psychological evaluation, multiple to be going on in the fifth grade, so you’re not Hopkins said she and Ramey also are very
physical fitness assessments, advanced fire- going to lose that piece. And I think that’s the thankful for the unwavering support of the
arm proficiency skills and other undisclosed comfort level.” board of education.
tactical training, “all the while getting used Ramey said the SROs are on the front lines “They have listened to every recommen-
to the overabundant amount of equipment of discouraging any potential threat, but hav- dation we have made, whether it be about
assigned to them,” Wilson said. “Lt. Mark ing the hidden tactical layer is designed to preventive care or how to keep kids safe, and
Gerrells, a highly sought-out Special Weap- ensure that any active situation is addressed they have not batted an eye,” Hopkins said. “I
ons and Tactics [SWAT] instructor, wrote the quickly and ends with minimal casualties. just can’t thank them enough for the support
training program specifically tailored to the “They work with each other, but they are we have. We’re blessed.”
requested needs of the premier HERO Unit.” separate,” Ramey said. “We’re not losing the The HERO Unit began last school year but
Wilson said the slots in the specialized SRO. We’re maintaining that friendly pres- remained confidential for safety and logisti-
unit were filled by veteran law enforcement ence, that relationship building that instructs cal reasons.
officers with the right qualifications. and teaches with student interaction and Speed hopes that uniqueness will discour-
School leaders and the sheriff ’s office directs traffic with a smile on their face and age anyone who might contemplate causing
command staff work to ensure the right fit of lets folks in the community know that police harm within the school system.
a HERO Unit member in a particular school. officers are here to protect and serve. ” “I don’t know of anybody else anywhere
“We work together and make sure that we that’s got anything like it, but I think we’ve
get them the right people that they are com- Hopkins Agrees got something that’s going to save lives and
fortable with, also,” Wilson said. “We have to Banks County has 2,800 students going into it’s going to protect our children, which is
be very comfortable with these people that the new school year. ultimately the goal that we’re all looking for,”
we’re sending over into this position.” “I knew immediately that we had the Speed said.
Wilson said school resource officers will opportunity to build something here that
remain in the county’s schools, and that their would be unique,” Speed said. “When we Rob Moore is a reporter for AccessWDUN.com.

S E PTE M B E R/ O CTO B E R 2019 | c a mpusl i f e securit y .com 9

0919css_CS008_009_Moore_v2.indd 9 8/29/19 10:25 AM


security partnership

By Kaitlyn DeHaven

A Crucial Collaboration
How police departments and integrators can come together
in partnerships for the well-being of their communities

Leonard Zhukovsky/Shutterstock.com

T
here are two essential components to effective school sion between police officials and integrators. After they had been sit-
safety—security systems and police response. For ting discussing security for a time, he began to understand the strain
years, the two have been divided and seen as two sepa- was on their relationships. He quickly came to the realization that the
rate entities—the first provided by integrators, and the strain came from the reality of police officials who weren’t communi-
second provided by the city or state police department. cating with integrators, even though they offered a multitude of
Chief Tom Weitzel, the Riverside, Illinois Police Department’s chief expertise in their areas. He said it felt as if each of the organizations—
of police, suggests that if the two were blended into a partnership, law enforcement and integrators—had proficiency in certain safety
security measures could become more effective than they are when fields, but neither of them wanted to look to the other for help.
working autonomously. Weitzel, who oversees security for the River- “I realized we really couldn’t do our job without their assistance
side school district, said that by bringing the two organizations when it comes to school safety, and even safety in general,” Weitzel
together, industry leaders and government officials can create a said. “There was this real disconnect between public law enforcement
school safety plan with better integration and communication. and the [integrators] that were there.”
Weitzel gave a presentation at the security conference, and after
Resolving the Tension presenting, he sat back down at his table. As soon as he returned, an
While speaking with some individuals from the security industry at a individual turned to Weitzel and told him that he had just been con-
conference last year, Weitzel realized there was an overwhelming ten- tracted to install the security cameras for Weitzel’s school district.

10 c a m p u s li f e s e c u r i t y. c o m | S E PTE M B E R/ O CTO B E R 2019

0919css_CS010_012_DeHaven_v2.indd 10 8/29/19 10:26 AM


See us at GSX
Chicago
Booth 225

LocDown Any Door from Safely Inside with


®

Budget-Friendly Classroom Locks by Marks


Keep teachers, staff and students safer in the classroom with Marks LocDown® Locks.
In the old days, with a standard lock, someone would have to go outside into the hall
to lock up a classroom, but LocDown Locks uniquely lock from the inside, so no one
has to potentially face an external threat. Created in conjunction with, and spec’d
by, one of the largest school districts in the country (LAUSD) and used by many
more nationwide, Marks LocDown Locks have an inner door key and lock-down
indicator, and easily & super-affordably replace any standard door lock.

• Lock Down in seconds, with a simple key, • Classroom Locks in cylindrical or mortise
safely from inside the classroom, without lock styles, with unique double cylinder
having to step foot into the hall or danger locking mechanism
• Lockdown indicator gives visual peace of mind • Ultra Durable for Life -
• Retrofits any standard lock easily Lifetime warranty; exceeds
& very economically ANSI/BHMA Grade 1 standard

Get a Free LocDown Lock with Find out how safe your school is with a free
professional onsite survey & get a Free LocDown
Free SAVI™ Onsite Security Check: Lock** Sign up online at https://bit.ly/2IdzS1O

1.800.645.9445 • salesinfo@marksusa.com • www.marksusa.com


SAVI® (School Access-Control Vulnerability Index) and LocDown are trademarks of Marks USA/ Napco Security Technologies, Inc. **Free Lock, model 195DB/26D,
with completed onsite S.A.V.I. survey by security professional, no obligation, no charge. (Offer limited to one free lock per school.) For full warranty details, consult manual or see terms online.
Go to http://sp.hotims.com and enter 718 for product information.

CS&LS-8x10-75StopOldSchoolFear082619FP-A.indd 1 8/26/19 5:12 PM

Untitled-6 1 8/26/19 2:58 PM


security partnership

“I realized we really couldn’t do our job


without their assistance when it comes to
school safety, and even safety in general.”
Weitzel said it took him aback, as he didn’t even know the integrator excellent reason for the partnership to take place, as the integrators
had been hired to install the cameras. Even though he was directly are well equipped to assist the department.
involved in the overall security of the schools, he hadn’t been put in “The small, suburban departments a lot of times say they don’t
contact with the integrators. Weitzel continued to make conversation have the money, they don’t have the expertise, or they’re under-
with the individual while wondering why they had not spoken previ- staffed,” Weitzel said. “Well, this is where the [integrators] can help
ously about the district's security needs. As he was discussing the you. In most of the cases, they’re not understaffed. In some cases,
installation, he realized that the integrator had an abundance of they’re willing to do the leg work up from with you for no extra cost,
expertise in his field, and that he could become a meaningful partner or it’s part of the entire package they submit to the school district.”
with police to maximize security.
“Talking to him, I realized he had this wealth of knowledge,” Weit- Clear Intentions
zel said. “He knew exactly what he was doing. He had a plan for how He said the best way for departments to approach this partnership is
they were going to put in the cameras in the schools strategically. by being clear with their intentions, and by leveling the playing
Then, I invited him to tie them into our current system here at the ground between the integrator by making it clear that they won’t
police station so that the 9-1-1 center, along with my officers on their patronize them if the integrator will do the same.
laptops, could access these cameras.” “I think that the best way to go about it is to approach them col-
laboratively and say ‘I don’t really want you to be a integrator. I want
Benefitting School Security you to partner with me—I want you to partner for school security, so
Weitzel said this camera integration will be taking place in the near we’re both on the same level," Weitzel said. "I’m not talking down to
future, but it’s just one of the ways this partnership can benefit school you, you’re not talking down to me, we’re actual partners.’”
security. Since the integrators know how the cameras will be used, Weitzel shared his belief that ego is likely preventing this partner-
and what their capacity is, they can guide police officers on how to ship from happening. He said sometimes it’s easy to get caught up in
best use the equipment to amplify security. Additionally, he said the your level of authority and forget the reason for the position. It's
integrators can help officers draw the line between creating a secure much more beneficial to work together to make a plan for the com-
campus and making the school a fortress. The security professionals munity, rather than each organization thinking they’re more impor-
can also build camera programs into squad cars for police to monitor tant, Weitzal said.
and teach police how the perimeter security systems work to ensure The first step in combating these egos is taking a step down, Weit-
they’re being used correctly. zel said, and realizing the departments are equals who have different
Furthermore, integrators will often offer security surveys to show strengths and are not competing but completing. Once these depart-
facilities which equipment they should install to best increase secu- ments and integrators have built a successful partnership, hey can be
rity. This could include a number of products ranging from physical an example for others to show them how beneficial it is to work
barriers to buzzer doors to bullet-resistant glass. Weitzel said if the together. Once the program is built out, it can be demonstrated to
police officials and the integrators were to work as a partnership, they other municipalities and cities, showing them how it worked for
could work together to recommend proper security measures to the them, and it can work for others too, Weitzal added.
school board after a survey took place. “I don’t care who gets the credit,” Weitzel said. “My only goal is to
“He goes to the facility and he gives them a written report,” Weitzel serve my residents and especially these young children that go to our
said. “Then, both of us—the police and the [integrator]—will insti- schools. The parents have no interest in who made it secure, they just
tute the recommendations that your school board approves, but we’ll want the facility to be secure and the police response to be right.”
do it as a partnership.”
So, what’s the hold-up? Why hasn’t this partnership idea already Training the Integrator
progressed to a place of paramount security? Weitzel said delays to Weitzel said another way the partnership could be formed from day
these alliances can reside in the finances of smaller communities or one is by opening up resource trainings to security integrators. The
even the egos of those involved. trainings can go as long as three months, which would really give
Some bigger, metropolitan communities have already begun to police officers and integrators the chance to bond on a deeper level
work on these partnerships, but many smaller, suburban community early on and understand the other's approach to security.
police departments fight back because they don’t believe they can Weitzel said that, as always, the public should be the first priority,
afford the equipment these security integrators provide, thus prevent- and in this case, these partnerships would be immediately beneficial
ing a partnership. Weitzel said this is false, and many individuals are to the public. That's why the change needs to happen now, he said.
so willing to partner that they will help you to obtain available grants. “You have to put the public first, and in this case, you have to put
All the materials to obtain a grant are out there for the department to the school students first,” Weitzel said. “Let’s partner, and let’s just do
take advantage of, Weitzel said, and integrators are financially incen- this together for our schools and our children that go to those
tivized to help law enforcement obtain them. schools.”
One of the other ways smaller, suburban departments might resist
a partnership is by saying that they’re understaffed, or they don’t have Kaitlyn DeHaven is an associate editor with Campus Security & Life
the expertise necessary. Weitzel said this isn’t an excuse but rather, an Safety magazine.

12 c a m p u s li f e s e c u r i t y. c o m | S E PTE M B E R/ O CTO B E R 2019

0919css_CS010_012_DeHaven_v2.indd 12 8/29/19 10:26 AM


CEIA USA • THREAT DETECTION THROUGH ELECTROMAGNETICS

CEIA Metal Detectors for


School and Campus Protection

PD240
Hand-Held
Detector

EMIS-MAIL Scanner

Our threat detection and screening systems take the


guesswork out of security screening. Incorporating the
latest in threat detection technology, CEIA sets the
standard for safety, convenience and accuracy.
THE CEIA DIFFERENCE
• Superior detection and throughput HI-PE Plus
Walk-Through
• Unmatched reliability Detector

• Exceptionally high discrimination of non-threat items


• Compliant with the strictest security standards
• Walk-through, hand-held and table-top models to fit facility needs

For more information, contact your CEIA USA representative at


security@ceia-usa.com or call us today at 833-224-2342.
CEIA USA, Ltd. All rights reserved. CEIA USA reserves the right to make changes, at any moment and without notice,
to the models (including programming), their accessories and options, to the prices and conditions of sale.
WWW.CEIA-USA.COM
Go to http://sp.hotims.com and enter 709 for product information.

Untitled-2 1 6/18/18 1:51 PM


data challenge

“Security operators
must balance the high By Jeffrey Lewis
expectations for an

Intelligent Campuses
elevated and modernized
campus experience,
with the need to protect
what matters most.” Require An Advanced
A
lthough you may immedi-
ately think of educational
facilities when someone
says the word “campus,”
these environments can also
Security Strategy
The digital revolution has opened the door to a
be found across a host of other vertical mar-
kets, including healthcare, government and flurry of incoming data from numerous entities
business enterprises. Regardless of the spe-
cific market a campus fits into, the manage-
ment staff responsible for these facilities are
more focused on security than ever before.
Traditional risks, such as workplace violence,
terrorism and insider threats continue to
evolve, while combating cybersecurity
threats has gained importance when consid-
ering a comprehensive security strategy.
Campus leaders have a tremendous
responsibility in ensuring the protection of
what matters most to their organization—
students and faculty in a university setting,
patients and hospital personnel in a health-
care setting or corporate employees, custom-
ers and customer data in a business setting.
The stakes are high, and as the impact of
these threats on an organization rises, the
need for a real-time, predictive and compre-
hensive security strategy increases.

The Data Challenge for


Campus Environments
The digital revolution and prevalence of con- Dmitry Kalinovsky/Shutterstock.com

nected devices has opened the door to a


flurry of incoming data from numerous sys-
tems and sensors, and campuses need mod-
ern ways to capture and analyze this infor-
mation to make informed decisions. At the
same time, each connected device increases
an organization’s vulnerability to nefarious
activity and data breaches. A new compre-
hensive security approach is necessary to
help mitigate these risks so that campus lead- ficial intelligence (AI) and 5G have the while protecting what matters most.
ers can gather, process and analyze the data potential to help all types of organizations
available to them to enhance security, mod- offer better services, more robust user expe- The Heart of the Intelligent Campus
ernize services offered on campus and riences and increased safety. Below, we take a In the dynamic and fast-paced campus
increase operational efficiency.  closer look at which innovations and ideas environment, security leaders need to look
The idea of an intelligent campus has are changing the campus security landscape at managing security threats holistically.
grown over time as we’ve seen the Internet of and how you can gain the most value from This can be a challenge, however, as securi-
Things (IoT) mature. At the same time, arti- them to improve your campus experience ty systems such as intrusion, access control

14 c a m p u s li f e s e c u r i t y. c o m | S E PTE M B E R/ O CTO B E R 2019

Untitled-2
0919css_CS014_015_Lewis_v2.indd 14 8/29/19 10:27 AM
and video surveillance often operate in silos. This makes it difficult leverage automation and advanced threat detection, information
for security leaders to access the information they need when they must be available and accessible anytime, anywhere. The proliferation
need it most. of mobile devices makes this possible and gives organizations more
The Intelligent Security Operations Center (ISOC) is critical to the ways to protect people, property and information in mission critical
success of an intelligent campus and can help address this issue. The environments.
ISOC aggregates multiple systems into a single interface and exposes For example, there are mobile applications available today that
it to an analytic layer that results in the delivery of actionable intelli- allow users to press a button on their mobile device and immediately
gence. The ISOC incorporates AI to provide data about what is hap- alert security to a threat. Operators in the central command center
pening across a campus’ domains and helps operators determine the can then open a line of communication with that user, obtain real-
impact to the organization. Over time, the ISOC’s ability to unify time video of what the user is witnessing, acquire their location and
incoming data and leverage machine learning to identify patterns and communicate with that user to update their status.
detect threats will help an organization take a more proactive  Additionally, mobile video applications can help security officers
approach to their campus security needs. gain more insight to a situation when it occurs. These applications
can push data to their mobile devices in real time from first respond-
Automation ers, employees or citizens providing them with specific information
At the core of the ISOC is a level of automation that ultimately on a security incident. This helps the operator assess the risk and
increases efficiencies for campus leaders. It’s clear that for campuses respond quicker and more efficiently to the situation at hand. Overall,
to predict and identify threats in real time, actionable, intelligent data mobile capabilities add significant value to any organization’s security
analysis must take place to present a unified risk scenario to the strategy by providing more data to the security operators and extend-
appropriate operators. ing their reach far beyond the campus footprint.
Advanced analytic applications, in conjunction with enterprise The intelligent campus empowers organizations to be more effi-
class security software, address this by gathering, processing and ana- cient, effective and proactive in delivering best of breed services while
lyzing the data to deliver greater situational awareness and instant protecting people, property and information assets in today’s ever-
notifications to facilitate immediate action. These powerful solutions evolving risk environment. Security in an intelligent campus scenario
streamline investigations and empower operators to make rapid, is extremely complex. Security operators must balance the high
informed decisions without expensive infrastructure changes. expectations for an elevated and modernized campus experience,
with the need to protect what matters most. This type of environment
On the Go requires a comprehensive, coherent and cohesive security plan.
With the introduction of the smartphone, mobility has taken center
stage, even in the security industry. For campuses to stay ahead and Jeffrey Lewis is the vice president of marketing at Verint SIS.

Online Security Technology Training


Take charge of your security technology training with our online training courses.
Train as an individual or implement a companywide program with a Corporate Account.

Our courses are suitable for everyone in the security


industry. They are available 24/7, making it the most
convenient and cost effective solution for anyone
who wants to improve security knowledge or skills.
Approved for Continuing Education (CE) by various
security associations and government bodies, the
courses include:
+
• CCTV + Digital Video
• IP Networking
• Access Control
• Biometrics Technology
• Fiber Optics
• Basic Electricity
• Wireless Technology

Register today atsecuritytodayacademy.com


Go to sp.hotims.com and enter 717 for product information. 15

Untitled-2 1 8/26/19 11:24 AM


0919css_CS014_015_Lewis_v2.indd 15 8/29/19 10:27 AM
CoverStory

Security Technology is a Top Priority

G
ary Christian has been in K-12 campuses secure. That security starts at staff if a weapon has been detected.
law enforcement for 42 any given front entry. Detroit Public Schools
years, and he has never (DPS) has been using IPVideo’s ViewScan Making the Unknown, Known
had to fire his service for the past eight years with outstanding suc- Detroit schools have been faced with similar
weapon. He wants to keep cess. Crime has been reduced by 37 percent security issues as other schools nationwide.
it that way. After 32 years and a retirement as and even sharper declines in serious crime In the 2010-11 school year, a technology
a deputy chief of Detroit Police Department, by 61 percent. push was put in place, particularly at the
Christian has spent the past 10 years with ViewScan has been the cornerstone in high school level.
Detroit Public Schools, the largest school reducing campuses crime, including detect- “DPS was facing heavy crime and various
district in Michigan. ing a firearm. This technology has been vital- types of weapons coming into school,” said
There is no secret to his successes. He is, ly important for DPS as attendance has Rick Cadiz, the vice president of sales and
however, sold on the idea that using the best increased, and the solution is less intrusive, marketing at IPVideo Corp. “The school dis-
technology possible will assist in keeping replacing the unwanted physical pat down by trict had been facing a situation where atten-

16 c a m p u s li f e s e c u r i t y. c o m | S E PTE M B E R/ O CTO B E R 2019

0919css_CS016_018_Jensen_v2.indd 16 8/29/19 10:30 AM


By Ralph C. Jensen

quickly liked what he saw. His recommenda-


tion to the school board was to deploy the
security solution, cutting throughput time
quickly. The process was faster as children
were screened quickly without cutting into
class time. Christian said that the school
then deployed the system as both a portable
solution and fixed units, including a custom
system that is built into the door frames.
Since the initial installation in 2011, 32
schools have been outfitted with ViewScan.
At this point, security within the district
took on a life of its own.

Finding Concealed Weapons


DPS began with the installation of the con-
cealed weapons detector walk-through por-
tals, which use advanced magnetics technol-
ogy to accurately pinpoint threat objects on a
visual image of the subject. An investment of
more than a half million dollars allowed for 60
portals to be installed. This also allows a
photo tag of every student entering the build-
ings in a faster, more efficient procedure.
“It is simple for staff to work with this
security device,” Cadiz said. “This is a passive
technology, so anyone walking through it is
safe from electromagnetic radiation pulses.
The throughput can reach as many as 1,000
students per hour.”
Monkey Business Images/Shutterstock.com

The solution provides digital images of


not only the student but also the exact loca-
tion of a weapon or cell phone on that per-
son. An alarm will sound when an unwanted
item is located. Monitors or security staff are
able to pull that person aside and stop the
person who is carrying an unwanted item.

The Upgrades Continue


All new and renovated schools have received
an enhanced security entrance with security
office and monitors to display all school
“ After 42 years in law enforcement, I’m at a point in my cameras. All schools in the district will ben-
efit from an $18 million camera and alarm
career where I want to see students getting a safe and upgrade. The upgrades are currently taking
place, and were in the works over the sum-
secure education. I don’t want anyone walking out of mer months. The cameras, and the ViewScan
displays, also can be viewed at the Command
here with a felony conviction.” Center and from the school’s administration
area and principal’s office.
dance was down because kids were afraid to were also concerns about a delay in the “Under this system, when there is an inci-
go to school. Parents were concerned that school day beginning as it was taking some dent or unwanted entry, cameras and alarms
their children were being treated like crimi- time to get students through security.” will activate at the doors,” Christian said.
nals and patting the student down. There Christian learned about ViewScan, and “The camera system will initiate and record

S E PTE M B E R/ O CTO B E R 2019 | c a mpusl i f e se curit y .com 17

0919css_CS016_018_Jensen_v2.indd 17 8/29/19 10:30 AM


CoverStory
to ensure improved student achievement and
school success. The school has ViewScan at
both the North and South entrances of the
school. The school graduates 97 percent of its
senior class.

Western International High School


Western International High School is located
in southwest Detroit and is a safe haven for a
diverse group of students. Being the only
comprehensive high school in Southwest
Detroit, Western serves as a feeder to the
surrounding middle schools. We have a mul-
ticultural community of students and staff to
optimize support for success. The diverse
enrollment includes one of the largest bilin-
gual populations in the state of Michigan.
As it was built in 1813, it has served gen-
eration after generation of students that have
moved on to further education. This high
school is a PBIS school and provides various
services for students to succeed. In addition
to staff support, Western has developed
strong partnerships with various colleges
like Wayne State University and Central
Michigan University through their Upward
Bound Programs that guide and assist stu-
dents through their high school career.
The pathways offered include the Engineer-
ing Mobility and TEACH (Technology, Engi-
neering, and Clinical Health). In addition to
the career pathways, Western has a great
the previous 15 seconds of activity to the with a gun, this is a felony offense. Knowing Vocational Tech program that allows students
alarm. Cameras also activate at the Com- this is in place also serves as a deterrent. to get first-hand experience in the profession-
mand Center. Officers at the Command Cen- People know we have them in place; they al field of their choosing. This high school also
ter then can activate video of all cameras at a know they work. Since installing this secu- has chosen to secure its student body with
school to know the exact place to respond.” rity system, we’ve been lucky, but students ViewScan at both entrances, enhancing the
IPVideo Corp. took control of the manu- also will tell us if there are guns on the way student experience on a daily basis.
facturing, sales and marketing of ViewScan to school or if there is an intent to bring a All other schools within the district
in 2018, and the most exciting part of the gun to school. Students know their lives are remain on the mind and collective con-
security system is that they have been main- on the line as well.” science of the district’s police department
tenance free the past eight years. and administration. Cost is a factor, as it is
“This security system is a game changer in Cass Technical High School with anything, to outfitting schools with the
terms of school security,” Cadiz said. “DPS Two schools with the largest population of proper security equipment. The plan is to
has an enrollment of nearly 50,000 students, students have been the test bed for ViewS- protect all schools with the ViewScan secu-
and 106 schools, and close to 16,000 staff and can. Cass Technical High School has a popu- rity system. The system is monitored by
more than 3,000 teachers. Reliability and lation of more than 2,400 students. Demo- security professionals; one armed and one
security were at the top of mind when choos- graphically, the student population is 85 unarmed, who watch the screen for possible
ing a system to protect everyone.” percent African American as well as a diverse unwanted objects. It is always about safety
Christian said that now, even eight or nine population of students of Bengali, Hispanic/ and security, Christian said.
years later, ViewScan remains a state of the Latino, Arabic, Asian, and Caucasian “After 42 years in law enforcement, I’m at
art security system. He said times have descent. This demographic is reflective of the a point in my career where I want to see stu-
changed in the security world and within the community at-large. The instructional staff dents getting a safe and secure education. I
education vertical. Schools and school secu- also reflects a similar ethnic diversity. Cass don’t want anyone walking out of here with a
rity staffs are looking for precautionary mea- Tech attracts its student population from the felony conviction,” Christian said. “And, I
sures to ensure a safe and secure school. city of Detroit as well as the larger tri-county don’t ever want to have to pull my service
What it comes down to are guns and people. metropolitan area. Students come to school weapon out of the holster. Kids need an edu-
“People know we have this security sys- with a wide range of abilities, talents, and cation, and if we provide the security, they
tem in place, so bringing a gun to school is skill-levels. Our success is anchored in col- can come to school without fear.”
the last thing on someone’s mind, or at least laborative, solution-driven decision-making
I hope that is the case,” Christian said. which is inclusive of all stakeholders. We cre- Ralph C. Jensen is the Editor-in-Chief of
“With a concealed weapon or being caught ated a strategic plan based on best practices Campus Security & Life Safety.

18 c a m p u s li f e s e c u r i t y. c o m | S E PTE M B E R/ O CTO B E R 2019

0919css_CS016_018_Jensen_v2.indd 18 8/29/19 10:30 AM


SECURE CLASSROOM IN SECONDS

3 SIMPLE 3 FAST 3 SECURE


FOR EXTREME EMERGENCY SITUATIONS
The Nightlock Lockdown Door Barricade allows a teacher to immediately
lock the door from inside the classroom, eliminating exposure during a
hostile intruder situation. This device makes it virtually impossible for
an intruder to break through an entry door.
• Simply add this safety device to
So
classroom doors afforda

59
ble!
$
• Works with outward and inward

95
swing doors
• No need to replace existing
hardware
• One time solution - easy to install ea.
• Lockdown in seconds

classroomlockdown.com
1-855-644-4856 TOLL FREE
Go to http://sp.hotims.com and enter 706 for product information.

Untitled-9 1 2/6/19 1:23 PM


securing campuses

"While no technology or planning will ever


eliminate active shooter threats, it can
significantly shorten the duration and
By Thomas W. Connell II
lessen the impact of the event.”

Confronting Active Shooters


Five tips for implementing shot detection technology

A
ccording to a recent report from the DOJ and FBI, false alarms by providing dual—or even triple—sound authentica-
there were 27 active shooter incidents in the United tion. However, it can be a costlier solution because more sensors may
States in 2018, resulting in 85 deaths and 128 inju- need to be used. There is always the potential for false alarms regard-
ries. Of these incidents, 16 occurred in business less of the technology employed. There are single-factor systems with
environments, five occurred in educational build- a lower false alarm frequency than some multi-factor systems in the
ings and two occurred in healthcare facilities. marketplace today. It’s important to discuss the potential with the
These situations are differentiated from other gun-related situa- system providers and ask them how, and against what conditions and
tions because the FBI recognizes that in an active shooter situation, catalysts, their systems have been tested.
law enforcement and citizens have the potential to affect the outcome With single-factor acoustic detection, computer-based signal pro-
based on their responses. To aid law enforcement response and help cessing helps increase precision by analyzing a sound to determine if
reduce the impact of incidents, security and life safety technology it’s an actual gunshot or just another sound with similar characteris-
providers have recently started offering gunshot detection systems. tics. For example, a cymbal crash from a drum set, which could be
Today’s schools, businesses and healthcare campuses are employ- found in the music department of many campuses, has been found to
ing indoor shot detection to reduce or eliminate delays and errors trigger false alarms. Ongoing testing allows developers to refine algo-
common in victim- or witness-initiated responses to active shooter rithms and rule out these potential false alarms.
incidents. Adding this technology to a campus life safety system can It is also important to consider that not every false alarm is neces-
help shorten the duration of an active shooter event. sarily a bad thing. In fact, it is arguably preferable to react to a false
While an active shooter incident is something that everyone hopes alarm than to have a system fail to identify an actual gunshot.
never occurs, all campuses should have a response plan and the tech-
nology to deal with the situation appropriately and quickly. In order 3. Know Best Practices for Sensor Placement
to select and implement the most suitable technology for a building Acoustic sensors are most frequently mounted in ceilings or on walls.
or campus, it is important to consider the following five suggestions. The range of sensors varies by manufacturer and depends on the
acoustical characteristics in the space, like reverberation and sound
1. Choose the System Most Appropriate for Your Building Layout absorption properties. Even the shooter’s body can create an acoustic
Some shot detection systems use single-factor acoustic verification to shadow when shooting forward with their back facing the sensor.
detect gunshots. Acoustic detection uses sensors to capture a sound. While there is no limit to the number of sensors that can be placed
Then, it develops an acoustic signature and uses computer-based sig- throughout a building, budget concerns are forcing campus facility
nal processing to validate if the sound is a gunshot. This data is then managers to focus their investment on placing sensors only in poten-
used to determine the precise location of the shot. tially high-target areas.
Other systems use multi-factor authentication, where two or more Some recommend placing sensors in areas where large numbers of
sensing technologies are grouped together. These technologies can people congregate like cafeterias, gymnasiums or auditoriums. How-
include the acoustic signature from a muzzle blast and/or from the ever, this is not necessarily where the first shots take place. Other
shockwave of a bullet passing through the sensor field, changes in variables, including building access, approach, motive and the shoot-
barometric pressure triggered by a shockwave, an optical flash/infra- er's actions all play into the location of the first shots. Entryways and
red signature from the ignition of explosive gasses in the ammunition hallways may be the most effective areas to detect first shots.
propellant and comparison of the acoustic signature against an audio It is important to note that system design will never be able to
library of previously recorded gunshots. cover 100 percent of a building. This technology should be part of a
Unfortunately, multi-factor authentication can fail to recognize an comprehensive campus safety plan developed by security profession-
active shooter event if one type of detection is not authenticated due als.When determining what system will best fit your requirements,
to the configuration of the space. For example, if an active shooter ensure the technology provider gives you a clear system design illus-
system requires both acoustic and muzzle flash authentication, wall trating areas of coverage. Above all, involve your local law enforce-
sensors will pick up the gunshot, but muzzle flash may be masked by ment and stakeholder emergency response agencies in the decision-
partitions or walls separating cubicles, offices or classrooms. While making process.
acoustic sensors can detect sound through walls and corners, infra-
red sensors can only pick up flashes within its line of sight. 4. Pick System Offering Communication with First Responders
Active shooter events present numerous challenges for first respond-
2. Understand the Potential for False Alarms ers and emergency staff. Communication of escalating events
The goal of multi-factor authentication is to reduce the number of between 911 and witnesses can be both confusing and erratic, which

20 c a m p u s li f e s e c u r i t y. c o m | S E PTE M B E R/ O CTO B E R 2019

0919css_CS020_022_Connell_v3.indd 20 8/30/19 12:32 PM


Let Garrett Metal Detectors help pinpoint potential threats at your schools.

SAFETY IS AFFORDABLE WITH GARRETT’S


NEW MZ 6100 WALK-THROUGH
• Multi-zone detection technology
• Highly visible LED indicators
• Special programs for schools, special
events and other key applications
• Broad discrimination and sensitivity
selections available
• Budget friendly and simple to program

800.234.6151 • 1.972.494.6151
Go to http://sp.hotims.com and enter 703 for product information. Visit garrett.com to learn more Made in the USA

Untitled-3 1 5/31/19 11:46 AM


securing campuses

can delay on-site response. This is com- safety and evacuation instructions while In the future, the integration of shot
pounded by the fact that active shooters can communicating with emergency services detection into existing life safety systems will
move at a fast pace throughout the build- and mass notification systems, prompting a enable facilities to leverage the infrastructure
ing—making it even more difficult to track quick response by law enforcement. already in place. After detection occurs, mass
the shooter and prolonging the event. Acoustic detection can also indicate the notification to occupants, first responders
Early detection can trigger a host of number of shots fired and the cadence at and law enforcement can be sent through the
responses including alerting students, staff, which they were released, giving insight into same systems used for fire detection. Like all
patients and other building occupants to the the type of weapon the shooter is using. This life safety systems, redundancies will be built
location where shots were fired while trig- data is sent to security, law enforcement, into shot detection technology to ensure
gering building alarms, emergency notifica- hospitals and fire service to enhance their continuous uptime.
tions, evacuation and sheltering procedures. overall strategic picture of the situation and While no technology or planning will ever
Recent tests have shown that shot detec- aid in response. eliminate active shooter threats, it can sig-
tion technology with automatic emergency nificantly shorten the duration and lessen
communication enables law enforcement to 5. Look for Integration Features the impact of the event. Advancements in
respond and mitigate a threat up to 60 per- To maximize effectiveness, it is important to shot detection give occupants, emergency
cent faster. Today’s leading gunshot detec- select a gunshot detection system that sup- management and first responders valuable
tion systems even offer map-based graphical ports multiple integration options, including seconds to react to active shooter events and,
user interfaces that display the location of video feeds from existing CCTV and intru- in turn, potentially save lives.
the shooter to building occupants and law sion systems, mass notification systems,
enforcement, as well as display audio and access control systems and panic button/ Thomas W. Connell II is the senior manager,
video of the incident. The systems provide manual initiation systems. Life Safety, at Johnson Controls.

22 c a m p u s li f e s e c u r i t y. c o m | S E PTE M B E R/ O CTO B E R 2019

0919css_CS020_022_Connell_v3.indd 22 8/30/19 12:32 PM


Quality Education AND Safety Walk-Through Metal Detectors

Do your students deserve


anything less?

Model WMD 433

Why install walk-through metal detectors?


Schools used to be considered a safe haven where students could focus on
studying and preparing for their future careers. But today, students need
more than just a quality education. They need Safety. ZKTeco walkthrough
metal detectors are a highly reliable added layer of perimeter security
for both students & faculty.

(optional handheld metal detector)


1 1 2 3
1

4
2

5
3

6
The more metal detection zones you have,
2 4 5 6
7

10
8

11
9

12
the greater likelihood of detecting concealed
3 7 8 9 13 14 15 metal objects. ZKTeco walk-though metal
detectors are available in 6, 18 and 33-zone models.
16 17 18

4 10 11 12 19 20 21

They’re all very easy to assemble & operate


22 23 24
5 13 14 15 25 26 27

6 16 17 18
28

31
29

32
30

33
and remarkably affordable.
 6 Zones  18 Zones  33 Zones

Call (862) 505-2101 opt #2 and speak to one of our metal detector specialists.

Visit us at GSX, Booth #2193 (optional wheel set)


6 Kingsbridge Road, Unit 8, Fairfield, NJ 07004
Phone: (862) 505-2101 • sales@zktecousa.com • www.zktecousa.com
Go to http://sp.hotims.com and enter 704 for product information.

Untitled-4 1 8/29/18 12:34 PM


campus technology

“It’s time to discuss how we got here


and where technology is taking us. ” By Lynn Wood

Teaching Evolution
Security’s growth and innovation in the education sector

Rawpixel.com/Shutterstock.com

E
ach day, we continue to see articles with headlines safety are at the epicenter of today’s conversations about the future of
about the steps and precautions being taken in K-12 security—and it’s time to discuss how we got here and where technol-
schools and universities to protect students and staff ogy is taking us. 
from would-be attacks. As the risks and their poten-
tial for damage become greater, school security staff Decrease in Crime
are realizing the importance of prioritizing safety and implementing Although  reports show a decrease in school crimes  the last two
solutions that keep their facilities protected. decades, school administrators, parents, faculty and communities are
Headlines in numerous publications consistently share the news, remaining vigilant and taking an active stance in determining how to
such as “Wisconsin District Plans Security Updates for the 2019-2020 best mitigate the various types of risks that these facilities face. Aside
School Year,” “Michigan District Prioritizes Security with $225,900 in from active shooting threats, schools must also take into consider-
Planned Upgrades,” “Montana District Updating Elementary School ation how to find ways to protect students from other incidents such
Security Measures” or “New Jersey School Tests Weapon Detection as theft, assault and bullying.
Technology.”  These articles demonstrate how student and campus So how has school safety evolved throughout the years to meet the

24 c a m p u s li f e s e c u r i t y. c o m | S E PTE M B E R/ O CTO B E R 2019

0919css_CS024_026_Wood_v2.indd 24 8/29/19 11:02 AM


Go to http://sp.hotims.com and enter 712 for product information.

Untitled-6 1 8/26/19 2:25 PM


campus technology

security needs of today? Not long ago, school security was defined by video surveillance, and in many schools, video is the first thought
chains on exterior doors, fences to protect children on a playground, when it comes to adding security solutions.
hall passes for students wandering outside of classrooms and emer- Today’s video management software (VMS) can be tightly inte-
gency phones in strategic locations on college campuses. With the grated with access control data allowing for a comprehensive under-
media attention surrounding active shooter incidents in schools, all standing of a situation, and quick decision-making. For example, if a
eyes are on campus security officials and the tools they are currently ‘door forced open’ alarm is triggered, officials can simultaneously
using to keep students safe. view live and recorded video of the incident and respond accordingly.
Security measures that encompass both technology and safety Video also can be a deterrent from theft and vandalism and is even
training protocols are gaining the most traction, as these methods being used to identify bullying in today’s schools.
aim to both implement innovative solutions and teach operators how
best to utilize the technology at their fingertips. Let’s examine some Old way: PA system announcements for lockdowns
of these measures and look at how schools are shifting priorities and
changing the definition of protection:
New way: Automatic lockdowns across a campus
One area that has seen significant improvement is in campus lock-
down options. In the past, when a school or campus was placed on
Old way: Open, come-and-go-as-you-please campuses lockdown, certain personnel were appointed to manually lock doors
New way: Secure entrances and exits allow controlled access to with a physical key, which was not the most efficient method in a
students, faculty, vendors and visitors crisis situation.
This put administrators in harm’s way and took critical time to
Comprehensively securing all corners of a campus is the goal of any
execute. Fortunately, new lockdown capabilities have been devel-
school administration team, as it’s important for students to feel safe
oped to increase effectiveness and protect faculty in the event of an
and for parents to be assured of the protection of their kids. But school
emergency. Schools can now leverage an access control or intrusion
officials are tasked with the challenge of balancing an open, welcoming
system that provides them the ability to lock down an entire campus
environment with a safe one, and sometimes that can be tricky.
remotely.
Today’s access control and visitor management tools provide
these leaders with the ability to provide security and issue lockdown
functionality in a simple and efficient manner, without making a
Old way: Mechanical lock-and-key systems
facility feel like a prison. Additionally, integrated visitor manage- New way: Electronic locks, mobile credentials/capabilities, remote
ment software makes it easy for parents, visitors and vendors to management and more
quickly check in and gain access to specific areas throughout the
Many campuses are still operating on a mechanical lock-and-key sys-
building or campus.
tem, which can be costly and difficult to manage. The rise and afford-
ability of networked access control and mobile credentials have made
Old way: Exterior door chains being used to secure mechanical lock-and-key systems a thing of the past for budget-con-
perimeter double doors scious schools.
New way: Network integrated access control on perimeter doors Additionally, remote management of a security system through a
Years ago, many gymnasiums and push-doors were locked with a key mobile app helps streamline decision-making, allowing officials to
and then secured with chains and padlocks. Maintenance personnel actively manage all aspects of an access control solution from any
were required to go from door to door with a set of keys to manually location for maximum flexibility. 
lock and unlock these doors.
We’ve since fast forwarded to the enhanced capabilities of security Old way: One-size-fits-all system
management systems supporting wireless locks and networked access
control solutions to regulate entry into and exit out of campus doors.
New way: Customized, integrated solutions
The demand for systems integration is providing campuses the
These solutions allow campus security officials and administrators to
advantage of interoperability between security and campus systems.
remotely monitor and change the state of perimeter doors with the
Instead of running multiple disparate systems that require manual
touch of a button.  During emergencies, this allows for faster response
data entry and duplicated effort, the ability to connect these systems
times and increased safety.
through customized workflow solutions allows for improved efficien-
cies and cost savings.
Old way: Focusing only on main entrance doors Campuses often integrate multiple data management programs,
New way: Integrated solutions expand access control options to such as housing, class scheduling and event management systems
include secondary perimeter doors with their access control and video solutions to deliver streamlined
operations.
In the past, it was common to think about nothing but primary
perimeter doors when it came to restricting entry from intruders. It
has since become increasingly clear how important it is to focus on
Continuing Evolution Through Forward-thinking Innovation
Whether 20 years ago or today, educators, administrators and parents
secondary perimeter doors as well—a facility is only as secure as its
can all agree on one thing: the need to provide safe and secure learn-
weakest link.
ing environments for students is of paramount importance.
Today’s integrated solutions enable school administrators to incor-
However, today’s campus security needs have become more com-
porate those secondary doors into their security strategy and ensure
plex, creating unique challenges when it comes to providing solutions
that all entrances to the facility can be monitored and locked down
that enhance protection while at the same time present a welcoming
remotely with the push of a button.
experience. As campus security needs continue to evolve, the solu-
tions designed to keep students, faculty and staff safe will also shift to
Old way: Standalone CCTV systems meet those demands.
New way: Digital video surveillance integrated with access control
Another key technology that has helped improve campus safety is Lynn Wood is the product portfolio manager at Vanderbilt.

26 c a m p u s li f e s e c u r i t y. c o m | S E PTE M B E R/ O CTO B E R 2019

0919css_CS024_026_Wood_v2.indd 26 8/29/19 11:02 AM


When Seconds Count
InfoBoards bring notification technology to help students and staff respond to critical situations.
The average USA national response time for emergency services is ten minutes; what happens
in that window is critical to survival.
OneVue Notify allows school administrators to alert students and staff in seconds rather than
minutes, which may help keep your people safer.

OneVue Notify InfoBoards


Bringing visual notifications to critical situations.

12:30PM WEATHER ALL CLEAR EVACUATE

Contact Primex to find your certified local partner today!


onevue.com/notify | 855-598-9494
Go to http://sp.hotims.com and enter 713 for product information.
Copyright © 2019 by Primex, Inc. The Primex and OneVue logos are the registered trademarks of Primex, Inc.

Untitled-2 1 8/30/19 11:48 AM


best practices

“Choosing an outside partner


that is an expert in safety and
regulatory compliance can be a
huge asset for a district.” By Michael Sander and Tom Strasburger

Meeting Today’s School Safety Challenges


Giving staff a voice to ensure employees have healthy working conditions

stockfour/Shutterstock.com

S
ustaining a safe environment for students and staff is—or at school culture rooted in safe practices, there are a lot of factors that
least should be—a key priority for all school districts. How- district leaders need to address as part of an effective safety plan.
ever, without a comprehensive plan in place, this can be a chal- Franklin City Schools in Franklin, Ohio faced its own challenges
lenging endeavor. From managing ever-changing regulatory with school safety before creating an effective, well-planned and com-
compliance requirements and ensuring the proper communi- prehensive approach to school safety that it could sustain long term.
cation channels are in place, to training staff and creating an overall The town is home to over 11,000 people and located in the fast-grow-

28 c a m p u s li f e s e c u r i t y. c o m | S E PTE M B E R/ O CTO B E R 2019

0919css_CS028_030_Sander_v2.indd 28 8/29/19 11:05 AM


DO YOU REALLY WANT AN “INTERCOM”?
OR DO YOU WANT INTELLIGENT COMMUNICATIONS?
HEAR, BE HEARD, AND BE UNDERSTOOD

EASY, INTEROPERABLE, SECURE

Learn more about Intelligent Communications at the Edge


at ic-edge.com
See us with our partners at GSX booths #468, 561, 1533, 1713
Go to http://sp.hotims.com and enter 714 for product information.

Untitled-1 1 8/30/19 11:07 AM


best practices

ing Cincinatti-Dayton-Springfield area. Franklin's school district to complete training courses.


itself features one high school, a junior high school, five elementary The district has been able to reduce paper and time spent chasing
schools and an early childhood center. The following best practices training records, while maintaining more solid data, as all records are
helped the district move from reactive to proactive in addressing any now kept digitally. This is a stark comparison to when the district had
potential concerns while ensuring a safe teaching and learning envi- to manage paperwork that was eight to nine inches thick during the
ronment for its more than 3,000 students and 300 staff members. PERRP audit.
Having accurate, consistent, and complete data is critical for docu-
Give All Staff a Voice mentation, recordkeeping, analysis, and reporting. With an online
The journey to creating a comprehensive safety plan at Franklin City system, the district is able to easily track all the data, spot school or
Schools started after an audit by the Public Employment Risk Reduc- employee trends, and be proactive in its intervention.
tion Program (PERRP), which ensures public employees in Ohio For example, if an employee is assigned a specific training course
have safe and healthy working conditions. This audit, which was initi- and does not complete it by the deadline, the district leadership team
ated by a group of teachers in response to safety concerns at an aging in charge of safety is alerted and that employee is sent follow-up
school building, revealed additional compliance issues and ultimately reminders.
cost the district more than $100,000 in investment. The district went Each Monday at the district’s cabinet meeting, the leadership
on to address the issues in a timely manner. team reviews training and incident data pulled from PublicSchool-
In addition to the compliance issues, the audit process notably WORKS’ Staff Accident Management System. This data is proac-
revealed that teachers often felt like their voices weren’t being heard as tively monitored, and any potential issue is addressed before it
building principals were the only ones who could file safety complaints. becomes a problem.
For example, a teacher might mention a loose hand rail or chip-
ping tiles to their principal, but it was up to the principal to put in the Get Extra Support
work order for the complaint. This was not always being done with Implementing a comprehensive safety approach from the ground up
consistency or fidelity. The responsibility for creating and maintain- can be a big task—there’s a lot of research and development that goes
ing a safe environment was too top-heavy at the administrative level. into the process before the training can even start. Choosing an out-
Now, any staff member can put in a work order. By spreading out side partner that is an expert in safety and regulatory compliance can
the responsibility and giving teachers a voice in creating a safe work be a huge asset for a district.
environment, staff morale has improved. Staff appreciate working in Through the partnership with PublicSchoolWORKS, for example,
a safe working environment and having active ownership in sustain- Franklin City Schools was provided a program management coordi-
ing that environment. nator who advised on and guided the implementation process and
ensured the district was meeting all federal and state regulations.
Provide Robust Training The district additionally has ongoing, around-the-clock access to
In addition to now being able to submit a work order, all staff is safety and compliance specialists, chemical safety specialists, and
actively involved in enhanced safety training. This includes complet- technical support professionals via a staff hotline. Having experts
ing online, district-specific training programs via the PublicSchool- assist with the process and be readily available to answer any ques-
WORKS Online Staff Training System on regulatory compliance tions, provides the district with reassurance that it is covering all of
mandates and board policies. its bases regarding a safe school environment.
These courses can range from crisis prevention to state OSHA The district's size and security needs are smaller compared to those
regulations to accident reporting as well as safety training courses on of a large metropolitan district, and it is likely that those larger dist-
issues like bullying prevention, consequence management and icts have more funds to spend on safety improvements for staff. But
responding to food allergies. The district is intentional about not Franklin's progress in this area demonstrates that partnerships can be
making the amount of training too excessive so that employees effective when any district, large or small, shows dedication to adjust-
understand it is not busy work, but rather an essential component to ing its mindset about workplace safety and selects the right provider
creating a safe school environment. or company to assist in its journey.
If an accident does occur during the school year, because of the By creating a comprehensive safety plan and establishing a culture
integration of training and the staff accident management system, where everyone is involved in and responsible for maintaining a safe
those involved are enrolled in and auto-notified to complete school environment, Franklin City Schools has significantly reduced
retraining courses within the online system to help avoid further the number of incidents in its district. This past school year, there
incidents. Or, if the district sees the need rise in a certain safety were only six minor safety incidents which equated to six days of
area at any point in the school year, it assigns specific training employees missing school time—nearly two-thirds less than two
courses as needed. years ago.
By providing robust training from the start, and continuing that In addition to this being an indicator of successful training, it
training throughout the school year, the district is saving money in means that teachers are in the classroom more often, which
the long term on workers’ compensation and substitute teacher costs improves student achievement—something that is the collective
that happen when a teacher is injured and out of the classroom. In goal of all educators.
addition, the reduction of staff injuries has had a direct and positive
impact on student achievement.
Michael Sander is the Superintendent of Franklin City Schools in
Franklin, Ohio.
Keep Good Data
Using an online system has made the district more efficient in a num- Tom Strasburger is the Vice President, Strategic Alliances at Public-
ber of administrative ways, in addition to making it easy for the staff SchoolWORKS.

30 c a m p u s li f e s e c u r i t y. c o m | S E PTE M B E R/ O CTO B E R 2019

0919css_CS028_030_Sander_v2.indd 30 8/29/19 11:05 AM


AI Delivering Actionable Results for Your Campus
Complete Video Security and Access Control Solutions

Avigilon solutions help you protect what is most valuable—your students, staff and faculty.

Real-Time Notifications
Avigilon self-learning video analytics provide instant alerts of events on school grounds
via desktop browser or mobile app, helping to improve response times in active situations.

Powerful Search
Avigilon Appearance Search™ technology sorts through hours
of video with ease to quickly locate a specific person or vehicle
of interest across an entire campus in near real-time.

Quick Action
Access Control Manager™ generated door events allow you
to create rule-based alerts for quick on-site responses, Personal Characteristics
including immediate school-wide lockdown. Gender

Easy Integration Upper Body Color

Avigilon solutions are built on an open platform, allowing


you to leverage previous third-party investments that
are ONVIF® compliant.

info.avigilon.com/education | asksales@avigilon.com
Go to http://sp.hotims.com and enter 715 for product information.
Product features and functionalities may not yet be available and, if and when available, may not be as depicted. Images and user interfaces have been simulated for illustrative purposes.
© 2019, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, ACCESS CONTROL MANAGER and AVIGILON APPEARANCE SEARCH are trademarks
of Avigilon Corporation. ONVIF is a trademark of Onvif, Inc. Other names or logos mentioned herein may be the trademarks of their respective owners.

Untitled-2 1 9/3/19 11:25 AM


best practices

“In addition to establishing


proper response proce- By Bruce Canal

dures, a comprehensive

Perimeter Protection
approach to campus
security must include
prevention-focused
security measures.” Security solution advances drive reevaluation of campus security

Titikul_B/Shutterstock.com

A
ccording to the National Center for Education Statis- Smarter Tools are Changing the Campus Security Game
tics (NCES), 95 percent of public schools engaged in Public perception of school security tends to lag a little behind the
lockdown drills designed to protect students in the times. For many, the idea calls to mind sash-wearing hall monitors,
event of an intruder on campus during the 2015-16 or perhaps a single school resource officer stationed near a high-traf-
school year—a number that has likely grown in the fic hallway. Even the more technology-focused solutions fail to accu-
intervening years. It is an astonishingly high percentage, and it effec- rately represent the tools available today: metal detectors and walls of
tively drives home the ubiquity of campus security concerns in the security monitors might still be a part of the solution in some cases,
United States. There are laws mandating the performance of these but they fall short of representing the depth and breadth of today’s
drills in 32 of 50 states, from K-8 schools to high schools and colleges. access control and monitoring resources.
Ensuring that students can play, learn, and grow in a secure environ- The truth is that, as concern for campus safety has blossomed, so
ment is perhaps the highest priority in the education field. too has the development of more innovative, affordable, and effective
Drills play an important role in keeping students safe, but they tools for monitoring and controlling the perimeter of campus build-
center around understanding what to do when an incident is already ings. The NCES notes that 81 percent of schools include cameras as
in progress. In addition to establishing proper response procedures, a part of their security solution. But what does this mean, exactly?
comprehensive approach must include prevention-focused security While it’s nice to know that a school uses cameras as a security mea-
measures. Today, there are more tools available than ever to establish sure, how those cameras are being monitored matters.
strong perimeter security and help campus security teams identify The difference between traditional, analog security cameras and
intruders and potential threats before they arise. today’s IP cameras is as vast as the difference between the tape deck

32 c a m p u s li f e s e c u r i t y. c o m | S E PTE M B E R/ O CTO B E R 2019

0919css_CS032_034_Canal_v4.indd 32 9/3/19 11:01 AM


Go to http://sp.hotims.com and enter 710 for product information.

Untitled-3 1 8/23/19 12:02 PM


in a 1995 Ford Thunderbird and the Bluetooth connection in a 2018 or attempt to force entrance. Either way, this can provide staff with
Tesla Roadster. Analog cameras require a human to be actively critical time to appropriately respond and alert authorities.
best practices

engaged with the camera system, and even those schools that can Thermal cameras also represent an interesting way to supplement
afford dedicated security personnel must face the reality that a security. These cameras are generally more affordable than standard
human being really can’t look at a wall of 12-16 cameras and fully video cameras, and maintain their effectiveness in rain, snow, sleet,
process what they’re seeing. For this reason, we have found that fog or any other type of weather. They are an ideal solution for roof-
more cameras do not necessarily imply better security. If the secu- tops or other forbidden areas because they can trigger an alarm as
rity staff monioring a 200-camera system cannot comprehend what soon as an individual is detected.
they’re seeing quickly or reliably enough to take action, what, then, This sort of detection is not limited to potential intruders.
is the point? Adventurous students may decide that the roof is a fun place to be,
putting the school at risk of a lawsuit should they be injured. Effec-
Better Tools Create Better Results tive thermal surveillance can mitigate the school’s liability through
Today’s tools address this challenge in a novel way: by removing the
active detection. This further highlights an important aspect of
human factor. Where analog cameras require someone to notice sus-
this technology: affordability. Not only are the cameras becoming
picious or out-of-place activity, IP cameras can detect it automati-
more affordable, but the reduction in security and surveillance
cally. Security teams can program cameras to alert the appropriate
personnel they enable and the possible lawsuits they mitigate mean
authorities or personnel if certain conditions are met. These param-
that the technology is not only effective but also has the potential
eters might include motion detection to identify intruders, supported
to pay for itself.
by size parameters to prevent a squirrel from tripping the alarm.
These cameras can help campuses increase their surveillance cov- When It Comes to Campus Security, Prevention Is Key
erage with fewer cameras, and those equipped with a radar detector The Partner Alliance for School Safety (PASS), a respected school
are particularly effective. Rather than deploy four cameras to cover a security organization, recently released a revised edition of its recom-
certain area, schools may find that only two IP cameras are necessary, mended guidelines for K-12 school safety, calling for a layered and
with a radar detector on the zoom capable of focusing on incidents tiered approach to security. The guidelines focus heavily on access
that meet the pre-established parameters and providing authorities control and perimeter security, with specific recommendations
with the best possible glimpse at the culprit. regarding security cameras and effective alarms. As tools like IP cam-
This innovative technology can also help secure entry points via eras, radar detectors, thermal cameras, and more become increas-
video/audio intercom access control. Door intercoms allow staff to ingly accessible, it will continue to be easier than ever for campuses
properly vet visitors before they gain entrance—a critical way to to bolster the security capabilities and ensure that their students are
potentially thwart or slow an intruder. Too many school tragedies as safe and secure as they can possibly be.
have begun with the assailant walking through the front door or gain-
ing access via a door that was not properly secured. An intruder will Bruce Canal, CPP, is the business development manager – education,
likely “show their hand” at the main door when they become agitated at Axis Communications.

Ad Index
Circle #.... Advertiser.................................................................. Page.............URL
715............. AVIGILON.............................................................................31....................www.info.avigilon.com/education
709............. CEIA USA.............................................................................13....................www.ceia-usa.com
702............. DESIGNED SECURITY INC...........................................3.......................www.dsigo.com
701............. DSX ACCESS SYSTEMS.................................................36....................www.dsxinc.com
707............. FIRST RESPONDER TECHNOLOGIES......................7.......................www.1stResponderTechnologies.com
710............. GAI-TRONICS.....................................................................33....................www.gai-tronics.com
703............. GARRETT METAL DETECTORS.....................................21....................www.garrett.com
712............. IPVIDEO................................................................................25....................www.ipvideocorp.com
706............. NIGHTLOCK........................................................................19....................www.classroomlockdown.com
718............. MARKS USA Division of NAPCO SECURITY..............11....................www.marksusa.com
713............. PRIMEX WIRELESS..........................................................27....................www.onevue.com/notify
708............. SAFETY TECHNOLOGY INTERNATIONAL.................35....................www.sti-usa.com/sp362
711............. SALIENT SYTEMS..............................................................5.......................www.salientsys.com
717............. SECURITY TODAY ACADEMY.......................................15....................www.securitytodayacademy.com
705............. VIKING ELECTRONICS...................................................2.......................www.vikingelectronics.com
714............. ZENITEL................................................................................29....................www.ic-edge.com
704............. ZKTECO USA......................................................................23....................www.zktecousa.com

34 c a m p u s li f e s e c u r i t y. c o m | S E PTE M B E R/ O CTO B E R 2019

0919css_CS032_034_Canal_v5.indd 34 9/3/19 11:48 AM


®
Rely on STI

…for weather resistant


outdoor push buttons
Weather Resistant LED Button is Visible at Night
or in a Dark Corridor

STI has the right button, right now. Larger 2” weather


resistant button is equipped with daylight visible
illumination. Available in six colors, standard or custom
phrases, with or without a protective cover. Several switch
options offered.
· Weather resistant button · Tough polycarbonate
Visit us at GSX, Booth #851 · Six color choices · Indoor/outdoor use
· Daylight visible illumination · Protective covers available

Learn more at sti-usa.com/sp362


or call 800-888-4784 2019

Go to http://sp.hotims.com and enter 708 for product information.

Untitled-8 1 8/13/19 3:51 PM


Go to http://sp.hotims.com and enter 701 for product information.

Untitled-5 1 8/12/19 2:08 PM

S-ar putea să vă placă și