Integrated Security Archives - City Security Magazine https://citysecuritymagazine.com/category/security-technology/integrated-security/ News and advice for security professionals Sun, 05 Jul 2020 11:24:19 +0000 en-GB hourly 1 https://wordpress.org/?v=6.8.3 https://citysecuritymagazine.com/wp-content/uploads/2021/08/Logo-Square-300x300-1.jpg Integrated Security Archives - City Security Magazine https://citysecuritymagazine.com/category/security-technology/integrated-security/ 32 32 Thermal camera systems taking the temperature of COVID-19 https://citysecuritymagazine.com/security-technology/thermal-camera-systems-taking-the-temperature-of-covid-19/ Wed, 08 Jul 2020 08:05:15 +0000 https://citysecuritymagazine.com/?p=8863 Thermal camera systems taking the temperature of COVID-19 Organisations need to consider investing now…

The post Thermal camera systems taking the temperature of COVID-19 appeared first on City Security Magazine.

]]>
Thermal camera systems taking the temperature of COVID-19

Organisations need to consider investing now in technology tools that create a more COVID-19-resistant and responsive workplace for the longer term.

An elevated temperature is one of the key symptoms of COVID-19, yet small body temperature changes are often unnoticed or dismissed by people in the early stages or mild forms of the virus. Despite being contagious, people may continue their daily interactions instead of self-isolating or seeking medical help.

Thermal camera systems are a quick and accurate way of identifying people with elevated body temperatures. The first systems were deployed in China in early January and then thousands were deployed across Asia and proved an essential part of their battle with COVID-19. Since early April systems have been installed around the UK, by the NHS, Sky, and in sectors such as education, food manufacturing and call centres.

How do they work?

Face detection algorithms target the skin temperature reading on the inner part of your eyeball near the tear ducts, which is the closest to your core temperature. AI algorithms reduce false temperature alarms caused by environmental influences.

How effective are they?

As a temporary solution, many companies are using hand-held scanners – but this increases the risk of cross-infection and puts operators at risk as well as taking 5-10 seconds to measure an individual’s temperature. To process 1,000 people would take 1½ to 3 hours.

In contrast, camera systems can be up to 800% faster, taking just 6 to 10 minutes to check the same number of people. That can be critical in high footfall areas such as airports and stadia where excessive queuing limits people flow and makes social distancing difficult.

What else needs to be considered?

To be effective you need more than just an off-the-shelf camera. It needs a blackbody device which emits a constant temperature within the field of view of the camera. This reference allows the system to calibrate other heat sources within the field of view to within +0.3C.  Some systems only calibrate to +0.5c which is only suitable for animals and machinery.

You should also look for accuracy, and consider throughput and ease of daily use – and if your organisation shares a building, you will need to negotiate with the landlord and other tenants if the system is to be deployed in a reception area.

Thermal camera systems need a settled environment to work best, and a technical site survey is recommended to ensure the optimum effectiveness of the equipment.

As with any new technology, clear communications to both workforce and visitors about how it works will help ease its successful adoption. They need to understand that it is not a diagnostic tool, but a system that measures external and not internal temperatures. If it identifies an elevated body temperature, it may be a sign of fever, which may be a symptom of COVID-19 – but not necessarily so.

It is therefore essential to establish protocols for how to deal with anyone triggering the alarm indicating an elevated temperature. This, as a minimum, must involve HR, Health & Safety and Security.

Organisations must consider GDPR compliance and remember that health data is classed as “special category data”. You must be open about why you are collecting and using any data and how long you plan to keep any recordings from the system. I would suggest no more than a day if no alarms have been triggered.

There also needs to be understanding that the system only uses face detection algorithms to improve accuracy of readings as opposed to face recognition which needs a database. Where we have already deployed systems, the workforces have been very positive and welcoming.

Will we need thermal camera systems in the future?

As virus lockdown restrictions are lifted, it is becoming clear that “normal” will not return for millions of businesses and organisations. They will need to invest now in technology tools that create a more COVID-19-resistant and responsive workplace or venue for the longer term.

Thermal systems are not a solution in themselves, but one of a range of integrated  infrastructure tools  and improvements that businesses such as restaurants, event venues, places of worship, schools and office blocks can deploy as part of what will become a normal contactless entry journey to help minimise the risk of COVID-19.

This will require clear strategy and policy guidelines so that staff and visitors will accept that this is a way for organisations to protect them and help them psychologically to feel safer.

Mike O’Neill

MD of risk and resilience specialists, Optimal Risk

 

www.optimalrisk.com

 

The post Thermal camera systems taking the temperature of COVID-19 appeared first on City Security Magazine.

]]>
Alarm response: technology and cooperation drive efficiencies https://citysecuritymagazine.com/security-technology/technology-and-cooperation-drive-efficient-alarm-response/ Fri, 13 Sep 2019 07:00:38 +0000 https://citysecuritymagazine.com/?p=7602 Alarm response: technology and cooperation drive efficiencies  Police Services in the UK stipulate that…

The post Alarm response: technology and cooperation drive efficiencies appeared first on City Security Magazine.

]]>
Alarm response: technology and cooperation drive efficiencies 

Police Services in the UK stipulate that police response to reported intruder incidents (burglary) is limited to where crime has been witnessed and where intruder alarm systems have a certificate of compliance. This certificate signifies they are installed to recognised industry standards by security companies approved by and registered with a recognised certification body such as NSI.

The number of properties protected by police response alarms continues to grow, yet the frequency of false alarms (as determined by the police themselves) has reduced by 90% since the policy became effective in 1990.

The drop reflects the professionalism, competence and general raising of standards in the installation of systems and 24/7 monitoring of premises. This is coupled with marked improvements in the way security systems installers and Alarm Receiving Centres (ARCs) work together in the service they provide their clients.

Moving to a more automated approach

Notwithstanding this increase in efficiency in deployment of police resources with reduced false alarms, plans are afoot to improve performance further by replacing the existing manual means of ARCs contacting the police by phone. This is to move to a more automated process, i.e. the automatic digital transmission of confirmed alarms from ARCs to police control rooms.

The idea is not new, some forces having adopted automation on a limited, sometimes bi-lateral basis for some time. The key point now is the industry stepping up to develop a national standard approach with potential to apply across the UK.

In 2017 NSI commissioned research about the perception and challenges for implementing such an idea. Its intent was to inform the automation steering group as to the key concerns and issues for all stakeholders, in particular concerning the imagined alarm signalling ‘bridge’ between ARCs and police forces.

The findings revealed an overall positive attitude to automation in principle, but, doubts from many stakeholders that the initiative was workable in practice, particularly because of the wide variety of incompatible operating systems and protocols ARCs and police forces work with. In any event, there was a highlighted need to engage broadly with industry to develop the idea. ECHO was born.

About ECHO – Electronic Call Handling Operations

ECHO is a not-for-profit company limited by guarantee, formed in August 2017. Its sole focus is the implementation of automated alarm call handling between ARCs and the police forces across the UK, with facility to deliver by 2020 in line with NPCC aspirations. Backed by Home Office funding, the initiative was driven by the British Security Industry Association (BSIA), the Fire Industry Association (FIA) and the Fire and Security Association (FSA), all taking their place on the Board of the new Company.

When fully rolled out, ECHO will manage signals from upward of 1.2 million certificated alarm systems via 120 ARCs directly to 44 Police Services and with potential to deliver in future, verified fire alarm signals to the 52 Fire and Rescue Services.

The aim is to simplify and speed up priority signalling of confirmed alarms from ARCs to emergency services control rooms, reducing queueing and call handling times, eliminating risk of human error, and allowing resources to be deployed in a smarter way. The benefit to be delivered will be an improved service to victims of intruder crime – be they residential, commercial or public service premises – and the public purse by enabling more efficient response to genuine confirmed alarms.

The ECHO project has seen the piloting of a technology platform with a number of Police Services and ARCs and is currently talking to potential service providers to deliver the electronic service. Alongside this, the ECHO management team is developing in consultation with key industry stakeholders the business model that will put its service on a sustainable footing and enable Certificated Intruder and hold-up Alarm Systems to be connected via approved ARCs to the ECHO service.

What does the future hold?

ECHO will help enhance the already close operational partnership between ARCs and the police. Further development of ECHO for security alarms could include connecting first responders in the emergency services with live video from alarmed premises, and potentially enhance fire alarm signalling from certificated fire detection systems in areas of critical infrastructure such as care homes and hospitals.

The National Fire Chiefs Council (NFCC) is taking interest in the ‘police model’ for certificated intruder alarm signalling with its track record of 30 years. The Fire Service has reported in 2018 40% of fire alarms attended were false, a total of 231,000 or one every two minutes. There is a school of thought that ECHO could be a catalyst for the Fire Service taking learnings from certificated verified alarm signalling the police have experienced, to raise confidence in technology to deliver high quality verified alarm signals and raise the prospect of greater efficiencies in the deployment of precious firefighting resources.

David Wilkinson, Director of Technical Services at the BSIA, said, “ECHO represents a real opportunity to embrace the digital transition that is taking place across the UK. Taking the longer view, its potential is immense, with critical infrastructure across all sectors of society, from hospitals to heritage, all potentially benefitting from prioritised enhanced confirmed alarms transmission.

“Both intruder and fire responders and the wider public can benefit from a more efficient alarm response to properties and people by 24/7 certificated alarm installations and monitoring supported by ECHO.”

Committed to high standards

NSI approval provides assurance that installers and the management and maintenance of alarm systems and control rooms deliver consistent best practice to help keep people and property safe.

NSI is accredited by the United Kingdom Accreditation Service (UKAS), the UK’s sole National Accreditation Body, responsible for determining, in the public interest, the technical competence and integrity of organisations such as those offering certification services.

UKAS accreditation signifies NSI companies operate its certification schemes and issue Certificates of Approval in accordance with International Standards for Accredited Certification of Management Systems such as ISO9001 (ISO 17021) and Product Standards pertinent to security and fire safety such as BS 7958 for CCTV (ISO 17065).

Companies that benchmark themselves against NSI approval schemes demonstrate commitment to the highest standards of competence in the delivery, operation, management and monitoring of alarms. NSI Gold approval includes certification to BS EN ISO 9001 (for a company’s Quality Management System) as well as its adherence to the relevant product standards.

Richard Jenkins

Chief Executive

National Security Inspectorate (NSI)

www.nsi.org.uk

The post Alarm response: technology and cooperation drive efficiencies appeared first on City Security Magazine.

]]>
High throughput screening to tackle terror threats in cities https://citysecuritymagazine.com/security-technology/using-high-throughput-screening-to-tackle-terror-threats-in-cities/ Fri, 13 Sep 2019 06:00:23 +0000 https://citysecuritymagazine.com/?p=7611 High throughput screening to tackle terror threats in cities In recent years, a shift…

The post High throughput screening to tackle terror threats in cities appeared first on City Security Magazine.

]]>
High throughput screening to tackle terror threats in cities

In recent years, a shift in terrorist tactics has added to the challenges faced by already stretched authorities. In particular, these criminals have looked to exploit the vulnerabilities presented by crowded public places in and around major cities.

Stadiums, government buildings, tourist attractions and transport hubs – anywhere the public gathers in large numbers – are considered ‘soft’ targets for terrorists: easily accessible and difficult to protect.

Existing screening processes

As venues and attractions increase in size to accommodate a growing population and general demand, so do the queues at security checkpoints. As it stands, screening processes can often be intrusive and inefficient in dealing with modern threats, requiring patrons to remove their outer clothing and bags before moving one at a time through the security screening lane.

Secondary queues arising from these security regimes are vulnerable to attack, becoming attractive targets in their own right.

There is therefore a clear requirement for high throughput screening that provides a good level of assurance against mass casualty threats, without causing disruption and secondary vulnerabilities; this capability gap needs to be addressed as a matter of urgency.

Challenges faced by technologies that can deliver this type of capability include working their way into cautious markets, and generating awareness of them amongst ‘end users’ and governments alike.

Formalising the approach at venues

Unfortunately, we may not have the luxury of time, as the threat of terrorism can manifest itself without any notice. The recent call for a review of security at sports and entertainment venues by Manchester Mayor Andy Burnham, and the implementation of standard security measures, is a response to lessons identified from terrorist incidents. There is a realisation that despite the lessons identified, we still remain extremely vulnerable and attractive to attack.

Whatever direction the review takes, it must ensure that any proposals do not compound matters by creating secondary vulnerabilities in the form of queues outside the very places that the security is trying to protect.

 Proportionate security

Although the threat of terrorism is likely to be an unwelcome fact of city life for the foreseeable future, people don’t want their day-to-day lives to be heavily impacted upon by security. This creates a challenge for authorities, transport operators and venue owners, who are not only tasked with finding suitable security measures, but with making sure they accommodate lifestyle and normality, without being oppressive or disruptive.

For older facilities, which weren’t built with modern security protocols in mind, this can be incredibly tough as the interior designs may not lend themselves to retrospective integration of security measures to counteract current threats.

For newer facilities, or those in planning, there’s often more space for the opportunity to design to accommodate emerging technology. Either way, practicality and proportionality will be critical factors in addressing these security concerns.

High throughput in real time

There are a number of technologies that aim to help mitigate the threat of terrorist attacks on crowded places and all have their place in various scenarios and concepts. These technologies will be woven into city infrastructure in the future and will contribute to the vision of safe and secure cities.

Technology now exists that can screen a high throughput of people (upwards of 5,000 people per hour), and detect explosives in body-worn bags. This technology can be easily integrated physically, and operationally only requires a small number of security staff to manage alerts.

There is no requirement to divest the person of mobile phones and laptops, to remove backpacks or any outer clothing.

And whilst this technology does not mitigate all of the threats, it deals with the most important of them. It is important that security technologies complement each other, whilst working towards the end goal of maximum protection via a seamless user experience in a way that is acceptable and reassuring to the public.

Conversely, the presence of these technologies should create uncertainty, and pose a threat to the terrorist, wherever they are encountered across a city’s architecture and infrastructure.

Securing the future

In general, interest in protecting crowded places from terrorism and the commitment required to do so tends to diminish as the memory of the last atrocity fades. Yet this doesn’t make the risk any less imminent, and it makes sense to take proportionate measures when vulnerability and threat coincide.

When it comes to crowded places and the modern city, technologies are now available to address capability gaps that were not easily filled without causing considerable disruption in the process.

Whilst there is no ‘one size fits all’ solution to terrorism, the latest screening technologies do offer a chance to take a more strategic view of security to determine how they can be most effectively integrated into cities of today and the future. In the context of this, a review of security, and the available capability to contribute to risk mitigation in the most vulnerable parts of our cities, sounds like a good idea.

Stephen Cooper, OBE

Director of Operational Solutions,

Apstec Systems

 

The post High throughput screening to tackle terror threats in cities appeared first on City Security Magazine.

]]>
Security technology: the importance of proper implementation https://citysecuritymagazine.com/security-technology/security-technology-the-importance-of-proper-implementation/ Tue, 27 Aug 2019 08:30:11 +0000 https://citysecuritymagazine.com/?p=7542 Security technology: the importance of proper implementation Proper implementation of today’s security technology can…

The post Security technology: the importance of proper implementation appeared first on City Security Magazine.

]]>
Security technology: the importance of proper implementation

Proper implementation of today’s security technology can deliver all the value promised in the sales pitch, but a rethink is required on how and why we get there.

Forget the future; what about now?

You saw the demo, you had the sales pitch and now you’re sold. Finally, there is a video management system (VMS) that allows you to run Artificial Intelligence against your suspicious person incidents to find where these people are likely to appear elsewhere across your estate!

Cutting-edge technology to revolutionise your security

It’s a familiar high that is felt by many system owners after becoming disillusioned with their incumbent platform, or when exciting new technology emerges on the scene – just look at what’s possible! Something cutting-edge that will totally revolutionise system management and make your team more efficient – it sounds fantastic. This example looks at CCTV as a discipline but the same story can be seen across the security systems landscape. What is often not addressed is why the existing system is being replaced. Of course, there are plenty of legacy systems installed across corporate estates that are no longer fit for purpose and those that can no longer deliver the scale required of a given environment, but frequently it’s because the existing system (or service provider) isn’t delivering what was originally envisaged. Identifying the reason why is the first step to improving the current system functionality, verifying the real user requirement, and enhancing the user experience as a whole.

Killer apps not working as advertised?

If we think about previous technological advancements in the VMS space, many solutions have offered the ability to set up automatic email reports based on user-defined rules, inclusive of images from the cameras – straight to your inbox. This is a useful feature that may well have been the “killer app” that led to a particular VMS being chosen, but this very feature could also be the reason it is now being replaced, because it doesn’t work as advertised. We regularly see cases like this, where a new function was never fully set up in the first place, or was perhaps rushed and not set up correctly, so it’s easy to see how the end user could feel a little short-changed.

This raises the issue of “why” again; why was this key feature not set up in the first place? Or, and perhaps just as likely, why was it not set up to provide the full benefit to the user? The reason invariably comes down to time. Where new systems are being installed, the bulk of the system programming time tends to be taken up with device configuration – adding cameras to the application, setting recording parameters, etc. This does cover the most critical part of the project – cameras must be online and recording on the system. Because the focus is always on getting the system “up and running” the core of the configuration time is spent on these activities, with additional “nice to haves” pushed towards the end of the project installation. This tight timeframe is further squeezed when there are the inevitable snags with installation / set-up. Ultimately, the key feature of the system – that “wow” factor from the demo – gets rushed at the end of the installation or worse, omitted all together.

Time allowed for configuration

What should be focussed on are the more complicated aspects of system programming; it makes sense to spend most of the amount of time available on the most technically challenging configuration items. Sadly, this is rarely the case. We have these evermore powerful systems utilising cutting edge technology and yet the majority of the installations tend to be ticking only the most basic of boxes, and yet we’re all still looking to what’s brand new rather than getting the most out of what already exists.

The problem causes many different friction points during an installation, from integration partners who are forced to use the project time to on-board hardware, leaving the system integrations between manufacturers (another example of high complexity requiring close management) to the end of the process, to the manufacturers who are either left defending their feature-set or having to send their own engineers to babysit the set-up, something that adds to the cost and erodes the confidence in their systems. The ensuing finger-pointing often leaves a bad taste in the mouth of all involved and an amount of trust lost, possibly forever.

Making the most of today’s technology

The solution could be a relatively simple case of refocussing to take full advantage of the technology available today that’s not being properly utilised. The data-entry tasks that take the majority of time and require the minimum technical expertise should not be carried out by the most technical individual, with the least amount of time to give. The skilled engineers should be given the right amount of time to concentrate on the engineering tasks that come with these enterprise level systems. Automating the mundane and time- consuming work is the key to utilising the time available in the way that offers the best service.

With automation on the rise in the security industry we will start to see this dynamic change, but until adopted industry-wide it may be worth checking that that “new AI feature” is given the time and care it deserves – and needs – to deliver the promised benefits immediately. What’s the use in implementing a brand new solution if it’s only going to leave you lacking the main features it was chosen for?

Patrick Biggin

Design Automator

See also:

All articles in our Integrated Security category.

 

 

The post Security technology: the importance of proper implementation appeared first on City Security Magazine.

]]>
Investing in quality: how can you prove the gold standard? https://citysecuritymagazine.com/security-technology/investing-in-quality-how-can-you-prove-the-gold-standard/ Mon, 19 Nov 2018 07:21:53 +0000 https://citysecuritymagazine.com/?p=6540 Poor quality security products and software can result in high replacement costs, lost productivity…

The post Investing in quality: how can you prove the gold standard? appeared first on City Security Magazine.

]]>
Poor quality security products and software can result in high replacement costs, lost productivity and income, damage or loss of plant and property, injury to people, or – in extreme cases – even loss of life. Proving quality can be tricky. It’s something you need to assess during the due diligence process.

Some essential questions you can ask of potential vendors to help determine whether what you’re buying meets the quality ‘gold standard’ include:

  • Do you have a dedicated QA team?
  • Are there multiple quality checkpoints throughout the development and production process – not just at the beginning and end?
  • Do you follow best practice and test your software using automated testing, where each build of the software is fully exercised?
  • How reliable are you in delivering a new version/product on the date specified?
  • What is the process for resolving technical queries?
  • How are issues recorded and addressed and is feedback shared where appropriate?
  • How confident are you in your hardware? (A one year warranty period can indicate lack of confidence; five years to a lifetime warrantycan indicate full confidence.)
  • Do you use penetration testing to externally verify the security of the product?
  • How accessible and responsive is the manufacturer?

Back up your questions with research

How does the vendor demonstrate their focus on quality? Can you ask to visit their factory or a client site to see the product in action?

You can discover a whole lot about a company by asking for references from existing and previous clients. Find out how long they’ve been with the company, whether they’re having a great experience and how any problems are responded to and resolved.

Quality Processes

Quality process standards like ISO 9001 are another good starting point; they will ensure that the company has some processes in place that should deliver reliable results. But to achieve a ‘gold quality standard’ security system takes more than that. The manufacturer needs to understand the needs of the security market and listen to the real-life problems and risks that users are trying to resolve and mitigate. Manufacturers need to be dynamically updating their offering to meet the changing environment. If they don’t, then the system you purchased two years ago with the expectation that it would last for seven to ten years may struggle to meet the current expectations.

Options to move forward

Is there an incremental path for you to migrate to the emerging security technologies – both hardware and software? This particularly applies to cybersecurity updates after the original purchase is made. It’s key to ask whether ongoing support and updates are provided after you purchase. It’s especially important to ensure that it’s possible to upgrade firmware, not just software applications, within the solution you choose.

There’s no replacement for your own high standards. Quality means different things to different people and you need to decide what’s important to you and your appetite for risk. Ultimately, you’ll never regret buying quality.

Steve Bell

Chief Technology Officer at Gallagher Security

www.security.gallagher.com

The post Investing in quality: how can you prove the gold standard? appeared first on City Security Magazine.

]]>
Security in schools https://citysecuritymagazine.com/security-technology/security-in-schools/ Mon, 12 Nov 2018 09:00:21 +0000 https://citysecuritymagazine.com/?p=6290 Security in Schools In an age of increased threats on school premises that not…

The post Security in schools appeared first on City Security Magazine.

]]>
Security in Schools

In an age of increased threats on school premises that not only affect the safety of pupils and staff, but also that of property and reputation, access control in schools is more essential than ever.

Threats to Security in Schools

In today’s world, schools can face a number of threats both inside and outside school hours, including arson, bomb threats, vandalism, intruders, attacks on children or staff, missing children and theft.

The average school has a transient population with many high value goods such as computers and IT equipment plus personal possessions of staff and students, as well as personal and financial data, all of which can be extremely attractive to thieves. If in the wrong hands, the loss of such equipment or data can be detrimental and can severely damage the reputation of a school.

Selecting Measures for Security in Schools

Taking into account these risks, it is important to choose security measures that will not only protect staff, students and assets, but that will integrate seamlessly with the design of a building.

Access control systems, as well as physical measures such as escape doors and cylinder locks, can help manage known or anticipated threats by controlling, monitoring and restricting the movement of people, assets and even vehicles in, out of and around a building or site. In a school environment, access control systems can be used to restrict access to certain areas of a school, such as an office containing important equipment, an IT room or a storage room containing hazardous scientific equipment.

Outside school hours, they can restrict access to the entire building to authorised personnel only. At the perimeter of a school, access control points can be utilised at gates or fences, being accessible during school hours but restricted to authorised personnel when the school is closed.

Electronic access control systems have become increasingly commonplace in schools in order to enhance safety and security. Generally, systems consist of three component parts: the physical barrier, doors, and turnstiles and speedgates.

Access control systems can be especially beneficial when integrated with other security systems within a school, such as CCTV, intruder alarms and fire detection systems. Through the use of Internet Protocol (IP) technology, these systems can effectively ‘talk’ to each other in order to maximise their effectiveness.

CCTV, for example, can be integrated with access control in order to provide pre- and post-event recordings. If someone tries to forcefully enter an access controlled area or leave through an emergency exit, the CCTV system can be alerted to start rolling and provide footage of who is trying to enter or exit through the access point. As previously mentioned, these areas can also be integrated with intruder alarm systems in order to raise an alarm if someone is trying to force a door open.

It is important for schools to undertake regular risk assessments of the building in order to determine the level of security required and the most appropriate access control system that will meet your needs. When choosing a supplier of an access control system, there are various criteria that the company should meet in order to ensure you are choosing a good quality company, such as: are they are a member of a trusted trade association like the BSIA; has the company been inspected to the quality standard ISO 9001 accredited by a UKAS certification body; are they legally sound and professional; and do they meet with relevant British and European standards for their products?

Guide to help Security in Schools

When choosing an access control system it is important to take into account the Equality Act 2010, which applies in England, Wales and Scotland, and the Disability Discrimination Act, which applies in Northern Ireland. In a school, it is essential that employees, pupils and visitors all have adequate and user- friendly access to the building.

In light of this, the BSIA has created a guide for ‘Access Control Systems and Disability Discrimination’. The guide is intended to assist purchasers, specifiers and designers of access control systems to take account of the needs of disabled people and the related legislation and Acts of Parliament.

School officials have a duty of care to both their staff and pupils, and a legal responsibility to provide a safe environment in which children can learn, so taking time to consider the correct access control system will go a long way in providing the right security measures to suit every requirement.

For more information on the work of the BSIA’s Access and Asset Protection Section and guidance on standards, and other useful documents discussed in this feature, visit www.bsia.co.uk/sections/access-asset-protection.

To find an access control provider in your area, visit www.bsia.co.uk/find-a-security-company

 

The post Security in schools appeared first on City Security Magazine.

]]>
Integrated surveillance is the foundation for safer cities https://citysecuritymagazine.com/security-technology/integrated-security-surveillance/ Mon, 15 Oct 2018 05:00:06 +0000 https://citysecuritymagazine.com/?p=4159 Integrated surveillance – The foundation for safer cities Critical infrastructure facilitates society’s everyday life…

The post Integrated surveillance is the foundation for safer cities appeared first on City Security Magazine.

]]>
Integrated surveillance – The foundation for safer cities
Critical infrastructure facilitates society’s everyday life

Infrastructure such as power networks, water treatment plants, transportation links and hubs provides the backbone for our towns and cities to function. Protecting that backbone from potential threats is vital and, given rapidly rising global urbanisation rates, is an international priority. Global estimates suggest that 3.4 billion people now live in town and city environments.

In today’s fast-paced environment, there are so many elements of our daily lives which we simply take for granted. From the moment we wake up, until the time we fall asleep, we go through the day continually undertaking key actions without any real conscious thought process.

We flick a switch and expect lights to come on. We turn on a tap and expect water to flow. We leave the house and expect there to be a communications network to get us to where we need to go. We visit a cash machine and expect to withdraw money. We fall ill and expect to have access to local hospitals and medical facilities. And the list goes on – daily routine functions which are central to all our lives. But what if our expectations were not met? What if there was no electricity, water, transportation hubs, banks and hospitals?

Threats to Critical Infrastructure

In terms of the types of threats our urban centres face, these can generally be divided into three main categories:

  • Natural threats – for example weather events, in hot and cold climates alike, and geological hazards such as earthquakes, tsunamis, land shifting and volcanic eruptions.
  • Human caused threats – including cyber attacks, rioting, product tampering, explosions and bombing.
  • Accidental or technical threats – including transportation accidents and failures and environmental incidents.

Making sure the right systems and safeguards are in place to identify potential threats before they even happen, and supporting rapid response to actual incidents in order to limit escalation, is essential to keeping infrastructure secure and people safe.

What is also important, however, is enabling this in an environment of collaboration. The most effective threat prevention strategy is for those responsible for individual assets and services to work together.

The result of this is a checklist of requirements that intelligently integrated surveillance is ideally positioned to meet.

Technology that collates data and unifies action

Historically, systems used to protect critical infrastructure assets have been implemented and managed separately.

In recent times, in response to rising threats to critical infrastructure, this approach is changing. Responsible agencies and asset managers can now adopt an integrated approach to critical asset protection by using a surveillance ‘command and control’ platform to bring these vital, yet disparate, solutions together and manage them within a single, unified environment.

Site systems which can be integrated include:

  • Access control
  • Intruder detection
  • Communications
  • Virtual perimeter tripwires
  • Cameras – fixed PTZ, analogue or IP, thermal and multi-spectral (colour, mono, thermal, explosion proof)
  • Emergency incident alarms
  • Public help points
  • Building management systems
  • Microwave sensors
  • Fire, smoke, temperature and hazardous fume alarms.

Intelligent integration takes this concept to another level by using ‘command and control’ software to not only collate the data, but comprehensively analyse it as well. Visual and audio data, alarms and any number of unrelated platforms and sub-systems, from multiple geographical locations, can be brought together into a single monitoring and control environment that is programmed to recognise anomalies by analysing and cross referencing data patterns.

This delivers unprecedented levels of situational awareness and provides an effective and vital mechanism for distinguishing real threats from collective ‘noise’.

In order to achieve this desired level of awareness, however, there are key considerations that those agencies tasked with protecting our cities – and critical assets that serve them – should keep uppermost in their mind.

The importance of open architecture

It is paramount that any command and control software used is ‘open architecture’. Not only will this maximise the potential for integrating systems from multiple third-party vendors, but it also means any existing legacy technology can still be utilised. The capacity to blend old and new is, for most cities, vital to the adoption of new surveillance technologies.

Open architecture is particularly important when it comes to camera technology, as many city centre and older industrial sector surveillance systems are currently analogue heavy. An open architecture solution facilitates a hybrid approach so legacy analogue cameras can be viewed and managed alongside newly-implemented HD IP cameras. This also reduces costs as local authorities do not need to rip out and replace existing technology when updating surveillance systems.

Bespoke solutions

Any organisation or agency of city security should have a clear understanding of their specific needs. Intelligently integrated solutions are best suited when tailored to meet exact site requirements and detect specific events.

A specific scenario of events occurring on the site of a data centre will mean something very different to the same events happening at a transport hub or utilities plant. Gas monitoring, humidity detection, movement analysis, thermal detection, delivery patterns, smoke pattern/colour analysis, virtual perimeters, loitering/anomalous object detection, fire detection, staff access control patterns – these will be vital for some assets but won’t even appear on the priority list for others.

A ‘one-size-fits-all’ solution will not be able to accommodate the level of detail that critical infrastructure protection demands.

Right camera for the job

On the subject of bespoke systems, it is also extremely important that the right cameras are selected for the right task – based on a risk and hazard analysis, and taking into account issues such as ease of integration, maintenance, accuracy and affordability.

Different scenarios – even within a specific project – require different solutions. For example, a power station may need high-definition image capture to monitor machinery – delivering minute detail such as degradation of small parts. On the other hand, standard definition is sufficient in more general areas, for example public footpaths, and low-light and thermal or infra-red cameras on the perimeter, when possible night-time incursions need to be seen in as much detail as daylight ones.

Options are also available for multi-spectral cameras which switch between colour, mono and thermal imaging according to the environment.

Collaborate to innovate

The true benefit of intelligent integration is that it is an enabler of cross-agency collaboration which, when keeping an entire city safe, is hugely advantageous. For example, integrating remote evidence management solutions facilitates secure 24-hour access by key third party organisations such as the Police and HMRC, in line with data protection principles. Selected organisations can request to ‘view’ and ‘seize’ footage without having to attend the CCTV control room – this reduces man hours and, consequently, costs. Intelligently integrated solutions also facilitate cross-city communication and incident response.

Working together to protect a city

A fire alarm is triggered at the refinery. In the on-site command and control centre, this automatically streams visual feeds from the nearest cameras and readings from chemical detection sensors.

The operator can see the location of the fire and receives confirmation that hazardous smoke has been detected. A workflow prompts the operator to instigate evacuation procedures, call the fire department, lock down key site zones and check wind direction with the city weather station.

On confirming that wind speed and smoke density pose a threat, the operator is then prompted to call the city police to issue ‘stay-indoors warnings’ and air traffic control. Receiving the information, air traffic control know they have two hours before smoke from the fire is likely to start impacting on flights and are able to instigate emergency planning protocols.

Revolutionising city safety and security

All those responsible for critical infrastructure – particularly those from countries experiencing infrastructure-led growth – have an important opportunity to take advantage of technology to safeguard their vital assets and make the towns and cities which they serve safer places to be.

Customisation is key, and that can only come when software suppliers, integrators and end-users all collaborate. ‘Command and control’ solutions can be configured to deliver integrations and workflows which meet exacting requirements – but tailoring to that level requires users to clearly understand their needs.

However, technology is only part of the equation. Understanding customer needs, and developing partnerships with industry leaders, will enable the intelligent integrations that can truly revolutionise the way city safety and security professionals do their jobs.

A safe city is an informed city, and with the right approach to and use of surveillance command and control technology, this is achievable.

Product and Technology Director, Synectics

www.synecticsglobal.com

The post Integrated surveillance is the foundation for safer cities appeared first on City Security Magazine.

]]>
The evolving role of security and technology https://citysecuritymagazine.com/security-technology/integrated-security-security-technology/ Tue, 07 Aug 2018 06:33:30 +0000 https://citysecuritymagazine.com/?p=5306 The evolving role of security Craig Robb, Chief Commercial Officer, Securitas UK, discusses the…

The post The evolving role of security and technology appeared first on City Security Magazine.

]]>
The evolving role of security

Craig Robb, Chief Commercial Officer, Securitas UK, discusses the pace and breadth of change in technology and digital innovation in the security sector.

The impact of technology on the security industry cannot be overstated. Over the past ten years we have moved from traditional guarding models toward value driven, predictive total security solutions. And the pace of change, and its effect, is only now starting to be realised by our clients.

Meeting the requirements for security

The basic needs of our industry remain largely unchanged: we are still required to protect people, property and our client’s profit. Irrespective of sector, technology is delivering cost efficient, enhanced security solutions, without compromising either the safety or security of the client.

People have always been an integral element of any physical security company and still remain pivotal in most protective services solutions. The onset of technology is, however, redefining the role of the security officer, shifting the people aspect from commodity to a key conduit and enabler in the execution of enhanced risk mitigation strategies.

Gone are the days where security officers can only ‘review the video tapes’ after an incident has occurred. Intelligent, automated systems can now alert human operators by motion sensor when a potential incident is developing. Far from replacing the need for eyes and ears, these new technologies are changing the very nature of traditional officer responsibilities. This change is hugely positive in our industry and has resulted in an emerging trend of better trained and better paid officers.

Looking ahead

As we look toward the future, we can expect even more transformation and development.

Flying drones will become the norm in support of regular patrolling and rapid response. Virtual assistants will work alongside receptionists, and officers, having completed their training in a virtual reality replica of the environment in which they will be deployed, will interact with augmented reality on client sites, whilst undertaking their operational duties.

Sensors will be a key feature of any solution, broadening the status quo to feature non-visual capabilities, and delivering multi-dimensional data that will enable faster and more accurate assessment of situations. Ultimately, this will result in real time escalation and the activation or deployment of an appropriate response.

Lighting will become a key enabler in the enhancement of protective services capability, with cost efficient systems able to detect individuals anywhere in a building as well as escorting them out in the case of fire.

Open source intelligence when combined with incident, sector and customer data will continue to facilitate tailored resource to risk- based operational deployments, but the greatest catalyst for change is yet to come and will inevitably evolve from the combination of open source intelligence and the emergence of the Internet of Things (IoT).

Interoperability of multiple systems

Managing data from on-site officers, mobile vehicles, smoke and gas sensors to video surveillance, access control, lights, loudspeakers, air conditioning, elevators to coffee machines, light switches and automatic doors – when combined with big data, officers and the security companies they work for – will have absolute situational awareness, delivered in real time.

For those security organisations able to stay ahead and invest into machine and deep learning architectures, the future is particularly bright. By harnessing and utilising the huge data sets which they generate on a daily basis, real time dynamic predictive protective security solutions will soon become a reality.

This ‘new reality’ will result in levels of risk mitigation that have been previously inconceivable, the impact of which will re-define our industry entirely, and indeed how we service our clients.

The digital revolution is set to continue at pace; the ongoing paradigm shift and the security companies affected by it, will be defined by their ability to combine people, technology and knowledge.

Craig Robb

Chief Commercial Officer, Securitas UK

www.securitas.uk.com

The post The evolving role of security and technology appeared first on City Security Magazine.

]]>
Predictive policing vs proactive solutions https://citysecuritymagazine.com/security-technology/integrated-security-predictive-policing/ Mon, 06 Aug 2018 08:56:16 +0000 https://citysecuritymagazine.com/?p=5161 Predictive versus Proactive – How collaboration is the key to safer cities ‘Predictive policing’…

The post Predictive policing vs proactive solutions appeared first on City Security Magazine.

]]>
Predictive versus Proactive – How collaboration is the key to safer cities
‘Predictive policing’ is the new catchphrase

Central to this notion is that police departments or other crime fighting units can detect and stop crime in a city before it happens. It suggests that a single solution can tell crime analysts and officers where and when a specific crime will take place, and sometimes who will commit it, based on data-crunching algorithms.

But is it realistic? In short, no. While there have been many advancements in security technology, this level of predictive policing is still far from actualisation. Technology isn’t a magic bullet that can stop crime before it happens; and it certainly cannot replace the knowledge, instinct and experience of frontline personnel.

That said, some intelligent solutions can enhance these strengths by delivering actionable data and enhancing inter-agency collaboration. This technology gives city agencies a better understanding of their environment, allowing them to shave valuable seconds off response times and determine when, where and how to best deploy their resources. That means, whether it’s securing a big city event or handling an unexpected situation, response teams are empowered throughout the entire mission.

How collaboration helps cities work smarter

The reality is that cities are still dealing with a fundamental challenge – siloed infrastructure and systems. Most frontline workers such as police officers, firefighters, call centre operators, and emergency response personnel are using older, disparate technologies. These city agencies lack the ability to effectively share information with each other. Every day, operators are also struggling to make sense of all the data that they receive from various sensors and solutions.

Forward-thinking cities understand that bringing multiple data sources together into a single pane of glass is the key to enhancing collaboration, improving response time to incidents, and ultimately, keeping cities safer. It’s why more cities are looking at technologies that unify information into a shared view. More than that, they want solutions that empower public safety departments to build a deeper, data-driven understanding of what’s happening every day.

These unified, decision-support systems keep all agencies on the same page. So, whether it’s securing a major stadium event or responding to a possible coordinated attack, everyone from call centre operators to paramedics and police officers relies on a shared view to access timely information. Together, they are then able to make better decisions and coordinate faster response.

It is important to clarify – these decision-support systems will not predict where crime could happen next week. However, these systems can analyse historical data and give city agencies insights that they can act on.

This might include understanding that when a wall is tagged with graffiti in a certain area, the chances of a shooting goes up. Or, perhaps learning that car theft increases a few days prior to an annual public event in the surrounding area.

With this knowledge, public safety teams can allocate resources to minimise these threats. Following critical events, chiefs, commanders or managers can also review responses to either improve strategies or better train personnel. Ultimately, the focus for city agencies shifts from predictive analysis to tactical thinking.

A real-life case study – How Chicago Police Department reduced response time by 39%

In the United States, the Chicago Police Department sought to enhance operations in six police districts. The goal was to reduce response time for reported shootings and crime in these areas. At the time, operators were working with many disparate systems including a computer-assisted dispatch (CAD), 911 calls from residents, gunshot detection sensors, and other solutions. The department needed a platform that could combine these technologies to help them make faster, more informed and effective decisions.

One security solutions provider took on the challenge and created a decision-support system that correlates and consolidates data from many sensors and provides a dynamic, unified view to all dispatchers and responders, so they can make insight-driven decisions during any situation.

According to Jonathan Lewin, Chief of Technical Services for the Chicago Police Department, City of Chicago, “Response times, from dispatch to ‘on-scene’ arrival time, have been reduced by 39% and 24% respectively, in our two most at-risk districts. Shootings are down 22% in these districts compared to 2016, and the technology and process will be expanding to more districts. The system is now deployed in our Strategic Decision Support Centres, located in each corresponding police district facilities, and has helped us send a strong message to the community that crime and gun violence get a swift response.”

With a unified view and actionable alerts, city agencies can work together to effectively secure an event or protect any day. And, while these initiatives have been launched in the United States, the United Kingdom and mainland Europe are showing increased interest in and adoption of more collaborative technologies. This is mainly because these solutions offer the greatest potential to secure cities where higher population densities often mean heightened threat levels.

Preparing for the future of policing

Right now, predictive policing is a popular buzz word. What cities actually require are solutions that can effectively inform agencies, with actionable data. These teams need correlated data that can help them make fast and effective decisions when seconds count. They also need intelligence that can help them assess and determine the effectiveness of their procedures or campaigns. Pro-active response and planning will ultimately help cities stay one step ahead of threats and emergencies.

Giovanni Gaccione

Justice & Public Safety Practice Leader. Genetec

www.genetec.com

 

The post Predictive policing vs proactive solutions appeared first on City Security Magazine.

]]>
Electronic security technology: myth busting https://citysecuritymagazine.com/security-technology/electronic-security-technology/ Mon, 06 Aug 2018 03:14:54 +0000 https://citysecuritymagazine.com/?p=3695 The post Electronic security technology: myth busting appeared first on City Security Magazine.

]]>

Electronic security: myth busting

Security technology is advancing at a rate – some believe capabilities are quadrupling at each step change. In this fast-track environment, how can you identify the truth from the wide-ranging opinions and ideas that proliferate?

In this article, Jim Crouch provides his view and busts some of the myths surrounding security technology.

Myth 1: Electronic security replaces the need for security staff

This is definitely not the case – you will always need people to provide a presence, operate security systems and respond to incidents. Rather than replace people, with the correct system and training the latest security technology should enable the officers to provide a wider range of effective security and other services.

The most effective implementation of a successful security system requires collaboration between manned security personnel, the electronic security provider and the customer. If it is operationally scoped, specified and implemented correctly, it should provide major benefits all round. People will always play a central role in the way security is delivered.

Myth 2: Security analytics are just a gimmick

Recent advances around mega pixel CCTV cameras which provide highly detailed images, massive increases in processing power and major innovation in software mean that security analytics is now extremely effective and value for money.

There may still be a residual view that security analytics is of no use but this is mainly a result of high expectations not being not met some ten years ago when this capability was first implemented.

Today, the systems are far superior. For example, facial recognition software can now be up to 96-98% accurate and there is software that can search in a matter of seconds for an individual across multiple camera recordings. Of course, the use of analytics is not restricted to security – there are well-established retail marketing applications, industrial and health and safety applications and a myriad of possible uses linked to security, from ANPR, alarm zones, digital in-image tracking and route/path tracking.

This is an area where I feel quantum leaps will be made over the next 10 years in both the security and consumer sectors. I am really looking to see what the future will bring.

Myth 3: Security staff can’t use leading-edge security technology

Many of those in security system operator roles have huge potential to develop and flourish. Providing the electronic security provider works in close collaboration with the system operators in the control centre, the operators will be able to make the most of the systems installed. I find there are always security guards and other security staff with the enthusiasm and capability to develop their technology skills.

It is a great privilege to be able to harness the energy and aspirations of those security staff who want to develop their expertise and provide an enhanced service. This helps to explode a related myth that security is a dead-end job – there can be many exciting and rewarding roles related to security – not least, developing a career as an advanced systems operator with a high level of technology expertise.

Myth 4: Security systems should be implemented on the existing corporate IT network

In fact the exact opposite can be true. Many people believe it is most cost-effective to maintain one corporate IT network – but a separate network for security can be far more beneficial overall. The cost can be up to 30-40% less and with the introduction of a completely separate security infrastructure, which just happens to be a network, you have no restrictions on bandwidth, storage or any other restriction imposed by corporate IT. Plus, with the ever increasing camera appetite for bandwidth, corporate IT departments are only going to get more nervous. I do, however, understand that governance controls within some corporate global IT departments can require the security systems to site on their network, which means there will always be a mixture.

Myth 5: IP Security is not proven

I have found that for the past 2 to 3 years every new project has specified IP technology – so it must be true to say that IP is a proven technology. It provides the best performance, it is flexible, with in-built redundancy, easy to upgrade and scalable. But make sure you have your network installed by a qualified, fully trained provider with system and network capability or you may have problems which are not IP technology related.

Myth 6: Security cameras are invading private life!

There’s no getting away from the fact that security cameras are now integral to our lives but I believe the benefits outweigh any concerns and I don’t believe that security systems for protecting business make any infringement on our privacy.

The increase in technology benefits society in general. For many of us the priority is to protect people and property, and security systems are an essential vehicle to deliver that. I’m impressed and surprised by the range of applications now available. Technology, security images or other devices, are part of our world now and I don’t believe we want to or can turn back.

Myth 7: My Electronic Security Supplier keeps me fully updated with new technology

Sadly, this is not always the case since it may not be in your supplier’s best interests to keep you appraised of the latest technology. The best way to keep updated is to choose a supplier or organisation that makes this part of their service. You may not be an expert so it’s a good idea to have an independent, honest advisor with experience of a range of equipment. And don’t just rely on your system supplier for information: get a second opinion, talk to different consultants, advisors and the manufacturers themselves. You need to be able to have open and frank discussions to obtain a clear understanding. It’s all too easy to be trapped indefinitely with a single supplier/manufacturer with a closed system that no one else is allowed to support. For me, a supplier or a source with access to and experience with many manufacturers and an independent view is key.

James Crouch

Universal Security Systems Limited

www.universal-security.com

The post Electronic security technology: myth busting appeared first on City Security Magazine.

]]>