G4S Security Services (UK) - Experts & Thought Leaders
Latest G4S Security Services (UK) news & announcements
G4S, the global pioneer in security solutions, proudly announces an exclusive partnership with Australian safety technology company Duress.com. This collaboration aims to enhance the protection of frontline staff across multiple sectors, utilising Duress's cutting-edge wearable devices. This partnership is set to elevate safety standards and provide unparalleled support to workers facing increasing threats of violence and anti-social behaviour by connecting frontline staff and security officers. Transformative technology Duress has developed an advanced suite of body-worn devices designed to provide real-time support Duress has developed an advanced suite of body-worn devices designed to provide real-time support and protection for frontline workers. The technology includes live-streaming video, AI capabilities, emergency service integration and full communication functions, ensuring that help is always just a click away. The three flagship products in this range - Phoenix, Falcon, and Eagle - offer versatile and robust solutions tailored to meet diverse operational needs. Phoenix: Compact and Powerful At the size and weight of a credit card, Phoenix is the most advanced safety device ever designed. Users simply click to discreetly alert security teams, or stream video through to the 24/7 Operations centre where a response can be coordinated. Phoenix also includes slip, trip, and fall detection, mass messaging, and boasts a two-year rechargeable battery. Falcon: Versatility and immediate response Similar in size to a smartwatch, the Falcon can be worn as a watch or pendant, and when activated live-streams video, audio, and location data to the security team, enabling rapid and informed responses. Additional features include a push-to-talk function and AI-driven policy lookup, enhancing both communication and procedural compliance during incidents. Eagle: Full-featured and robust Its long battery life, easy-to-use clip options, and integration with other Duress devices ensure seamless operation The Eagle device stands out with its fully-featured design, delivering live video and audio feeds to all connected security personnel during emergencies. Its long battery life, easy-to-use clip options, and integration with other Duress devices ensure seamless operation. The Eagle also supports comprehensive incident reporting and data analysis, aiding in both immediate response and long-term safety planning A commitment to safety G4S's collaboration with Duress underscores a shared commitment to safeguarding frontline workers, doubling down on the G4S vision of connected security programmes. The partnership leverages Duress’s expertise in wearable technology and G4S’s extensive security infrastructure, ushering in a new era of enhanced protection and support for employees in retail, healthcare, events, and beyond. David Munnery of G4S, comments "While many of our security officers are already connected via body-worn devices to the broader team and remote monitoring centres, this new partnership with Duress will equip G4S security teams with real-time incident visuals and sound, as well as many other features, which will further advance the effectiveness of our security officers."
G4S Academy Director Noah Price spoke at the World Institute of Nuclear Security (WINS) in Vienna on AI. This is an abridged version of his presentation. Contrary to the popular narrative, Artificial Intelligence (AI) has been around for a long time in the security industry; it’s been embedded into cameras since the 1980s. The first kind of video analytics was just a line on the screen and anything that crossed it would create an alert. Deep learning, AI, and analytics In the 2000s, users started to see object recognition, facial recognition, and behaviour recognition. In 2010, they started to see facial recognition bolstered by deep learning, the connection of smart devices like cameras, locks, and sensors into integrated security systems. And in the 2020s, the current innovations focus on automation, end-to-end integration, and making better use of data captured by AI and analytics. AI-enabled cameras There’s almost no limit to the amount of information that AI can deliver from a captured scene From that early analytical tripwire in the 1980s, AI-enabled cameras can do so much more. There’s almost no limit to the amount of information that AI can deliver from a captured scene: if a vehicle is at a standstill or moving too fast if someone has gone into a prohibited area or if people are grouped, it can even identify objects like guns and axes, detect body language and tell if someone is shouting. Object detection One of AI’s greatest strengths is its ability to detect the presence of the abnormal or the absence of the normal but it is advancing all the time and its use is growing: according to the World Security Report, over the next five years, 42% of Chief Security Officers (CSOs) surveyed intend to invest in AI and AI-powered surveillance within their physical security operations. This investment is aimed at enabling physical security operations to react swiftly and accurately based on available data. AI, along with biometrics and facial recognition technology, is seen as top priorities for future investment. Leveraging data CSOs expect security providers to leverage data to generate insights that prevent security incidents. Noah Price wants to expand on how it can be used to great effect already in physical security and suggest what it might be able to do in the future. Scalability AI scales well, whether it's running on an on-premise server network or in the cloud AI enhances the ability to detect threats through the continual, vigilant monitoring of security footage or data. It can do this at a much greater speed and scale than humans ever can simply because it doesn’t need to sleep and won’t lose concentration. This allows for much larger volumes of information to be analysed with high accuracy. AI scales well, whether it's running on an on-premise server network or in the cloud. Adding more cameras or other data sources does not necessarily require drastically more resources to compute like it would hire more humans to monitor. Autonomous drones Automated systems like cameras and sensor-equipped drones can expand coverage and access to remote physical areas, complementing ground-based sensors and security. Regulatory aspects around visual line of sight and autonomous drones are still evolving in certain countries, but AI-powered drone flight promises to be an exciting option for covering large areas. Predictive analysis The application of predictive analytics powered by AI is rapidly becoming an integral part of modern physical security solutions. Sophisticated machine learning algorithms can process volumes of data gathered by networks of cameras, access control systems, perimeter sensors, and more. The goal is to identify patterns, anomalies, and correlations that enable AI systems to forecast problems or threats before they occur. Anomaly detection The system learns to automatically recognise authorised flows versus suspicious incidents worth escalating For instance, AI can continuously analyse video feeds to detect subtle anomalies in visitor or employee traffic flows compared to historical trends at a particular site. Unusual activity like accessing restricted areas or tailgating could trigger alerts, prompting a focused investigation. Over time, the system learns to automatically recognise authorised flows versus suspicious incidents worth escalating. Detection modes and advantages Other detection modes might analyse facility entry logs for spoofing attempts, assess raw guard tour data to recommend optimised patrol routes, or even scan social media to anticipate planned protests at sensitive locations. AI has clear predictive advantages over legacy rules-based approaches. Machine learning allows today's platforms to model complex networks of conditions, adapting dynamically rather than relying on simplistic thresholds. Proactive forewarning As a result, pioneering solutions provide proactive forewarning of 10 to 60 minutes or more for threats ranging from unauthorised access to site protests, theft of goods, cyber intrusions, and beyond. Continued improvements around detection accuracy, false alarm filtering, and actionable incident workflow handling will be ongoing AI research focal points. Application sectors AI predictive analytics is already bearing fruit across industries, from supply chains to healthcare However, the enormous potential to anticipate problems before they manifest using AI predictive analytics is already bearing fruit across industries, from supply chains to healthcare. Physical security operations are following suit in leveraging these cutting-edge capabilities as well. Proactive forewarning can be given of 10 to 60 minutes for threats ranging from unauthorised access, site protests, theft of goods, and cyber intrusions. Accuracy and detection While AI security applications show great promise, current real-world limitations exist. Object detection for weapons and other restricted items is an area of rapid innovation, but accuracy beyond 90-95% remains challenging due to variables like camera angles, visual obstructions, and item concealment tactics. Nevertheless, AI has already proven its ability to augment human detection capabilities when responsibly applied. Contextual reasoning Looking ahead, contextual reasoning stands as a frontier for AI algorithms to further improve accuracy while reducing false positive alerts. With continued development, AI could understand permissible object possession based on location, time variables, authorised credentials, and recognised intent. For example, differentiating a kitchen worker legitimately carrying knives versus a trespasser wielding a similar item as a probable threat. Binary assessment Human intelligence and optimised ML deliver the most accurate and reliable threat detection outcomes Additionally, because AI retains consistent focus and operates by binary assessment of triggered observations rather than unpredictable human judgment, it serves to counterbalance the risk of decreased vigilance in humans over time due to complacency, overload, and confirmation bias after excessive repetitive alerts. The combination of human intelligence and optimised machine learning delivers the most accurate and reliable threat detection outcomes for the foreseeable future. Hybrid model With sustained technological progress, AI's performance will incrementally approach more dependable autonomous analytical capability understanding proper contextual permission in parallel with human security personnel. However, maximising this hybrid model focused on the unique strengths of both man and machine remains the wisest path forward. Handling of mundane tasks AI is already demonstrating usefulness in taking over routine security monitoring functions. Video surveillance oversight, access control supervision, and standardised patrol duties are early examples where algorithms can perform continual rather than sporadic vigilance without distraction. This frees personnel to focus their cognitive strengths on investigative judgment, suspect engagement, and strategic oversight requiring human perceptions. Multi-modal sensory technology AI-enabled robots and drones equipped with multi-modal sensory technology offer new paradigms Looking forward, AI-enabled robots and drones equipped with multi-modal sensory technology offer new paradigms for supplementing boots-on-the-ground while collecting invaluable data. Whether rolling through warehouse aisles or soaring over remote sections of a pipeline, these machines handle monotonous inspection in environments dangerous or labour-intensive for security officers. Real-time location-indexed analytics Meanwhile, real-time location-indexed analytics get ingested for everything from inventory analytics to leakage detection to enhancing theft response.The fusion of learned patterns with human flexibility allows for optimised resource allocation. Facility assistant bots People monitor the mission-critical encounters enabled by machines handling mundane but taxing tasks. This force multiplication equation yields expandable capacity improvements as AI offloads grueling demands. Savvy deployment of assisted patrols and smart facility assistant bots will shed light on corners otherwise left unseen. AI as a threat While AI unlocks countless benefits across physical security, users must remain vigilant against potential misuse While AI unlocks countless benefits across physical security, users must remain vigilant against potential misuse. As algorithms grow more capable of synthesising credentials, mimicking voices, and spoofing legitimate behaviours, the attack surface widens. AI could power new forms of infiltration if co-opted by threat actors. Theft due to AI Users have already witnessed criminals fine-tuning AI to enhance social engineering, phishing attempts, and identity theft in the digital realm. Physical protection must learn from these offensive advances, forged badges and faked biometric duplicates could be the next frontier if defences lag behind AI's creative potential. This reality demands a balanced posture embracing AI’s strengths while mitigating vulnerabilities it may introduce. Collaboration between people and technology Companies would be wise to run through potential compromise scenarios leveraging AI before rollout, to uncover blind spots and create staff awareness about emerging high-tech deception tactics. AI should never serve as a set-it-and-forget-it silver bullet but rather operate as an integrated component of defence-in-depth strategies. Thoughtful implementation combined with ongoing scrutiny of its security assumptions makes AI a powerful ally. Maintaining effective collaboration between people and technology in the face of rapidly evolving threats is essential for the coming age of AI-powered security.
Businesses must prepare for a double-digit increase in climate change hazards that impact physical security in the next year and could threaten supply chains, people, and finances, according to G4S’s World Security Report. Almost two-fifths (38%) of companies surveyed expect it to impact their company in the next 12 months, an increase of 11% in 2022. The warning comes as the COP28 climate conference continues in the UAE. Security-impacting hazard 1,775 Chief Security Officers (CSOs) in 30 countries at large global companies with total revenue of more than $20 trillion took part in the first-ever World Security Report. Climate change is the third most likely security-impacting hazard to affect companies in the next year after economic unrest (47%) and pandemics (40%). CSOs also anticipate that floods, wildfires, earthquakes, landslides, and tsunamis will all increase. Identifying potential threats Most companies tend to be reactive, addressing security threats only after they've struck" Noah Price, International G4S Academy Director said, “Climate change and natural disasters pose a significant threat to a company's physical security operations." "Most companies tend to be reactive, addressing security threats only after they've struck. It’s business critical that CSOs anticipate potential threats and prepare for them. No action or just reaction is not an option. Need for preemptive security measures “Being reactive often results in significantly higher financial and reputational losses compared to the costs of implementing robust, preemptive security measures." "Planning will ensure businesses are more resilient, safeguarding people and assets.” What do businesses need to do? One of the most pragmatic security plans G4S advises is climate-specific risk assessments of places of work Contingency planning, investing in technology, and diversifying supply chains from climate change disruptions are three examples of the actions businesses can take. One of the most pragmatic security plans G4S advises is climate-specific risk assessments of places of work, operational locations, and where employees reside. This should be regularly reviewed and updated. Risk evaluation “In light of the wildfires we witnessed around the world, it's imperative business leaders ask themselves: have we evaluated the risk of such events recurring?" "Have we proactively installed measures like sprinkler systems or perimeter defences to mitigate future threats? Beyond physical infrastructure, it's crucial to consider the human element, how do such events impact our employees, their families, and their ability to work?" Price emphasised. Infrastructure to withstand environmental risks If supply chains are strategically diversified, threats to one region are less likely to affect production Businesses should invest in infrastructure that can withstand extreme weather events. Buildings that are reinforced, have flood protection systems, and fire-resistant materials will lessen the impact. Companies are facing up to US$120 billion in costs from environmental risks in their supply chains within the next five years. If supply chains are strategically diversified, threats to one region are less likely to affect production, manufacturing, or commerce reducing the overall impact on business productivity. Addressing the fragility of supply chains Mike Maltezakis, G4S Academy Supply Chain Specialist, said, “Recent droughts in the Panama Canal, flash flooding and extreme wildfires have highlighted the fragility of supply chains. The need for them to be resilient and as diverse as possible is increasingly necessary." “If you’re an e-commerce business, a supply chain disruption like the Panama Canal drought has the potential to be not only costly but leaves you and your products vulnerable to theft." Varied supply chain options The biggest security threat with this is that they use violence against staff and crew members to take what they want" "You could have millions of pounds worth of product sat in cargo that an Organised Crime Group (OCG) looks to take advantage of. And with droughts in the canal more likely, so is the likelihood that OCG bases itself nearby because they see a recurring opportunity." "The biggest security threat with this is that they use violence against staff and crew members to take what they want. Having varied supply chain options means companies are less at risk of being over-reliant on certain suppliers.” Predictive and aerial technology Predictive and aerial technology will be key to assessing the risks, and damage and enable key strategic decision-making. Over the next five years, 42% and 39% of World Security Report respondents are planning to use AI machine learning, and IoT devices in their physical security operations, respectively. Almost a quarter (24%) will use drones and unmanned aerial systems (UAS). AI and machine learning Strategically placed devices can monitor factors like water levels, soil moisture, or air quality and send instant alerts AI and machine learning can be used for predictive analytics when looking at climate-related risks. For instance, AI can analyse vast amounts of data from past weather patterns, satellite imagery, and climate models to predict natural disasters with greater accuracy, enabling timely preventive measures. IoT, in real-time, can monitor environmental conditions. Strategically placed devices can monitor factors like water levels, soil moisture, or air quality and send instant alerts flagging abnormal readings, which can indicate impending floods, droughts, or other climate threats. Unmanned Aerial Systems Unmanned Aerial Systems, i.e. drones and satellites, can assess the impact of climate events on infrastructure. Drones can provide aerial views of affected areas, helping businesses assess damage quickly and plan their response effectively. Concluding, Price said, “Businesses have a vital role to play in reducing climate change, but also in keeping their operations running, people and assets safe, and protecting themselves from a wide range of climate threats. ”
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download