Fleet surveillance
Colt Technology Services, the digital infrastructure company, published its third Sustainability Report. The report tracks progress for Colt Group-comprising Colt Technology Services and Colt Data Centre Services-against targets set for the 12 months ending 31st December 2023 in the areas of Environmental, Social and Governance (ESG), and against longer-term targets to net zero. The past 12 months have seen Colt launch an ambitious new ESG strategy; secure the highest EcoVadis ra...
Morse Watchmans, the industry pioneer in key control and asset management systems, is set to showcase its advanced solutions tailored for higher education institutions at two significant industry events this June. The company will exhibit at the ACUHO-I Conference and Expo from June 22-25, 2024 at the Baird Center in Milwaukee, and at the IACLEA Annual Conference from June 27-30, 2024 in New Orleans. Key management systems "Ensuring the security of college and university campuses is more crit...
Yarden Gross, CEO and Co-founder of maritime technology start-up Orca AI champions the rapid – but responsible – deployment of smart, cost-effective digital tools to tackle climate challenges in the shipping industry. Leveraging machine learning and data insights, AI solutions are a vital front line in reducing fuel consumption and emissions. AI solutions "AI solutions are crucial for squeezing every last drop of efficiency out of the existing fleet amid increasing pressure to dec...
ASIS International, the organisation for security management professionals worldwide announced the appointment of William 'Bill' Tenney as its new Chief Executive Officer, effective 1 July 2024. Tenney brings close to 35 years of security leadership experience from both the public and private sectors to his new role heading the acclaimed global security association. William 'Bill' Tenney As ASIS International’s CEO, Tenney will spearhead the organisation's strategic vision, workin...
Entrust, a global pioneer in delivering identity-centric security solutions for governments and enterprises worldwide, announced the launch of its Citizen Identity Orchestration solution. Governments now can streamline the delivery of public services through secure digital identities, embedding trust in every citizen interaction. The innovative and modular solution from Entrust launches as governments worldwide experience increasing demands for seamless, transparent, and rapid service deli...
Morse Watchmans, the pioneer in key control and asset management systems, is excited to be showcasing its line of key control and asset management solutions at the 43rd AJA Expo and Conference in Ft. Lauderdale in 2024 at stand 111. Modern Key Control “Modern Key Control is central to properly securing today’s correctional facilities. Our proven key and asset management solutions are a perfect fit, giving security personnel peace of mind and a forensic audit trail of ke...
News
Airport Show is all set for a smooth take-off for its 23rd edition on May 14 at the Dubai World Trade Centre (DWTC) with key stakeholders utilising the annual exhibition dedicated to the Middle East, Africa, and South Asia (MEASA) to explore and embrace new technologies and innovative products to handle the fast rebounding air passengers and cargo traffic. Airport passenger expectations The participants will also have their focus and attention on products and services designed to transform passenger expectations at airports, ease of flying, and enhance safety and security. The trademark annual B2B platform will bring to the Middle East’s vibrant aviation market four co-located events - Air Traffic Control Forum, Airport Security Middle East, the Global Airport Leaders Forum (GALF), and the Women in Aviation (WIA) Middle East Chapter Conference. Three-day trade-only exhibition The exhibition will provide opportunities to explore, experience, and source several advanced airport technologies The three-day trade-only exhibition will provide opportunities to explore, experience, and source several advanced airport technologies, innovations, and solutions along with networking with business pioneers and market movers. Organised by RX, the London-based company that hosts over 400 events in 22 countries across 42 industry sectors, the much-look-forward-to business platform will see over 6,000 decision-makers and professionals making their way to the three massive exhibition halls at a time when airports across the world are packed to their capacities. International passenger traffic The ever-surging passenger movement has prompted the Airports Council International (ACI), the trade association whose members operate 1925 airports in 171 countries including the DXB, the world’s top airport for international passengers, to claim that 2024 will be “a milestone for global passenger traffic recovery as it reaches 9.4 billion passengers, surpassing the all-time high 9.2 billion passengers handled in 2019. International passenger traffic is forecasted to grow to 4.4 billion international passengers in 2026. Aircraft movements are forecast to grow to 111.6 million by 2026. Airports worldwide will see 153.8 million aircraft movements by 2041. Business Connect Programme More than 150 exhibitors from over 20 countries will participate in the exhibition which will feature four country pavilions and over 120 buyers from more than 35 countries. The trade gathering will host 3,500-plus meetings under its popular Business Connect Programme. Attendees in participation Siemens, Honeywell, TLD, Aviramp GSE, ITW GSE, ADB Safegate, and Airport Labs are among the exhibitors Global companies like Smiths Detection, emaratech, Siemens, Honeywell, TLD, Aviramp GSE, ITW GSE, ADB Safegate, and Airport Labs are among the exhibitors. Among the key airport project pioneers participating include Air India SATS Airport Services, Airports of Thailand, Angkasa Pura Airports of Indonesia, Armenia International Airports, Singapore’s BOC Aviation, CAAB of Botswana, Egyptian Airports Company (EAC), Erbil International Airport, Hong Kong International Airport, Mactan- Cebu International Airport Authority, New Delhi Airport, Ntech Aviation of South Africa, Pakistan Civil Aviation Authority, Uganda Civil Aviation Authority, and Yerevan Zvartnots International Airport of Armenia. In-event networking and knowledge enhancement Innovation Trail, GSE Zone, Innovation Hub, and Youth in Aviation will provide in-event networking and knowledge enhancement opportunities. The four co-located events will see 60-plus speakers speaking on diverse topics, including Sustainability at Airports, Passenger Experience, Ground Handling, Airport Security, and Air Traffic Management (ATM). Being held under the patronage of His Highness Sheikh Ahmed bin Saeed Al Maktoum, President of the Dubai Civil Aviation Authority, Chairman of Dubai Airports, Chairman and Chief Executive of Emirates Airline and Group, it is being supported by the Dubai Civil Aviation Authority (DCAA), Dubai Airports, Dubai Aviation Engineering Projects (DAEP), Emirates Airline and Group, Dubai Air Navigation Services (dans) and dnata, one of the world's largest air services providers with services across five continents. DXB expansion The show is taking off as one of the three biggest airports in the world unveiled its ambitious expansion plans. In a fast-forward mode to handle zooming passenger numbers, the expansion of Dubai International Airport (DXB), the world’s busiest airport for international passengers for 10 consecutive years with 87 million passengers in 2023, will require US$2. 7 billion. That will make it stand out among the Middle East airports that will be handling 1.1 billion passengers by 2040. Sheikh Ahmed asserted that Dubai will undoubtedly become ‘The World’s Airport’ and the city will be an expanded global hub for an impressive number of industries including aviation, tourism, technology, and education. Dubai's airport terminal plans The US$35 billion Al Maktoum International Airport is envisaged to have a capacity for 260 million passengers In April-end, Dubai unveiled plans for the construction of the world’s largest airport terminal. The US$35 billion Al Maktoum International Airport is envisaged to have a capacity for 260 million passengers upon completion, five times the size of the current DXB. All operations at DXB will be transferred to the massive facility over the coming years. Once completed, Al Maktoum, which opened in 2010, will be the new home for Emirates Airlines with the airport boasting five parallel runways and 400 aircraft gates. Technology and innovative systems The participation in the Airport Show will provide excellent opportunities for airport security whose global market size will reach US$26 billion by 2030, according to Spherical Insights & Consulting. The participants will be updating their knowledge about technologies that facilitate smooth passenger screening facilitation, checkpoints, and baggage surveillance. Airports have been focusing on acquiring technology and innovative systems that keep glitches and shortcomings at a distance. Their search will also be ways for handling cybercrimes and explosive devices, filling up the gaps, and improving the systems and procedures. IATA-led workshop May Ismail, Event Manager at RX, said, “Along with concentrating on the picked-up pace of passenger and cargo business, the airport industry is focused on massive expansions and phenomenal improvements to be at the cutting edge of the game in the coming decades." "Their search for everything they want stops at the Airport Show. This year, we will have 20+ first-time exhibitors. We will be hosting for the first time an IATA-led workshop as a by-invitation event." Sustainability and Innovation It had been predicted that processes within airports will be fully autonomous by 2050 along with zero-queue terminals Organisers have appropriately chosen this edition’s theme - Sustainability and Innovation – as the industry players' focus has shifted to embracing cutting-edge technology and greener initiatives to drive growth and efficiency while grappling with the complexities of rising passenger volumes, changing governmental regulations changing assessment of potential risks. This is much needed as global consultancy Oliver Wyman predicted more than 19 billion passengers will pass through world airports each year by 2040, and the global commercial aircraft fleet be over 36,000 aircraft seven years earlier. It had been predicted that processes within airports will be fully autonomous by 2050 along with zero-queue terminals. Several companies have expressed their views about their association with the Airport Show. Enhancing efficiency and safety Jaffar Dawood, Senior Vice President, of Airport Operations UAE, and MEA, dnata, said, “We’re pleased to showcase our offering at the Dubai Airport Show during a time of remarkable growth throughout the region." "Our advanced equipment on display demonstrates our commitment to continually investing in our operations to enhance efficiency, safety, and sustainability. We look forward to meeting with our partners and fostering connections at this prestigious industry event.” Alternative fuel solutions B. Tarik Özeler, Export Sales Manager at BMC said, “As the sole manufacturer of Apron Buses in Turkey, we are actively enhancing our product range with various alternative fuel solutions and are in talks with pioneering ground handling service companies across Turkey, Europe, the Middle East, and Africa to expand our offerings." "To boost production and enhance the Apron Bus range, we are engaging with pioneering engineering firms in Europe and manufacturers in the Far East for joint venture collaborations.” Streamlining operations Tamer Samy, Sales Director for Middle East at ADB SAFEGATE said, “Technology and innovation have played crucial roles in transforming airports across the Middle East and South Asia into smart hubs." "These advancements have streamlined operations, enhanced passenger experiences, and improved overall efficiency." Airside 4.0 solutions "Our company is a pioneer in driving airports towards smarter functionalities with comprehensive solutions including airfield lighting, power systems, airport, and tower software, docking automation, apron management systems, and aftermarket services." "Our Airside 4.0 solutions not only enhance operational efficiency and safety standards but also elevate the passenger experience. The Airport Show is a pivotal platform for us to showcase our latest products and connect with industry pioneers, airport operators, and stakeholders.” Flexible digital solutions Bruce Bowman, Strategic Advisor & Project Director at Cairn Consulting, the Aviation Consultancy Partner, said, “A primary challenge for airports is the strict regulatory and infrastructural environments that often delay the adoption of new technologies, preventing them from aligning with the rapid innovations seen in domestic digital commerce." "At Cairn Consulting, we are committed to navigating these challenges, advocating for regulatory reforms while pioneering flexible digital solutions that enhance both efficiency and the consumer journey, ultimately aligning airport experiences more closely with cutting-edge consumer market trends." AR, VR, and LLM applications "We are exploring futuristic applications of AR, VR, and Large Language Models (LLM) to enhance passenger interaction with airport services, foreseeing a future where these technologies make airport stays more enjoyable and interactive, thus redefining what airports can offer beyond the traditional." "As airports refresh, renew, or build new infrastructure, incorporating these technologies from the ground up, will be crucial to creating spaces that are truly futuristic and responsive to the next generation of traveler needs.”
Durite will use the Road Transport Expo to demonstrate how AI and digital systems are improving road safety – and how this technology can help attract more young people into the industry. Durite, a pioneer in vehicle safety, lighting and auto electrical parts will be showcasing its popular Demo Van on Stand R45, Hall1 at the RTX in Stoneleigh on 4th-6th June. Durite Driver Status Monitoring The vehicle is equipped with a combination of the company's safety innovations, showcasing how Durite can help to support fleet compliance with standards such as the DVS Phase 2, FORS, and CLOCS. The technology on the vehicle includes Durite’s DVR kits, 4G live-streaming DVR and CCTV kits, AI and Progressive Safe Systems, innovative lighting and smart telematics tracking. Durite can help to support fleet keeping with norms such as the DVS Phase 2, FORS, and CLOCS Visitors will be able to explore the Innovation Corner of the stand, where Durite will feature its HD range of cameras and the new Durite Driver Status Monitoring system. This uses AI to detect dangers that drivers are facing daily, such as fatigue and distractions. It sounds like an alert to make the driver aware of hazards, helping to improve safety for both drivers and other road users. Durite’s ADAS technology The system can be combined with Durite’s ADAS technology, designed to monitor the vehicle and road environment around it to predict potential collisions. By warning the driver early, it allows the driver to react in good time and avoid accidents. John Nobbs, UK Sales Manager for Durite, said: “Our stand will reflect Durite’s ethos of harnessing technology to enhance road safety. The Innovation Corner will showcase pioneering edge tech that is bringing a new dimension to driver safety. Meanwhile, the demo van is a great way for fleet operators to really see how combining and integrating systems can help with compliance and reduce road risk.” Initiative to enhance recruitment Durite is taking part in the School of Thought Automotive’s program to highlight the opportunities Durite is taking part in the School of Thought Automotive’s program to highlight the opportunities that working in the automotive and fleet sector can offer the next generation. School of Thought Automotive is an industry initiative to enhance recruitment and retention of young people. It will bring year 11 students aged 15 and 16 from local schools and colleges to attend the opening day of the Expo, and on the Durite stand, they will be able to experience the challenges of driving an HGV using an interactive truck and logistics simulator game. “It is a great opportunity to promote and raise awareness of the steps that the industry is taking to make the road safer for everyone,” adds John Nobbs. Opportunities for growth and improvement Durite Marketing Manager, Veronique Vanoli, said: “As a significant supplier to the UK Transport industry, we feel a duty to help our sector recruit the next generation. The industry is constantly evolving, always bringing in new and improved technologies for vehicles and smarter ways to handle logistics. It's this ongoing flow of innovation that keeps things interesting and offers endless opportunities for growth and improvement. There are excellent career prospects and we’re proud to play our part in shaping the industry and helping inspire young people to join it.” Durite, a FORS associate, has been supplying vehicle cameras for more than 20 years and has provided more than 50,000 systems to operators throughout the UK. An extensive network of distributors and approved installers service the whole of the UK and Ireland.
Cohesity, a pioneer in AI-powered data security and management, announced the appointment of Dr. Craig Martell as Chief Technology Officer. In this role, Dr. Martell will bring his deep industry expertise to shape the company's technical vision, incorporating current and evolving industry and customer trends to define and execute a strategic and impactful roadmap for the company’s future. Digital and AI plan growth Dr. Martell brings extensive industry and public sector experience and unprecedented expertise in artificial intelligence (AI) and machine learning, pioneering AI programs for top tech companies since 2013. Dr. Martell most recently served as the Chief Digital and Artificial Intelligence Officer (CDAO) for the U.S. Department of Defence (DoD). The CDAO office was created to elevate digital and AI strategy development and policy formulation In this role, he served as the senior official responsible for accelerating the adoption of data, analytics, digital solutions, and AI functions to generate decision advantage across the department - expertly guiding the DoD through a quickly-changing AI industry. With Dr. Martell as its first pioneer, the CDAO office was created to elevate digital and AI strategy development and policy formulation while ensuring the unity of mission and tighter integration for the department’s enterprise-wide data, AI, and cyber organisations. Prior senior roles of Martell Prior to joining the DoD, Dr. Martell held several senior roles at some of the most recognisable technology companies. At Lyft, he served as Head of Machine Learning, where he designed and built a state-of-the-art machine learning (ML) platform, allowing the Lyft engineering team to quickly create and ship ML models using large-scale, new, and ongoing statistical programs. From 2018 to 2020, Dr. Martell was Head of Machine Intelligence at Dropbox, responsible for all machine learning, including overall vision-setting, drawing from analytics as applied to ML, and clear, concise communication of ML strategy across the organisation. Martell’s proficiency in statistical codes and methods has been shown in his several patents Before then, he led a number of AI teams and market-moving initiatives at LinkedIn. Dr. Martell was also a tenured computer science professor at the Naval Postgraduate School specialising in natural language processing. Dr. Martell’s proficiency in statistical principles and methodologies has been demonstrated in his several patents, including a Hybrid Classification System in 2021 and System and Method for Encrypting Data in Pictorial Data in 2008. Cohesity’s AI-powered innovations “The speed and scale Cohesity has achieved over the last several years is a testament to the incredible technology platform the company has built at the junction of multi-cloud, security and AI for the future of data protection. My role will be to accelerate the innovation internally and the advocacy externally of Cohesity’s AI-powered innovations that are second to none,” said Dr. Martell. “I’m honoured to join Sanjay and the talented team he has put together as we accelerate the company’s course to advance AI and machine learning capabilities critical to addressing key challenges to enterprise data.” Cohesity’s AI roadmap “AI represents a massive competitive opportunity and advantage for Cohesity. Our launch of Cohesity Gaia – with its first-to-market, patent-pending innovations – was the first step in our strategy,” said Sanjay Poonen, president and CEO, Cohesity. “Attracting and hiring an industry pioneer of Craig’s calibre – someone who has been driving an agenda of responsible AI at the highest levels of both public and private sector organisations – rounds out our strong executive leadership team with expertise across security, multicloud, and AI. I expect that Craig’s experience and vision for Cohesity’s AI roadmap will accelerate our lead in this critical area of our business.”
Morse Watchmans, the industry pioneer in key control and asset management systems, is showcasing its line of innovative key control and asset management solutions at The Security Event, April 30–May 2, 2024. Event attendees can visit stand 5/H50 to experience these products first-hand and hear about Morse Watchmans’ industry-first features for the efficient management of keys and assets. Robust solutions for management “We are seeing incredible growth of both the security industry and our market within the UK, making The Security Event an ideal platform to showcase our latest innovations,” said Tim Purpura, VP of Global Sales and Marketing, Morse Watchmans. “With solutions designed to ensure both security and accountability, Morse Watchmans is committed to meeting the evolving needs of organisations seeking robust solutions for facility management, emergency preparedness, and more.” Complementary key control software KeyWatcher® Touch integrates with many brands of access control systems for a layered approach Morse Watchman’s flagship KeyWatcher® Touch electronic key cabinet is a scalable key control solution for organisations looking to secure, manage and track keys and other assets. With a 7” touchscreen and patented SmartKey system with industry-first KeyAnywhere technology, it is easy to withdraw and return a key securely to any key cabinet located within an enterprise. KeyWatcher® Touch also integrates with many brands of access control systems for a layered security approach. With optional asset management lockers, illuminated key slots, and customisable access permissions, the KeyWatcher® Touch not only safeguards valuable resources but also streamlines compliance to state, federal, and tribal regulations. Using the complementary key control software, all access activity is automatically recorded. Additional product offerings Publication and delivery of reports can be automated with requested reports tracing key movements by time, date, and user code as well as audit reports that track keys in use, overdue keys, and inconsistent key usage. Additional product offerings also include KeyWatcher Fleet® for automotive fleet management applications, KeyBank® Touch for large quantities of keys and SmartKey® Locker Touch System for the storage and tracking of larger objects. These solutions, coupled with Morse Watchmans’ industry-pioneering software, service and support, ensure the safety and security of a variety of physical assets.
Durite, pioneers in vehicle safety, lighting, and auto electrical parts supply, have commissioned a new demonstration vehicle designed to bring their range of road safety products closer to fleet operators throughout the UK. The Durite-branded demo’ van is fully equipped with a selection of the company’s latest safety additions, including DVR kits, 4G live-streaming DVR and CCTV kits, AI and Progressive Safe Systems, innovative lighting, and smart telematics tracking. Vehicle operation and compliance “This is a great way to help fleet operators of all types and sizes select the correct and latest technology to ensure safe vehicle operation and compliance with DVS, FORS & CLOCS,” says Durite, adding “The release of the Direct Vision Phase 2 has proven quite challenging for everyone. We are happy to offer local support to our distributors and fleets, showing first-hand how our DVS Progressive Safe System operates and answering any questions they might have to help them navigate their way through the new requirement.” Impact of new technology “Durite has come to our branches to showcase their latest additions and our customers loved it! We all have the Durite catalogue and know the products are top quality, but there’s nothing like touching and seeing the products working,” said Dale Terry, Sales Director at HGV Direct Ltd., adding “Our customers can see for themselves the positive impact new technology can have on their fleets, plus having the team here means all the questions get answered there and then.” Demo unit The unit will also be on hand at many of the major trade events scheduled for 2024 On the road throughout the UK, the demo unit will travel from one operator to the next and managers can book a slot, with a minimum of one month’s notice at any time via the Durite team or by visiting the Durite website. The unit will also be on hand at many of the major trade events scheduled for 2024 including at the Road Transport Expo, where Durite will be exhibiting on stand R45 between the 4th and 6th June, 2024. All in one visit “Fleet and vehicle operators already use our online Easy Kit Selector,” said Durite, adding “but the mobile demonstration unit, now allows managers and their staff to see each safety product in action and to discuss bespoke vehicle requirements with our demonstration team - all in one visit and on their premises.” Durite, a FORS Associate, has been supplying vehicle cameras for more than 20 years and has provided more than 50,000 systems to operators throughout the UK. An extensive network of distributors and approved installers service the whole of the UK and Ireland.
Technology company Insta and the Finnish Defence Forces have agreed on the three-year acquisition package related to Finland's F-35 fighter program. The acquisition is based on the strategic partnership agreement between the Finnish Defence Forces and Insta and covers the years 2024–2026. The acquisition covers, among other things, building maintenance and service capabilities for the avionics of the Finnish Air Force’s Lockheed Martin F-35 Lightning II multi-role fighters, i.e., the plane’s electronic systems, as well as related support services. The F-35 fighters will be put into service from 2026 onwards. Partnership with the Finnish Defence Forces This agreement ensures in part that Finland has the necessary competences and the ability to maintain the F-35 systems and security of supply for decades to come. The systems in the F-35 fighter jet require special expertise and a broad understanding of technology. Long-term cooperation, a strategic partnership with the Finnish Defence Forces, and earlier fighter purchases have resulted in Insta accumulating strong technology and business area expertise that can support the security of supply of the Finnish Defence Forces’ critical systems, even during emergencies. The systems in the F-35 fighter jet require special expertise and a broad understanding of technology "So far, Insta has been responsible for the maintenance of the avionics systems on the Hornet fighter jets. Building capability for maintaining the F-35’s avionics systems allows for us to establish a strong continuum of competence regarding critical systems and technology and, with the introduction of new technology, also provides new types of opportunities for further developing competence," says Ville Kettula, Insta’s VP for the aviation business. A shared situational awareness is decisive With Finland’s accession into NATO, defence systems are being increasingly cross-border connected, the amount of data is growing, and the technology is advancing at a record pace. Being able to leverage this data for leadership and the forming of a situational picture will be decisive in terms of warfare. The F-35 stealth fighters, which Finland will start receiving in 2026, are known as the world’s most modern and versatile fighter jets. They are also flying data links that continuously gather a situational awareness of their environment and compare it to threats. The planes share data among themselves and with the ground forces, thereby enabling them to be used for surveillance and reconnaissance duties as well. Advancement of technology and equipment The piled data is simultaneously relayed to all plans that have joined the data link The advanced sensor technology allows for detecting the own aircrafts, vehicles, ships, and troops as well as those of the enemy and unknown units. The stealth capabilities of this fifth-generation fighter enable it to see further than the distance required for its detection. The gathered information is simultaneously relayed to all systems that have joined the data link. "The advancement of technology and equipment at record pace will also emphasise the significance of preventive maintenance and repair, not to mention cyber security. In addition to maintaining the aircraft’s avionics systems, Insta will also be responsible for integrating the new fighter’s systems with the Finnish command & control systems together with the Finnish Defence Forces," Kettula explains. Research and product development In addition to maintenance activities, Insta has engaged in continuous research and product development work in order to improve the operational reliability, flight safety, and performance of the fighters. Finland will receive a total of 64 F-35 fighters. The aircraft has an estimated service life of 30 years, which means that there will be work to be done well into the future. NATO offers new international opportunities for Insta Insta’s AirC2 product family contains solutions for the integrated command of air defence As a provider of maintenance for the F-35 fighter fleet’s avionics, Insta is part of Lockheed Martin’s global maintenance network and, a contracting partner to the aircraft manufacturer. "We have the opportunity to provide maintenance and repair services for avionics systems on F-35 fighters even outside of Finland. The potential market is extensive since several NATO countries have chosen F-35 fighters," says Petri Reiman, Senior Vice President for Insta Advance. In addition to avionics, Insta’s Defence business focuses on command & control systems, simulators, cyber security, and system integrations for connected defence. Insta’s AirC2 product family, for example, contains solutions for the integrated command of air defence in terms of both anti-aircraft and fighter defence. Agreement with NCIA "Insta’s solutions are state of the art in terms of the level of integration and the capability in terms of different systems and service branches. NATO is strongly emphasising multi-domain thinking, where such integration is a key factor; this makes our solutions interesting to others," Reiman explains. In March of this year, Insta signed a collaboration agreement with the NATO Communications and Information Agency (NCIA). The agreement enables Insta to offer the NCI Agency, for NATO’s own needs or for use in other NATO countries, commercial off-the-shelf products (COTS) and services, such as situational picture systems, command & control systems and cyber security services, data encryption and gateway solutions as well as software services. Already in 2023, Insta and Lockheed Martin signed a collaboration agreement on the development of the next-generation data relay and filtering solution. The signed agreement was the first project related to the indirect industrial cooperation of Finland’s F-35 fighter project.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
Open platform video technology software is more than just a product; it's a tool that helps customers achieve their desired business outcomes. Safety, round-the-clock security, and increased operational efficiencies are now the norm due to video technology. Responsible Technology Despite humanity’s impressive technological advances, we also recognise the immense responsibility that comes with technological innovation. It's not enough to focus solely on the positive impact video technology can make, we must also be vigilant in identifying and addressing any potential negative consequences it can have on society and its citizens. This is the role of Responsible Technology. Data privacy We want to use all the good things that technology innovation brings, whether it be video, AI, ML, facial recognition, etc. We want to use all the good things that technology innovation brings, whether it be video, Artificial Intelligence, machine learning, facial recognition, etc. to serve people in societies in a responsible way. That means making sure that we regulate technology in a way that respects human rights and data privacy. Addressing the challenges The challenge is, that rather often technology leaders and policymakers either have conflicting interests or collaborate too late. To be responsible, business leaders must support their societies and policymakers in making regulations in the interest of the common good. At Milestone Systems, we are actively looking at how we develop our software responsibly, how our partners responsibly sell our software, and very importantly, how our customers use our software with a responsible mindset. Ensuring good corporate governance As a long-time partner within the security industry, we’re celebrating our 25th Anniversary this year, we are supporting the regulation of video technology for the good of society. However, it of course needs to strike the fine line between the right legislation and not hindering innovation. UNGP The UNGP is the most authoritative and widely adopted set of principles for responsible business At Milestone Systems, we want to play an active role in this and that is why we have pledged our support to the UN's Guiding Principles on Business and Human Rights (UNGP). The UNGP is the most authoritative and widely adopted set of principles for responsible business. The principles call on governments and companies to identify, prevent, mitigate, and remedy actual and potential human rights abuses. Since its launch in 2011, the UNGPs have received wide support from states, civil society organisations, and the private sector, making them the key global foundation for business and human rights. Protect, respect, and remedy Through this commitment, we are taking steps to ensure good corporate governance and ethical standards in the development of our technology. We're generating mechanisms to prevent misuse and we are building educational practices internally. Based on the UNGP’s three pillars: protect, respect, and remedy, we are developing a set of Responsible Technology Principles and procedures for the development, selling, and use of our products. Need for video technology regulation In addition, we are currently evaluating all the various technology areas in which our video software can be used, such as with third-party integrations that utilise e.g., facial recognition. We are mapping out the advantages and disadvantages for societies. One key area of concern is how local authorities are mapping and storing data about us as individuals. This is the reason why we're inviting more legislation to regulate video technology rather than less. Engaging With policymakers We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard We are proactively reaching out to and connecting with policymakers and other relevant stakeholders to discuss our approach to and take on Responsible Technology and encouraging the political landscape to work with us around regulation and legislation. We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard and where we can openly weigh the advantages and the challenges of technology, whether it is video, facial recognition, machine learning, Artificial Intelligence, or other technologies. Striking a balance Implementing Responsible Technology is a journey, not a destination. To give it the focus needed, we have created a dedicated team to implement this initiative at Milestone Systems. At the same time, we are reaching out to the political landscape to discuss how we balance regulation without hindering innovation. Video technology used ethically We are a global company with worldwide operations, and we are having dialogues about how video technology is being used and how we can have meaningful talks about what regulation and legislation should look like. However, we don’t necessarily want to limit access to the technology itself. Facial recognition We encourage the policymakers to engage with us in the industry so that together we can strike the fine line Facial recognition is a great example of this. The EU is considering making live facial recognition illegal. That would be a huge inhibitor of proactive terrorism prevention. For example, if a well-known terrorist is walking down the street and is being mapped out against Interpol’s most wanted list, the authorities should be able to react. However, if a person walking down the street but is not mapped out or does not have any priors then the city should not be allowed to store the data of that individual’s whereabouts at that point in time. This potential legislation is concerning to me as a citizen of Europe. Instead, we encourage the policymakers to engage with us in the industry so that together we can strike the fine line for the better good of all of us. Maintaining high ethical standards We have a firm understanding and expectation that ethical standards are a huge driver in the security business. Citizens are not in favour of technology companies abusing data about them and monetising from things that they have not opted in to do. Soon, I think we will see many more companies and governments leaning toward suppliers that do have a responsible mindset and high ethical standards for partnerships. Ethical practices Our journey toward Responsible Technology is an ongoing process, and we must remain steadfast in our commitment to ethical practices and the protection of human rights. We recognise that the rapidly changing technological landscape continually presents new challenges and opportunities. For this reason, we continuously look into how we can improve, for example, our end user licence agreements to avoid potential human rights abuses. An industry responsibility Security companies must prioritise careful planning and preparation, including developing policies and procedures For Responsible Technology to truly become a reality, compliance with international human rights laws and data privacy regulations is critical. Security companies must prioritise careful planning and preparation, including developing policies and procedures that govern the ethical use of video surveillance systems. The secure and ethical community In today's technology environment where deep integrations, machine learning, and artificial intelligence are becoming the norm, Responsible Technology is more relevant than ever. The security industry has a unique opportunity to set an example for other sectors by promoting a secure and ethical development community that prioritises Responsible Technology, trustworthy data collection, and the protection of human rights. We must all rise to this challenge and embrace our role as ethical leaders for the greater good of both people and societies.
Inadequate security measures on your essential infrastructure can have severe consequences. Consequences Consider the rail industry: If a vandal cuts the cables on a vital mechanism that controls train signals, train safety is jeopardised. To avoid train collisions or derailments and thus significant damage to property and potential loss of life, the operating company must shut down the service until the infrastructure is repaired and the network is up and running again. The disruption affects the rail ecosystem itself, but also the people using the trains, the transportation of cargo, and more. The financial cost of repairing the damage, restoring signal functionality, and compensating for delays can be substantial. For another example, consider electrical substations: A fire or targeted attack can damage the system and lead to devastating power outages. Traditional surveillance limitations Traditional video surveillance has its limits when it comes to protecting transformer stations Traditional video surveillance has its limits when it comes to protecting transformer stations. The facilities are often located in rural areas, where straying animals or flying leaves trigger false alarms. 3D Surveillance solutions overcome these challenges by volumetrically securing the area and immediately detecting intruders only raising the alarm in the event of a human intruder and even identifying drone attacks. Protecting critical infrastructure with 3D surveillance Critical infrastructure must be monitored. It remains at risk if operators do not have systems for monitoring entire areas rather than just the periphery if security personnel has limited information in case of an intrusion and if security response protocols are not automated. 3D Surveillance solutions 3D Surveillance is an important tool for protecting critical infrastructure and ensuring the safety of those who rely on it. Integrating LiDAR technology, 3D Surveillance solutions provide a comprehensive view of the area being monitored with real-time monitoring and response, protecting critical infrastructure from damage and providing a more comprehensive security system. Advanced analytics and artificial intelligence Security personnel can identify and verify threats more easily and track the movements of individuals or vehicles, as well as respond to incidents as they happen. 3D Surveillance systems can be equipped with advanced analytics and artificial intelligence (AI) capabilities to detect patterns and anomalies that may indicate a potential threat. This can help to prevent potential attacks or accidents before they occur, as well as enable more accurate responses to incidents. Talent challenge Turning to autonomy by implementing sensor- and software-based solutions requires fewer if any, in-person patrols 3D Surveillance can also help tackle the talent challenge in the industry: Recruiting security professionals involves extensive background checks, and jobs in the industry are notorious for their low salaries, which results in high staff turnover. Turning to autonomy by implementing sensor- and software-based solutions requires fewer if any, in-person patrols and ensure reliable infrastructure protection. Additional security measures In many countries, more stringent legislation now mandates the implementation of additional security measures to safeguard critical infrastructure, particularly at a country's points of entry, such as airports and harbours. Protecting the perimeter is no longer enough. For instance, airport management must ensure that critical areas, including the space around aircraft and near unauthorised access points, are secure. While multi-layered screening of individuals at the perimeter is a valuable security measure, it must be complemented by smooth and efficient surveillance of the entire area, which can only be achieved through advanced technology. Different adoption rates 3D Surveillance technology is only beginning to gain traction in most locations, and adoption rates differ significantly from one region to another. For instance, Scandinavia and Eastern Europe have embraced 3D Surveillance to a greater extent than Western Europe. Regions with lower adoption rates will likely catch up as they seek to reinforce the security of their critical infrastructure, especially given the conflict in Eastern Europe. Vandalism and damage protection 3D Surveillance enhances the security of critical infrastructure, reduces the risk of downtime and loss of revenue 3D Surveillance offers reliable protection against vandalism and damage - major concerns for companies that rely on critical infrastructure. LiDAR-based, software-enhanced 3D Surveillance solutions provide real-time insights and enable automatic processing of the information so that operators can autonomously and quickly detect and respond to potential threats. These solutions are scalable and customisable, allowing companies to adapt their security measures to their unique needs and changing environments. 3D Surveillance enhances the security of critical infrastructure, reduces the risk of downtime and loss of revenue, and ensures compliance with regulatory requirements. Asset management and maintenance planning Beyond its security benefits, 3D Surveillance can help with tasks such as asset management and maintenance planning. It can help identify potential problems or maintenance needs before they become more serious issues by providing a real-time view of the monitored infrastructure. This can help to reduce downtime and keep critical infrastructure running smoothly. Real-time management The same technology can also perform volume monitoring tasks and thus facilitate the management of valuable resources such as bulk material, grain, wood chips, or chemicals. By scanning the stock 24/7 and automatically calculating stock volume updating records in real-time, this technology supports lean production systems and automated processing.
The security industry is going increasingly digital these days, with more small- and medium-sized businesses joining their global brethren by moving their data to the cloud, leveraging the benefits of artificial intelligence, and embracing more open solutions. Innovation is expected to continue at a rapid pace, thanks in part to the residual effects of the pandemic which has driven changes that might have otherwise taken five years or a decade or more to get into customers’ hands on a global scale. Let’s take a look at the trends that will dominate ISC West 2023. Improved analytics Analytics is about expedience, and in the surveillance world, it makes it possible to identify and search for the “who did it?” clip you need. For analytics, along with the cloud, it comes back to the core themes of being able to do more with technology Analytics also provides more actionable intelligence than a simple surveillance camera may provide, from identifying high-traffic areas during select times of the day and alerting staff to pay greater attention to these areas, to business intelligence that can enable a company to staff a store with more employees. For analytics, along with the cloud, it comes back to the core themes of being able to do more with technology and relying less on humans. Leveraging the cloud The cloud story is very related: it provides the ability to perform video-related tasks from anywhere on any device. In addition, the cloud makes it easier to share videos with other stakeholders and collaborate on investigations. By storing video on the cloud, end users reduce their total cost of ownership because they no longer have to invest in onsite storage solutions, while gaining greater storage capabilities and thereby future-proofing their solutions. Deployment patterns Because the cloud requires a less total cost of ownership and can be intuitive, it is driving interest in solutions Another interesting trend that we’ll be hearing more about this year is the overall deployment patterns of video surveillance systems. This is part of the cloud trend, but the broader trend is the amount of effort it takes to deploy, monitor and maintain the video surveillance system. Because the cloud requires less total cost of ownership and cloud access can be intuitive, it is driving interest for solutions that can be hosted in the cloud. Interoperability vs. proprietary Related to the debate of open vs. closed solutions is how much the surveillance market prefers a turnkey solution compared to a more custom best-of-breed and tailored solution. Smaller and mid-market companies will be more interested in the turnkey solutions provided by a single vendor, while enterprise-level companies traditionally gravitate toward investing in customised solutions that are more likely to address their unique security challenges. One other related trend to keep an eye on is the role of the integrator as part of the rise of cloud and Video Surveillance as a Service (VSaaS) offerings.
Security beat
Security professionals are recognising the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organisations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analysing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognise the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilising open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualised through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritise critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratisation of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivise bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimises the occurrence of analytic errors caused by inaccurate machine translations. This minimises the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognise its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyse massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
Operational technology (OT) uses hardware and software to monitor and control physical processes, devices, and infrastructure. Historically, OT systems were not connected to the Internet and were therefore not vulnerable to cyber-threats. Internet of Things (IoT) However, today’s OT systems are increasingly part of a company’s networks as technologies converge and the Internet of Things (IoT) gains prominence. No longer can OT systems be counted on to be “air-gapped,” that is, not connected to other systems. When OT systems are vulnerable, companies face a “cyber-physical risk.” A bad actor could create a catastrophic risk in the physical security world by compromising OT systems. To understand more about OT and the related cybersecurity concerns, we spoke with Lisa Hammill, VP of Commercial Markets for Shift5, a company that applies cybersecurity best practices to OT systems and networks, thus dramatically reducing their cyber risk. Q: What is operational technology (OT)? How are the cybersecurity concerns for OT different than those for information technology (IT) systems? Hammill: Operational technology (OT) refers to the computer systems that underpin critical infrastructure, enabling it to run continuously and reliably. For example, planes and trains rely on OT to execute basic flying or driving commands. OT cybersecurity solutions for planes, trains, or weapon systems must be capable of the basics of IT cyber-hygiene Most OT is built on legacy technology manufactured before cybersecurity became a priority and relies on serial bus networks like MIL-STD 1553, CAN 2.0, or RS-232, instead of the standard TCP/IP communications protocols that IT security solutions can monitor and defend. Any effective OT cybersecurity solution for planes, trains, or weapon systems must be capable of the basics of IT cyber-hygiene, including ensuring signed software and firmware updates, full data capture, and continuous monitoring and detection aboard planes, trains, and weapon systems. This all makes cybersecurity for onboard OT difficult, but not impossible. Q: What is a “cyber-physical risk” and why is the term important? Hammill: Cyber-physical systems integrate digital components into physical objects and infrastructure; we focus on critical infrastructure like transportation as well as weapon systems. Cyber-physical risks manifest when actors intrude on these delicate processes to manipulate real-world outcomes, whether that’s grounding plane flights, or disabling train brakes. The risks of attacks facing OT within cyber-physical systems are highly consequential, can cause disruptions to civil society, economic disruption, and potential harm to citizens, as well as shift the balance of power in military conflict and geo-political matters. Q: Please describe the breadth of the risks when it comes to OT cybersecurity. Hammill: Cyber-physical attacks can jeopardise business and mission-critical operations, and risks are highly consequential when it comes to transportation systems, creating safety risks for operators and passengers, economic impact, and millions in downtime losses, remediation, and ransom payments. Transportation is a particularly vulnerable sector of critical infrastructure. An attacker could leverage a tested playbook to disrupt operations with minimal effort As we’ve seen from recent attacks demonstrating the attackers’ focus is trained on this space. The motivation of an attacker will vary, but for example, let’s say a bad actor wanted to target an aircraft to disrupt service and ground a flight. There have been examples of basic cyber-attacks targeting noncritical aircraft systems; however, many of these systems remain vulnerable. An attacker could leverage a tested playbook to disrupt operations with minimal effort. An attacker could target a system considered least critical to passenger safety systems categorised as a Design Assurance Level E (DAL E) like an in-flight entertainment system. This type of system has been hacked before and could be used as a vector for a ransomware attack. If an attacker takes control of video screens on seatbacks mid-flight, they would certainly damage passenger trust. They would also likely try to move up the design assurance level chain to gain further access. For example, when a plane pulls into a gate, communication between the aircraft and airline operations happens automatically. An attacker could exploit this connection to move from one system to another. If an attacker gets into those communications channels, they could alter data or hold it hostage, while the airline halted operations to resolve the issue. Q: What industries/markets are most vulnerable to OT cybersecurity threats and why? Hammill: Operational technology lacks the historical focus on cybersecurity that IT has, and basic best practices are nascent for OT industry-wide. Cyber-attacks targeting Colonial Pipeline and Florida's water systems (in 2021) have spurred those industries into action to prioritise cyber hygiene. The aviation and rail industries are watching and taking proactive steps to prevent such cyber-attacks. As weapons systems and vehicles on roads, rail lines, and in the air add on new technology, they are at risk of cyber-attacks Shift5 defends planes, trains, and weapon systems because these vehicles leverage a vast swath of distinct serial bus networks and protocols unseen in other critical infrastructure technologies. We have experts creating a tool that can monitor and detect traffic aboard these bespoke networks. And as weapons systems and vehicles on roads, rail lines, and in the air add on new technology, like autonomation, they are increasingly at risk of cyber-attacks. Q: What are the various sources of OT cybersecurity risks (e.g., other governments, individual hackers, criminal organisations, etc.)? Which are the most urgent and/or pervasive? Hammill: Because of their ability to cause deeply consequential impacts on the business, economy, and human safety, OT cybersecurity risks must be considered scrupulously. Attackers targeting OT could have a range of motivations, from financial gain or market advantage through the theft of intellectual property, to insider threats and geopolitical advantage in a contested environment. It’s no secret that most malicious adversaries choose the path of least resistance when developing their attack strategy. When OT is aboard planes, trains, and tanks, we’re only in the early innings of creating obstacles for those actors to overcome. One threat we’re watching closely is the evolution of ransomware targeting OT. Digital extortion could cause operational disruption and impact consumer trust. Q: What is the Shift5 approach to cybersecurity? Hammill: Shift5 extends 40 years of expertise in adversarial tactics, techniques, and procedures from IT endpoint security into the OT world. For the first time in history, operators can apply cybersecurity best practices to OT systems and networks, dramatically reducing their cyber risk. Shift5 allows rail, aerospace, and defense to generate data-informed insights and make accurate decisions Shift5 brings complete observability and threat detection to OT systems as cyber-physical attacks become an increasingly attractive strategy for digital attackers. By providing visibility into the data that powers their most expensive, longest-lived, and most consequential fleet assets, Shift5 allows rail, aerospace, and defense companies to generate data-informed insights and make timely, accurate decisions once considered impossible. Q: Has OT cybersecurity trailed IT cybersecurity in terms of awareness? If so, why is it true, and how can organisations become more aware (and more prepared) of OT cybersecurity risks? Hammill: OT cybersecurity is nascent compared to IT security, but the industry is catching up. While most organisations understand the importance of visibility and observability in IT systems to enable their defense, very few have this same level of oversight for their most expensive, consequential, and longest-lived OT-powered assets. Simple best practices geared towards defending OT can make an adversary’s job more difficult. Start with taking inventory of all OT assets, then move to gain situational awareness so you can develop your baseline for “normal” operations (and can identify any abnormal events), and finally take steps to shore up gaps in cybersecurity. Q: Tell me more about Shift5. Hammill: Shift5 was founded by Josh Lospinoso and Michael Weigand, two of 40 people hand-selected to stand up to U.S. Cyber Command, the nation’s most elite unit of cyber-defenders. There, Mike and Josh became familiar with challenges in defending weapons systems, and the idea for Shift5 was born. Shift5 provides OT cybersecurity and operational intelligence for fleet operators and military platforms Military weapon systems are built on the same OT infrastructure found within planes and trains, and today Shift5 provides OT cybersecurity and operational intelligence for fleet operators and military platforms. Our customers include the DoD, US Army, Air Force, and Navy, and several of the largest U.S. passenger rail and household-name aviation companies. Many of these industries are beginning to seek out partnerships with Shift5; for example, AEI HorizonX, the venture capital investment platform formed between AE Industrial and The Boeing Company, today works with Shift5. Q: What is the biggest misconception when it comes to OT cybersecurity? Hammill: A common misconception is that OT aboard planes, trains, or weapon systems isn’t at risk. Many security experts have implemented air gapping as a cybersecurity strategy to keep cybersecurity threats away from sensitive systems. However, due to the convergence of IT and OT, there are more inroads to OT than ever, and air gapping isn’t as effective. Transportation assets like planes and trains are flying and rolling data centers that produce valuable and useful data, and they need to be protected just as we protect client data or IP. It’s a hard problem to solve, but the stakes are high and attackers are increasingly aiming their attention at this surface area. Modern cybersecurity principles must be extended to the onboard OT networks of aerospace, rail, and defense Amid the war in Ukraine, we saw attackers target the Belarusian Rail System to thwart Russian adversaries, and Russia digitally attacked Viasat to disable this critical piece of infrastructure ahead of a kinetic strike. Digital attacks facing aerospace, rail, and defense targets are on the rise, and modern cybersecurity principles must be extended to their onboard OT networks. Q: How can organisations start to address these challenges? Hammill: Cybersecurity done well is a lot of preventative work, and when we hear no news, that’s often good news. The U.S. government has increased the levels of dialogue around cybersecurity risks facing US critical infrastructure operators and has led by example in sharing information to help critical infrastructure organisations bolster their defenses. I recommend that transportation organisations engage proactively with local FBI field offices or CISA Regional Offices to establish relationships in advance of any cyber-incidents and visit the websites of CISA and the FBI where they will find technical information and other useful resources. They should also take advantage of other resources like TSA, AAR, ICA, and relevant ISACs that have working groups focused on these challenges. I encourage every transportation operator to understand the risks for these large transportation assets through vulnerability assessments, pen testing, and exercises just as they do with their IT environments.
Foot traffic remained at respectable levels during Day Two of IFSEC International 2016 at ExCeL London. Attendees are bombarded with sensory overload as manufacturers look for new ways to stand out from the crowd. The result sometimes seems more like a lot of noise. Everyone is looking for ways to stand out from the noise of competing product features and claims at the show. One exhibitor, Tyco Security Products, is taking a different approach at this year's show, abandoning traditional emphasis on individual products and opting instead to focus on customer solutions targeted to end users. Tyco Security Products’ end-user targeted solutions Peter Ainsworth, Tyco Security Products' Director of Marketing for Europe, Middle East and Africa (EMEA), says everything at the Tyco stand -- from the layout to collateral material -- is built around the need to answer "so-what" questions from customers. "They want to know how we can save them money and make their lives better," says Ainsworth. A single brochure provides the "ultimate takeaway" for Tyco's visitors at this year's show; the "augmented reality" brochure has images that can be scanned with a smartphone to provide additional information, data sheets, etc. Tyco Security Products is also giving away a "magic cube" that can be configured as a cube showing Tyco's product lines, and then reconfigured into a multi-sided "star" shape that depicts various vertical market applications. There are "trigger points" on the cube that can be scanned using a smartphone app to provide additional information for potential customers, including videos. The design of both the brochure and the cube emphasise the message that Tyco Security Products understands customers' businesses. "This is where we see our product fitting within your establishment," says Ainsworth. "We take them through the journey at our stand." The brochure depicts the same journey and "helps the end customer understand what we can do for them," he adds. "It's not about intrusion, access or video, but about the total solution." "At a trade show like IFSEC, we are one of hundreds of stands," says Ainsworth. "We want something that people will remember us for. It's different and innovative, and reflects who we are as an organisation." TDSi Gardis access control "At a trade show like IFSEC, weare one of hundreds of stands.We want something that peoplewill remember us for. It's differentand innovative. It's not aboutintrusion, access or video, butabout the total solution" In addition to getting customers' attention, some manufacturers have other agendas. Gathering feedback for product development is another way exhibitors can get the most out of IFSEC. For example, TDSi is previewing its new Gardis access control platform at IFSEC, including all-new, intuitive software that is easier to navigate, and a new hardware controller, both conformant to ONVIF Profiles A and C. Two years in development, the system will be easier to integrate with third party systems, using a REST-based application programming protocol (API). The new TDSi products are six months or so away from launch, and TDSi is using the IFSEC show to get feedback about changes customers might like to see as the software is fine-tuned; then it will undergo extensive field trials in the next several months. Getting feedback from potential customers is an invaluable tool for TDSi's development engineers, and IFSEC is an ideal venue to provide the feedback. "We can do an awful lot in three days that would take us weeks driving around in a car or flying around," says John Davies, TDSi's Managing Director. "It's a cost-effective way to achieve the same thing. Also, every year at the show we dig up a couple of projects that pay for the stand. This year we met with a customer that has 900 sites. We're in the early stages of talking with them about the new platform." IFSEC 2016 provides a first look at the new TDSi technology, which Davies says the company will introduce to the U.S. market by 2017, likely as a hardware component of an OEM partner's access control system. The open, ONVIF-conformant strategy makes it possible. TDSi has not been active in the U.S. market for 10 years or more; developing the open-architecture product is a favourable alternative to entering the large market with an older, "me too" product, says Davies. HID Global Seos and Mobile Access solution Also at the show, HID Global introduced new high-definition direct-to-card printers, and showed its HID Mobile Access solution, powered by Seos. The company also emphasised integration of its Seos mobile credentialing system with time and attendance, fleet management and hand-held devices. There is a related managed services offering. A lot of buzz has surrounded Seos since it came on the market in September 2014, and currently there are several hundred mobile access systems installed worldwide, including hundreds of thousands of mobile identities in use in Western Europe and the United States. There have been several notable installations in the United States, especially among colleges and universities. HID Global is currently in the process of building out a "global wallet" in cooperation with chip manufacturer NXP, which is preloading its computer chips with Seos, usable for many applications beyond physical access control. At IFSEC, HID Global announced it has been selected by Vodafone Italy to modernise the company's physical access control system by providing a group of employees a mobile access solution across multiple sites and applications at the Vodafone Village in Milan.
Case studies
HID, the worldwide pioneer in trusted identity solutions, announces that Royal Jersey Laundry has introduced a new tracking feature of HID’s linen management platform at each of its 5-star hotel customer sites to guarantee that drivers drop off and collect precise linen stock and that costly errors are avoided. Linen tracking This new feature replaces a paper-based system used by drivers for the management of cages filled with clean/soiled linen delivered/collected at customer sites. It provides detailed end-to-end tracking of linen cages across multiple customer locations throughout the whole cycle of washing, packing, delivery, and collection, a complex process given that 550,000 pieces are laundered each week for numerous clients. Royal Jersey Laundry Royal Jersey Laundry works with most five-star hotels in London including The Dorchester, The Carlton Tower Jumerah Founded in 1915, Royal Jersey Laundry is one of the few cleaners servicing the luxury hotel sector. Based in a 25,000 square-foot purpose-built facility in Dagenham, rebuilt in 2021 for £15 million after a fire, it works with most five-star hotels in London including The Dorchester, The Carlton Tower Jumerah, The Peninsula London, and The Ritz. Need for constant communication Supporting the five-star segment is demanding given the constant communication required between the hotel and laundry, exacting standards, and the quantity and range of items to be laundered. This includes duvets, sheets, towels, and bath robes along with smaller items such as foot mats, drink coasters, shaving towels, and dry cleaning for guests themselves. Royal Jersey Laundry operates 24/7, employs 150 staff members, and washes 40 tons of linen per day. Maintaining laundering schedule Five-star hotels prefer to use linen they own with five sets kept of everything, allowing them to maintain a schedule In contrast with budget and mid-level hotels, five-star hotels prefer to use linen they own with five sets kept of everything, allowing them to maintain a rigorous laundering schedule and ensure guests always receive fresh, cleaned linens. “An average 300-bed hotel will have around 30,000 items of linen which will cost around £250,000,” says James Lincoln, Royal Jersey Laundry’s managing director. “The volume of linen is so high and it’s always moving such that accurate inventory control was a major challenge verging on the impossible.” HID cloud-based RFID linen management system Before the HID cloud-based RFID linen management system, everything was done manually. Laundry staff would check items off ironing/folding machines, a wholly error-prone process, and log the quantities on pieces of paper. The operational overhead for the laundry was exacerbated as the various linen items from the different hotels had to be kept separate, too. “Linen is everywhere: on beds, in cupboards, in transit, and at the laundry, yet no one had full insight into stock levels and, when things went missing which often happened, typically we’d get blamed,” says Lincoln. Real-time linen inventory management LinTRAK tags are sewn into linen items by laundry staff or linen manufacturers during the production process To address these problems, Royal Jersey Laundry installed a real-time linen inventory management system from HID combining LinTRAK® RFID tags, a full set of RFID equipment including table-top and conveyor-belt scanners, one RFID portal and one cabin scanning unit, and cloud-based Acuity software. The discrete LinTRAK tags are sewn into linen items by laundry staff or linen manufacturers during the production process. Some hotels also use LinTRAK tags to manage staff uniforms and restaurant linens such as napkins and tablecloths. HID LinTRAK textile tags Around 40% of Royal Jersey Laundry hotel customers have transitioned to the HID linen management solution and connect via Acuity’s web portal. Once cleaned, the linen is packed into cages, and scanned in seconds through HID’s RFID cabin station. Items are automatically counted, with delivery notes generated including billing information. HID’s Acuity software integrates with the laundry’s Sage accounting software to generate invoices. Benefits of textile tags The implementation of HID LinTRAK textile tags, RFID stations, and the Acuity software platform has radically changed how Royal Jersey Laundry operates, delivering a range of benefits: Fast Return on Investment: Since the installation of the HID equipment in 2019, the system has already paid for itself given the efficiency and productivity gains. Better use of people resources: Laundry and housekeeping staff no longer waste time on dull and resource-intensive activities like manually counting linen. They have been redeployed to more productive work, generating 10-20% savings in labor costs. Better visibility of stock levels: As hotels know exactly the location and quantity of linen, they are better able to cater to peak demand, reducing linen expenditures by up to 30%. Improved responsiveness and customer satisfaction: Access to in-depth data generated by the Acuity platform means the laundry can quickly answer customer queries. “We give hotels complete transparency about where their linen is in the cleaning and delivery cycle. There are just no grey areas anymore,” says Lincoln. Increased security of expensive linen assets: While theft of linen at five-star hotels is rare, it does happen. RFID tagging enables better monitoring of expensive bedding and towel investments. Enhanced reliability and productivity: Operations are more efficient as RFID-enabled items can never be lost or misplaced. Furthermore, digital scanning results in faster processing of items. “We’re effectively two businesses: the laundry itself and a logistics operation. We run a mixed fleet of lorries and electric vans which nip in and out of London three times a day picking up and delivering garments for hotel customers using us for guest work,” adds Lincoln.
Morse Watchmans, the industry pioneer in key control and asset management systems, reports a rising number of international cities and municipalities installing the company’s flagship key control system, KeyWatcher® Touch, to secure the buildings, equipment, and vehicles utilised by various municipal departments. “From public works to waste departments, courthouses, and beyond, the adoption of our KeyWatcher Touch solution continues to resonate positively across so many diverse cities,” said Tim Purpura, VP of Global Sales and Marketing, Morse Watchmans. “We take pride in knowing that our systems are being used to facilitate secure and efficient operations for some of the public’s most critical services.” New KeyWatcher Touch system By implementing effective municipal key control measures, cities can mitigate the risks associated with unauthorised key access while maintaining the operational integrity of public works. Cities and metropolises can set a foundation of trust and confidence within their societies This proactive approach not only safeguards against potential security breaches but also fosters accountability and responsible use of resources among city employees. In this way, cities and municipalities can establish a foundation of trust and confidence within their communities. In one instance, the Walworth County Public Works Department in Wisconsin implemented a new KeyWatcher Touch system after the original key box system failed to adequately support the county’s hundreds of keys for government buildings and county fleet vehicles. KeyWatcher Touch solution After seeing the success of the KeyWatcher Touch solution at the Department of Public Works, other departments within Walworth County have also begun installing their own KeyWatcher Systems. “These boxes are starting to catch on, and departments are really thinking about how they will use them for vehicles and building keys,” said John Miller, Senior Project Manager, Walworth County Public Works. The operational efficiencies of the KeyWatcher Touch solution are also appreciated Across the globe, the operational efficiencies of the KeyWatcher Touch solution are also appreciated. Blacktown City, a suburban community located approximately 22 miles west of Sydney, Australia, implemented a KeyWatcher Touch system at their Main Works Depot to help maintain usage accountability and eliminate the problem of missing or overdue vehicles, machinery, and building keys. KeyWatcher Touch automated control “We manage keys for at least 500 vehicles and machines here at the Depot and each of them has at least two to three sets of keys,” said Joe Haddad, Facility Manager, Blacktown City Main Works Depot. “Without the KeyWatcher Touch automated control and tracking, the job of accurately keeping track of these many keys would be almost impossible.”
360 Vision Technology, the UK manufacturer of ruggedised HD, radar, and thermal PTZ imaging cameras, has been chosen to supply the camera surveillance technology for a historically important English Heritage site, at the Transit Shed, Exeter Quayside. Installed by Select Electrics and specified by Derek Maltby of Global MSC Security, the inclusion of additional CCTV was required to monitor the Exeter Quayside area, covering the canal side, shops, restaurants, bars, and attractions. Security and safety Kevin Tyrrell, CCTV Technical Manager for Select Electrics explains the requirement for an expansion to the current CCTV system, “With accessible funding granted from a successful Safer Streets 2 application, Exeter City Council looked to expand the surveillance coverage of the Quayside area and integrate it into the existing town centre CCTV network, for monitoring at the Exeter City Council control room." “Coverage was required to provide safety and security surveillance in an area that is popular with both locals and visitors. Additionally, as the Quayside includes a canal side, should coverage of the canal be required in an emergency, high-definition footage of any incident here would be advantageous.” High-definition images We required a camera that would provide reliable HD images but also one that would withstand high winds" With all these requirements considered and the tender bid successfully accepted by the council, Select Electrics was selected to implement the expansion of surveillance coverage. “To cope with the harsh conditions to be found at Exeter Quayside, we required a camera that would not only provide reliable high-definition images but also one that would withstand high winds and rain, that can combine to make a difficult operational environment for electronic equipment, such as a CCTV camera,” continues Kevin. Camera applications “We’ve enjoyed a long-term technical relationship with 360 Vision Technology for several years, having employed their camera technology in many varied applications, and based on this experience, we were confident in their ability to provide a camera that could satisfy our demanding requirements.” “Additionally, and further complicating matters regarding the installation of cameras, many parts of the Quayside area are historically important, such as the cobbled areas and streets, as well as the English Heritage-protected Transit Shed, which occupies a large part of the area.” Need for an alternative solution The logistical effects of installing traditional CCTV infrastructure were considered too disruptive and expensive" The centrepiece for many music, dance, and street theatre events held in the area, the Transit Shed is an open-plan building set on cast iron uprights, historically, used to store cargo unloaded from ships. “The historically important parts of the area could not be disturbed,” adds Derek Maltby. “The logistical effects of installing traditional CCTV infrastructure, such as fibre cabling under streets and a network of CCTV cameras on poles was considered too disruptive and prohibitively expensive so an alternative solution needed to be found.” Perfect line-of-sight “We have always had a great relationship with the research and development team at 360 Vision and this project was no different." "We had identified the Transit Shed as a possible location for the siting of a single PTZ camera, where it would have a perfect line-of-sight to all of the areas that required coverage on this project, but we knew that any camera mounted on, or near the Transit Shed would have to meet strict English Heritage requirements, including a specific body colour, to match the exact heritage hue of the Transit Shed, to blend within the historic architecture." Invictus TX wireless camera Very quickly, we determined a solution using the 360 Vision Invictus TX wireless camera" “We outlined the technical requirements and restrictions of the project to the team at 360 Vision and were delighted with their enthusiasm and technical understanding of the demanding requirements of this installation." "Very quickly, we determined a solution using the 360 Vision Invictus TX wireless camera but in a one-off specific colour, specifically matched to blend with the painted roof of the Transit Shed.” Key features of the camera With continuous rotation pan, unobstructed 360-degree view, and 160-degree tilt, the 360 Vision Invictus camera can deliver unhindered views to the control room and for night-time vision, is equipped with on-board LED white light technology. Considering camera performance, unlike many other camera products that utilise ‘belt-drive’ PTZ systems, Invictus incorporates ultra-reliable and extremely quiet Direct Drive mechanisms, resulting in consistent pre-set accuracy and long-term reliability for its installation at the Quayside. HD and ultra-low-light camera imaging The camera is designed to provide trouble-free service in harsh Quayside conditions The Invictus TX’s high-performance, ruggedised PTZ camera with full 1080P HD and ultra-low-light camera imaging technology, made it the perfect choice for deployment in this application. Supplied in a specific green Pantone reference, the camera is designed to provide years of trouble-free service in harsh Quayside conditions and provides comprehensive coverage of the area, at a fraction of the cost of multiple traditional units and associated traditional hard-wired transmission infrastructure. Day and night surveillance “In operation, system operators can instantly switch on the LED white light mounted onboard the Invictus camera, to illuminate the scene and inform people at the Quayside that they are being monitored, both for security and safety purposes, for example, if anyone falls into the water at the Quayside at night,” adds Dennis Cavanagh, Control room Operations Manager, Exeter City Council. “Since the 360 Vision Invictus TX camera has been added into the system, we have had many positive comments from residents and local businesses, complementing the non-invasive nature of the colour-matched camera in the historical surroundings and confirming the feelings of security the camera coverage now provides to the area both during the day and night.” Increase surveillance coverage The combined Invictus TX camera and integrated LED white light technology make it the perfect choice" The Invictus camera on the Transit Shed is part of a wider project to increase surveillance coverage and improve image quality across the Exeter CCTV network, with over 40 cameras already installed to either replace existing cameras or extend coverage to new areas, as part of a rolling programme of improvement made possible by funding from Safer Streets Fund. Jason Wyatt, National Account Manager at 360 Vision Technology says, “The combined Invictus TX camera and integrated LED white light technology makes it the perfect choice for the technically demanding environment at the Exeter Quayside." Surveillance upgrade "Invictus’ ultra-low light technology from 1/1.9’’ ULL sensors also delivers a brighter, crisper, and more defined colour images at night, for the ultimate performance at the Quayside." "We are proud to have delivered a bespoke Invictus camera version in a one-off colour, to enable use on the English Heritage protected Transit Shed, as part of an overall upgrade to the Exeter City Council city-wide CCTV network and its ongoing surveillance upgrade using 360 Vision’s Invictus cameras.”
Yalova Terminal is a roll-on roll-off (“ro-ro”) port, meaning it is designed to carry wheeled cargo. It is Turkey’s 63rd border gate and began operations in 2017. It covers 80,000 square metres with a 500-trailer capacity and 16,000 square metres of storage, which includes an ADR warehouse for the storage of hazardous goods. On-site there are X-ray facilities, a laboratory for customs, offices, and break rooms for drivers. All of these facilities require continuous monitoring to protect staff, drivers, and the stock contained within the trailers at the port. Monitoring 24/7 The Yalova Ro-Ro Terminal team was looking for a way to intelligently monitor activities at the port and quickly search footage for investigations if needed. Because of the size of the port, an efficient way to store and deliver video footage back to the control room and server rooms was also sought. AI-enabled cameras reduce false alarms Cameras provide the on-site Yalova Ro-Ro Terminal security team with alerts only to events that require their attention The team turned to installer Arte Teknoloji and Hanwha Vision to provide a robust and AI-enabled video surveillance solution comprising 48 PNO-A9081R cameras, 17 XNO-C7083Rcameras, and 7 XNP-6400RW cameras. With AI analytics carried out on the device, the cameras provide the on-site Yalova Ro-Ro Terminal security team with alerts only to events that require their attention. This frees them up to focus on other responsibilities, while the cameras constantly scan for relevant objects or possible incidents that require human input. Potential false alarms from video noise, waving trees, moving clouds, and animals are ignored by the cameras, helping to reduce operator fatigue and frustration. Effective perimetre protection In particular, the XNP-6400RW PTZ Plus camera provides a feature-rich PTZ camera that is designed for perimetre protection. With AI-based object auto-tracking, operators can efficiently monitor the movement of objects while remaining hands-free to control other cameras. This analytics feature is supported by leading AI algorithms unique to Hanwha Vision. The camera captures evidence-grade images of objects up to a distance of 200 metres in all lighting conditions, with the help of adaptive IR technology which adjusts the angle of the camera’s IR LEDs to match the level of zoom. Object detection and classification for accurate responses Object classification based on attributes can also support quick forensic searches for future investigations The PNO-A9081R is a 4K bullet AI camera that can detect people, faces, vehicles, licence plates, plus their attributes. This allows operators to understand who, and what vehicles, are entering and exiting the site, particularly around the perimetre or rolling on and off ships docked at the port. They can quickly respond to possible intrusion or unusual behaviour, reducing the risk of stock, equipment, or vehicle theft. Object classification based on attributes can also support quick forensic searches for future investigations. BestShot feature The cameras also detect loitering, audio such as shouting or screaming, tampering with the camera itself, and shock detection. The BestShot feature automatically chooses the best images of an object, helping with bandwidth and storage efficiency as well as delivering high-quality, detailed images back to the control room. Robust video system Having the best security, that’s intuitive to use and easy to install, was essential" Eyup Tetik, Corporate Sales Manager at ENTPA ELEKTRONİK A.Ş. explains, “It was important to the Yılport Ro-Ro team that they had a robust video system that improved situational awareness and response times, especially after the devastating earthquake in Kahramanmaraş." "As a busy international Ro-Ro Port with millions of dollars of stock and equipment, having the best security, that’s intuitive to use and easy to install, was essential.” Steering ahead The installation is part of the new port area and the security team looks forward to reaping the benefits of the efficiency gains, greater awareness, more detailed investigations, and faster response times as a result of the AI-powered video system.
At Scheveningen Harbour in the coastal city of The Hague in the Netherlands, an AI-based video security system from Bosch Building Technologies is now ensuring that every single ship or boat entering or leaving the harbour is logged. The customised solution developed by Bosch together with its partner BrainCreators automatically registers and classifies shipping traffic. Intelligent security solution Until now, employees at the port control centre had to keep an eye on shipping traffic around the clock from the window of the control centre and manually record the 80 or so vessels that pass through the port every day. The city council of The Hague to quickly find a tailor-made solution for the port of Scheveningen The reason for the investment in the intelligent security solution was the fear that criminals would seek alternative routes via smaller ports such as Scheveningen, now that large Dutch or Belgian ports such as Rotterdam and Antwerp have been more secure against smuggled goods for some time. This was reason enough for the city council of The Hague to quickly find a tailor-made solution for the port of Scheveningen. Challenging task in Scheveningen Special conditions require individual solutions Most boats and ships entering the port of Scheveningen are not required to register and, unlike purely commercial ports such as Rotterdam, the port cannot simply be closed off. In addition to cargo ships, there are also fishing boats and private sailing yachts at anchor, with small dinghies and rowing boats cruising between them. Keeping track of the movement of goods in particular is therefore a challenging task in Scheveningen, where the video security system with intelligent video analysis installed by Bosch provides welcome support. Author's quote The requirements for this project were very specific because the shipping traffic not only had to be filmed" "The requirements for this project were very specific because the shipping traffic not only had to be filmed, but also registered and classified. The solution also had to provide information about the speed of travel," says Niels van Doorn, Senior Manager Solutions & Portfolio at Bosch Building Technologies in the Netherlands. "Standard software can't do that. Together with our partner, we have therefore developed an AI that can identify and classify ships of all kinds–from passenger ships and freighters to sailing yachts and inflatable boats." This data aids in identifying suspicious shipping movements. Flexidome IP starlight 8000i cameras No sooner said than done – and in the shortest possible time Development, planning and implementation only took around 12 months. Two intelligent video cameras at the mouth of the harbour now record the traffic. The specially developed AI classifies the ship types and registers them in a file. Due to the difficult lighting conditions in the port, the Flexidome IP starlight 8000i cameras from Bosch were chosen. They deliver detailed images even in challenging weather and lighting conditions and enable the staff in the control centre to see every detail, even in very bright or dark image sections. Ships that are not seen in real-time by the personnel on duty appear as still images on the screen All boat identifiers are recorded, documented, stored and automatically provided with additional information on date and time, direction of travel and speed around the clock using AI. The streams from the cameras are fed directly into a video management system. Ships that are not seen in real-time by the personnel on duty appear as still images on the screen. By analysing all the data, peak times, ship types, trends and deviations from the norm are determined. New video documentation "The dashboard gives staff an overview of all activities in the port. The software protects the privacy of the people recorded by making their faces unrecognisable. The new video documentation now provides solid evidence and helps to identify suspicious and unusual situations more quickly and effectively," says Ferry Ditewig, Business Development Manager at Bosch Building Technologies in the Netherlands. The video solution is also well equipped for future challenges and can be flexibly expanded as required: for example, additional information from external sources could be integrated, such as meteorological data, tides or the automatic identification system (AIS) for exchanging ship data.
There are two truisms of K-12 schools that exist currently; first, safety and security are core objectives, and second, school budgets are tight. K-12 schools have traditionally been perceived as safe havens where children can learn and develop as they begin their life journeys. Violence, vandalism, and theft Unfortunately, K-12 schools are increasingly being subjected to violence, vandalism, and theft. Teachers are expressing growing concerns about their safety as they intervene in physical conflicts within schools while also encountering students carrying firearms or other weapons on school premises. Even more sobering, more than 352,000 students in the U.S. have experienced gun violence at school in the past 23 years. Schools on tight budgets With pandemic aid coming to an end, school districts are having to do more with less Further compounding the situation, schools and their administrators are on tight budgets. Pandemic relief funding has kept many school initiatives afloat over the past few years, but in the rush to spend on new high-tech solutions, many of the basics were left behind. With pandemic aid coming to an end, school districts are having to do more with less. Need for cost-effective security solutions These two truisms offer more questions than answers for superintendents, principals, teachers, board members, and parents. What school security solutions can we deploy that actively combat rising violence? How can we cost-effectively implement such tools? We want to improve school security and efficiency at the same time, but how? Key Control in a K-12 environment Key control systems are an integral piece of the larger security puzzle helping schools of all sizes manage security At their most basic level, school key control systems are designed to securely protect keys in an electronic key cabinet. At their most complex, key control systems are an integral piece of the larger security puzzle helping schools of all sizes manage security and operations effectively during times of both emergencies and daily operations. Authorised access In a traditional school key control system, keys are securely stored within individual compartments with each key uniquely assigned and tracked. Authorised users gain access to specific keys by providing their credentials, such as a PIN or biometric authentication, which permits them to remove a key from its designated compartment. This enables schools to effectively manage and track access to various areas throughout a building and/or campus, thus minimising the risk of unauthorised entry or loss of keys. Integrated software A user-friendly interface allows administrators to manage and configure access permissions Integrated software further enhances the functionality of the key control system. A user-friendly interface allows administrators to manage and configure access permissions, generate detailed reports, and receive notifications about key-related activities. Additionally, the software can be integrated with other security systems, such as access control or video surveillance, creating a holistic security solution for schools. Key Control reduces security expenses What’s more, key control systems are a cost-effective solution that proactively reduces a school’s security spend. By reducing the possibility of lost keys and limiting access to master keys to authorised individuals, school districts can save thousands in unforeseen re-keying costs. School asset manager solutions integrated with a key control system likewise safeguard critical assets ranging from laptops to sensitive files, reducing the opportunity for theft and improving compliance. Key access control systems for schools also improve campus security for a lower cost than that of armed security guards and contracted off-duty police. Key Control improves school security By utilising a centralised key control system, schools can ensure that emergency keys are securely housed A key control system in schools offers significant security benefits, particularly when it comes to emergencies such as active shooter events. By utilising a centralised key control system, schools can ensure that emergency keys are securely housed and readily accessible to local first responders. Rapid first responder key accessibility Responding officers can swiftly retrieve the required keys, such as those for locked classrooms or secured areas, enabling them to enter and address the situation promptly. Rapid first responder key accessibility significantly improves response times and effectiveness during critical incidents and gives parents peace of mind, knowing that their children's school is equipped with robust security measures to handle emergencies efficiently. Emergency Key Grab (EKG) kit Morse Watchmans has designed a new solution exclusively designed for K-12 Schools called the Emergency Key Grab (EKG) kit. The new EKG kit is designed to provide first responders with easy access to keys in the event of a lockdown or emergency. The Morse Watchmans EKG kit contains: A 1-module or greater KeyWatcher Touch System. Colour-coded SmartKeys and KeyRing with Hubs. Unique KeyWatcher System First Response KeyRing Identification Label. Educational Materials: Implementing Key Control in K-12 Schools Tip Sheet and K-12 Schools Key Control Playbook Hardcopies. One-on-one Educational Training from Morse Watchmans. Template and Guidelines for Writing a K-12 School District Key Control Policy. The EKG can save a life! Enhances general security protocols These systems enable schools to centralise key management, ensuring that keys are always properly secured In addition to facilitating emergency response, a key control system in K-12 schools enhances general security protocols. These systems enable schools to centralise key management, ensuring that keys are always properly secured and accounted for, and only accessible by authorised personnel. This comprehensive key management solution can significantly reduce the likelihood of security breaches, vandalism, and theft at K-12 schools. Real-time visibility and monitoring Furthermore, the system provides administrators with real-time visibility and monitoring capabilities, allowing them to track who has accessed keys, when, and for what purpose. This helps schools better comply with regulatory requirements such as the Family Educational Rights and Privacy Act (FERPA) which requires schools to closely control access to private medical and academic files. Enforcing employee accountability effectively strengthens security measures and fosters a safer environment for students, faculty, and staff. Key Control improves school operations By providing a streamlined process for accessing keys, maintenance teams can promptly respond Beyond enhancing security, a key control and asset management system can significantly improve the efficiency of school maintenance teams. With a centralised key control system, maintenance personnel can quickly access the keys necessary for completing their required tasks, eliminating time-consuming searches for the right key or reliance on multiple key copies. By providing a streamlined process for accessing keys, maintenance teams can promptly respond to maintenance requests while ensuring that doors are secured and unlocked as needed, thus minimising disruptions to the school's operations. Flexibility of localised access Key control systems additionally provide the flexibility of localised access for contracted workers. Contractors, such as HVAC repairmen or IT technicians, can receive access to individual keys with location-specific access granted only for areas they need to work over specific periods. The school key control software keeps a record of their key usage, allowing administrators to track a worker’s activities and ensure accountability. This granular level of key control allows school administrators to grant temporary access to contracted workers while maintaining overall security. System benefits Fleet management software for schools provides a clear record of who has used a specific vehicle key Key control systems also offer significant benefits for the management of a school’s fleet of vehicles, such as buses and other vehicles. With school bus fleet management software integrated into a key control system, administrators can effectively track and control the usage of school buses district-wide. Administrators can retrieve data on the status of any bus, shuttle, or other vehicle at any time. Fleet management software for schools provides a clear record of who has used a specific vehicle key, enabling administrators to monitor vehicle availability, maintenance schedules, and overall fleet utilisation. Reliable and cost-effective solution By deploying Morse Watchmans' key control and asset management systems, schools can effectively address security concerns, optimise operations, and make efficient use of resources. Its proven implementation of key control systems in K -12 environments offers schools a reliable and cost-effective solution that promotes a safe and efficient educational environment.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
The transportation industry is unique because it plays a role in both the minutiae of everyday life and the overall economy's well-being. Providing uninterrupted and efficient transportation services depends heavily on the safety and security of transportation entities. Due to the vast amount of people frequenting transit stations and the importance of the items on ships and ferries, the transportation sector faces multiple challenges that evolve as the industry advances. We asked this week’s Expert Panel Roundtable: What are the security challenges of the transportation industry?