Maritime surveillance
Lloyd’s List has been the trusted source for news and intelligence about the global shipping industry for nearly 300 years. Now its award-winning journalism and expert analysis are available instantly, anywhere, with the launch of the new Lloyd’s List App. Available on the App Store for iOS users and Google Play store for Android devices, the new Lloyd’s List App has a suite of customisable features to keep users connected to the trends, issues and events that matter in...
Vemotion Interactive, the UK manufacturer of low-latency, high-performance, plug-and-play live video streaming solutions, has launched a new version of their popular Polecam rapid deployment camera. Polecam Development of the innovative and ultra-reliable original rapid deployment CCTV camera, the new Polecam delivers high-quality live video, even over low bandwidths, to provide a robust, integrated wireless video surveillance solution that also features a fast ‘plug...
IRClass Systems and Solutions Pvt Ltd (ISSPL), announces the launch of a Digital Centre to offer a wide range of technology solutions. The Digital Centre, located in Mumbai, was inaugurated by the Chairman of ISSPL – Mr. Arun Sharma. The Digital Centre will provide a comprehensive suite of services to help organisations navigate the digital landscape across maritime and non-maritime sectors. New cybersecurity services ISSPL recognises the critical importance of cybersecurity in the digi...
It is the launch of the International Maritime Cyber Security Organisation (IMCSO), an organisation that aims to raise the standard of cybersecurity risk assessment across the maritime industry. IMCSO The IMCSO has devised a certification programme for security consultants and a professional register, helping shipping organisations to confidently select experienced personnel. Alongside this, the IMCSO will also validate report outputs to ensure consistency with those reports then held on a ce...
Siemens announced that it will deepen its collaboration with NVIDIA to help build the industrial metaverse. Siemens is bringing immersive visualisation powered by new NVIDIA Omniverse Cloud APIs to the Siemens Xcelerator platform, driving increased use of AI-driven digital twin technology. At the NVIDIA GTC, Siemens and NVIDIA demonstrated how generative AI can revolutionise the visualisation of complex data, making photorealism possible, and showcased how sustainable shipbuilder HD Hyundai can...
The Security Executive Council proudly welcomes Mark Kelly and Bill King as their two newest Subject Matter Expert Faculty and Dave Komendat as Emeritus Faculty. Mark Kelly Mark Kelly has more than 25 years of experience managing global security programs for major multi-national organisations. His expertise spans the overall suite of physical security programs, but he specialises in supply chain security. He is the former Global Head of Field Security and Supply Chain operations for Dell, the...
News
Matrix, a prominent provider of Telecom and Security solutions, eagerly anticipates showcasing its range of security and telecom products at IREE 2023. This event is scheduled from 12th to 14th October 2023 and is dedicated to innovative security solutions. The venue is Booth No. 2.120, Pragati Maidan, New Delhi, India. Matrix is the first company to offer RDSO 6.0-compliant cameras for Indian Railways. Matrix cameras are certified by STQC, Delhi lab for following the OWASP ASVS 4.0 mandated by RDSO for cyber security. EN50155 compliant Matrix Cameras are designed to ensure that the data gathered by the cameras is secured against cyber threats both at the time of transmission and storage. Matrix will unveil its cutting-edge IP Video Surveillance solutions at this exhibition, encompassing enterprise-grade VMS, NVRs, and IP cameras with resolutions reaching up to 8 MP. Their latest camera in the range is ruggedised cameras that are EN50155 compliant. The cameras are anti-vibrant and shock-resistant making them ideal for roadways and railways. The comprehensive solution focuses on addressing three key client concerns: managing bandwidth and storage expenses, simplifying centralised video surveillance complexities, and offering proactive security measures. Matrix PTZ series 2MP cameras The IREE 2023 event in New Delhi, will feature a display of the Matrix Ruggedised Cameras In a recent addition to its diverse range of IP cameras for comprehensive security, Matrix introduces the ruggedised camera. Matrix ruggedised IP cameras cater to transportation's dynamic needs with high-quality video, low-light sensitivity, and versatile features for rail and roadway monitoring. It can capture images of vehicles moving in Zap Speed. The IREE 2023 event in New Delhi, will feature a display of the Matrix Ruggedised Cameras. Matrix also features PTZ cameras, enabling full 360-degree security coverage by enabling pan-tilt-zoom functions in multiple directions for extensive area monitoring. The Matrix PTZ series 2MP cameras with 25x/33x and 5MP Cameras with 42x optical zoom options enhance image clarity and surveillance efficiency. Project Series 5MP Cameras Furthermore, Matrix will also introduce its existing line of Project Series Cameras, specifically designed for large-scale organisations and project-based scenarios. The Project Series 5MP Cameras come with UL Certification, a globally recognised safety standard, and NEMA Certification, ensuring resilience against environmental threats. These cameras offer high-resolution imagery for enhanced clarity and protection. Advanced surveillance systems demand robust video recording solutions with ample storage capacity and redundancy to ensure continuous 24/7 surveillance with minimal downtime. Matrix addresses this need with its new ENVR line, capable of supporting up to 256 channels and boasting a storage capacity of up to 144 TB. Attendees of the event will have the opportunity to experience this innovation firsthand. SATATYA SAMAS range of solutions Matrix showcases the COSEC PANEL200P-a site controller ruling key operations for buildings To enhance proactive video surveillance capabilities, visitors can explore the SATATYA SAMAS range of solutions by Matrix, featuring features like tripwire, intrusion detection, motion detection, no-motion detection, and more. Within the realm of access control, Matrix will showcase the COSEC PANEL200P-a site controller overseeing access operations for entire buildings. This versatile controller functions in two distinct architectures: acting as a bridge between controllers and servers in network architecture, and operating autonomously without a server in Standalone Architecture. Its user interface can efficiently manage 255 COSEC door controllers and accommodate up to 25,000 users. COSEC ARC DC200P door controller Furthermore, Matrix will introduce the COSEC ARC DC200P door controller, an innovative IP-based access control terminal with several advantages over traditional models. Leveraging Power over Ethernet (PoE) eliminates the need for complex wiring and local power sources. Its compact design, offering both din rail and wall mount options, makes it suitable for even space-constrained environments. Matrix will raise the COSEC ARC DC200P door controller, an inventive IP-based access control Matrix's display will also feature the robust biometric door controller-VEGA FAX, boasting multiple connectivity options including Wi-Fi, PoE, and ethernet. The company will also present the COSEC ARGO FACE, a sophisticated face-based door controller renowned for its precise, swift, and reliable recognition capabilities, powered by cutting-edge AI-driven deep learning technology. Author's quote Kaushal Kadakia, Marketing Head, states, “IREE will provide an excellent opportunity for exhibitors to demonstrate our innovative security products for various industrial verticals. With a large crowd set to attend, we expect to meet some key decision-makers to advance our creative solutions. We look forward to understanding their organisational needs and showing them how our solutions will help them improve their security experience.” Matrix cordially invites to visit IREE 2023 from 12th to 14th October 2023 at Booth No. 2.120, Pragati Maidan, New Delhi, and get a hands-on experience with its enterprise-grade security solutions.
3xLOGIC, a provider of integrated and intelligent security solutions, has announced the availability of its X-Series edge-based deep learning analytics cameras. X-Series cameras combine state-of-the-art hardware with advanced analytics to deliver real-time, accurate, and actionable data, transforming how surveillance systems can be deployed and utilised. Advanced data processing "X-Series cameras have analytics that enables them to perform advanced data processing directly at the edge, right on the camera itself," explained Mike Poe, Director of Product Management at 3xLOGIC. "They use object, people, perimeter, and vehicle identification algorithms to provide accurate detection and tracking in dense, complex, and busy environments. Using vast volumes of representative data, the cameras continuously analyse movements and behaviour, while using predictive analysis to constantly track each object." Appearance-based models This decreases the opportunity for false positives as a result of elements such as illumination changes 3xLOGIC’s analytics technology utilises appearance-based models, as opposed to established motion-based solutions that depend solely on changes in pixels over time to indicate movement. This decreases the opportunity for false positives as a result of elements such as illumination changes or foliage, as the trackers identify and ignore them because they do not look like objects of interest. This level of filtering is particularly effective for improving accuracy or detecting complex behaviours, and once an object begins tracking, a unique identification code is assigned that stays with the object in the field of view. Core applications X-Series cameras can be deployed both indoors and outdoors and allow valuable business intelligence to be gained. Core applications include retail, commercial and office premises, education, hospitality, warehousing and distribution, healthcare, and critical infrastructure. 3xLOGIC’s deep learning analytics provide information about dwell time, entry and exit, appearance and disappearance, abandoned and removed objects, traffic direction and tailgating, as well as people's movement and counting. VIGIL VMS integration VIGIL Server provides support for use cases such as perimeter protection, business intelligence, and alarm notifications X-Series cameras form an integral part of 3xLOGIC's VIGIL video management system, allowing users to harness the full potential of their surveillance ecosystem. For example, person, object, and vehicle detection capabilities can be integrated into VIGIL CLOUD, so that only actionable detection and notifications are delivered. Meanwhile, VIGIL Server provides support for use cases such as perimeter protection, business intelligence, and alarm notifications. Edge-based deep learning analytics Integration with VIGIL TRENDS makes security management easier and more efficient by turning data into meaningful information, collating, deciphering, and presenting it in a way that makes sense by showing present and historical data in a business context. 3xLOGIC’s Poe concluded, "Our X-Series edge-based deep learning analytics cameras empower organisations to take their security to the next level by providing them with powerful analytical tools that deliver insights and actionable data, enabling them to make informed decisions and respond quickly to potential security threats."
Sensor solution providers HENSOLDT and ERA, a pioneering company specialising in Air Traffic Control (ATC) and passive surveillance systems for air surveillance, air defense and electronic warfare, announced their strategic partnership to drive the advancement of air surveillance and defence capabilities. This collaboration is a response to the insights gained from recent conflicts in Europe, emphasising the need for cutting-edge technologies to enhance national and European security. VERA-NG system The primary objective of this partnership is to jointly offer the Passive Surveillance System VERA-NG to the German Luftwaffe. HENSOLDT and ERA will leverage their expertise to develop an integrated infrastructure solution based on the state-of-the-art VERA-NG system and HENSOLDT Passive Radar Twinvis technology. This means the combination of passive technologies Passive ESM Tracker (VERA-NG by ERA) and Passive Coherent Locator (Twinvis by HENSOLDT). Synergistic approach While VERA-NG is designed to detect active emissions from targets of interest at long-range Data of both systems can be fused to a deep integrated air picture. The two technologies complement each other perfectly. While VERA-NG is designed to detect active emissions from targets of interest at long range, targets do not have to emit signals for the passive radar Twinvis at a shorter range. Through this combination, a completely passive air picture can be created. This synergistic approach will provide an unprecedented level of passive surveillance capability, contributing significantly to future air surveillance and air defence systems. Integrated solution The VERA-NG system is renowned for its excellence in real-time surveillance and reconnaissance capability in air, maritime and land domains with a track of proven references for NATO and ally countries. "As providers in our respective fields, HENSOLDT and ERA are committed to providing innovative and comprehensive solutions that address the evolving security landscape," said Markus Rothmaier, Head of Naval & Ground Radars at HENSOLDT. "Our collaboration is founded on the shared vision of enhancing national security through advanced technologies, and we are confident that our integrated solution will set new benchmarks in passive air surveillance and defence." Passive Radar Twinvis technology HENSOLDT and ERA are well-positioned to contribute significantly to the safety and securityBoth companies are poised to extend their collaboration beyond the German Luftwaffe, with plans to offer their integrated solution to other European customers. In a time where passive surveillance is increasingly recognised as a vital component of air defence systems, HENSOLDT and ERA are well-positioned to contribute significantly to the safety and security of European airspace. "We are excited to join forces with HENSOLDT to further pioneer a new era of passive surveillance capabilities by combining our proven passive surveillance system VERA-NG with PCL-Twinvis technology," remarked Ondrej Chlost, CEO of ERA. "The integration of our VERA-NG and Passive Radar Twinvis technology not only addresses the current challenges but also prepares us for the future needs of air surveillance and defence." Strategic collaboration The strategic collaboration between HENSOLDT and ERA marks a significant milestone in the advancement of air surveillance and defence technologies. As Europe continues to adapt to evolving security dynamics, this partnership promises to play a pivotal role in ensuring the safety and integrity of Germany, Europe and its allies.
Award-winning security pioneer, Gallagher Security, strengthens Command Center’s VMS capabilities by partnering with Edge360, the company that delivers a comprehensive containerised video management solution, to create a unified video and access control solution. Author's quote Blake Smith, National Technical Manager for Gallagher Security North America, sees the partnership between the two companies as a natural fit: “Edge360 and Gallagher share many common values and we’re both committed to delivering flexible, high-performing solutions." He adds, "Combining access control and video surveillance systems gives our Command Centre users unparalleled control over their sites, and I think users will feel the benefits of this partnership immediately.” Gallagher and Edge360 partnership Command Centre users will be able to seamlessly view and control video surveillance Through the Gallagher and Edge360 partnership, Command Centre users will be able to seamlessly view and control video surveillance and access control systems from a single interface, streamlining operations and enhancing efficiency. By correlating video footage with access events, users can investigate incidents comprehensively and quickly identify specific recordings associated with those events. The synchronised workflows and coordinated responses enabled by the combined focus on video and access control eliminate the need for separate systems and manual coordination improving security operations. Leveraging features More importantly, the new integration empowers users with advanced video analytics capabilities, transforming raw video footage into valuable insights. By leveraging features such as facial recognition, object detection, people counting, and motion detection, users can gain deeper situational awareness and make data-driven decisions. These powerful analytics not only enhance security but also automate processes, saving time and optimising resource allocation for better operational outcomes. Integration of Gallagher's Command Centre "We are pleased to announce the integration of Gallagher's Command Centre with Edge360's Surveill video management platform. This combination of these advanced technologies offers users an unparalleled level of control, efficiency, and situational awareness by combining access control and video surveillance into a seamless experience," said John Rezzonico, CEO, Edge360. He adds, "In a landscape where speed and precision are of the essence, this is a game-changer for optimising security operations and resource allocation." IT-friendly foundation Edge360's Surveill VMS stands at the forefront of security technology, offering an unprecedented level Edge360's Surveill VMS stands at the forefront of security technology, offering an unprecedented level of reliability, uptime, and data security through its innovative integration of containerisation with the operating system. Designed to handle mission-critical video workloads, Surveill provides an IT-friendly foundation that seamlessly scales to meet the increasingly complex safety and operational demands of the world. With a focus on performance, scalability, and resilience, Surveill VMS is not just a tool but a comprehensive solution for optimising security operations. Command Centre’s partnership Overall, having a joint centralised management system provides a cohesive and powerful solution that simplifies operations, enhances incident response, and improves the overall security management of any premises through Command Centre, giving users more holistic controls over their sites. Gallagher will be showcasing Command Centre’s partnership with Edge360 at booth 4433 GSX on September 11-13, including live demos of the integration’s capabilities.
Sun Surveillance is a company specialising in the manufacturing of custom solar-powered wireless security camera systems. These systems are designed to provide consistent operation 24/7/365, even in remote locations or areas off the power grid. The company's innovative solar security solution offerings include solar-powered wireless camera systems, mobile solar-powered wireless camera systems, along with perimeter protection solutions in various sectors such as solar, oil/gas, and substations. Sun Surveillance offers products like SolsticeLight™, SolsticeCam™ and SolsticeCam™ Mobile, and Powerbridge. Unmatched customer support Visit Sun Surveillance at Booth #3050 at GSX 2023 in Dallas, Texas, USA, from September 9-11, 2023, to experience the future of security. Attendees can witness live demonstrations of the company's newly designed Solstice Trailer Attendees can witness live demonstrations of the company's newly designed Solstice Trailer for uncompromising 24/7/365 reliability. Sun Surveillance experts will be on hand to discuss tailored solutions that meet unique security needs. The team is dedicated to delivering unmatched customer support, product value, and custom engineering. Electronic security solutions "We're excited to reveal newly designed products for security solutions at GSX 2023," said Chris Phillips, President of Sun Surveillance, adding "This event aligns with our mission to simplify project design and implementation of electronic security solutions globally." Sun Surveillance is a provider of solar-powered security solutions, offering innovative technologies for commercial and industrial applications. With a commitment to sustainability and cutting-edge design, Sun Surveillance continues to redefine security integration.
Secure Logiq is excited to announce a landmark collaboration with Mayflex, a renowned distributor specialising in converged IP security solutions and other cutting-edge products. Mayflex's robust network and deep-rooted industry expertise pave the way for Secure Logiq to broaden its market presence, ushering in a new phase of growth for innovative server solutions. Powerful surveillance Featuring speeds of up to 4000 Mbps and storage capacities surpassing 1 petabyte, Secure Logiq's advanced servers seamlessly align with Mayflex's array of surveillance and security offerings. This synergy enables Mayflex to offer comprehensive and powerful surveillance systems to its customers, enhancing its competitiveness in the market. Server solutions Our collaboration marks a significant stride in expanding the footprint of our high-performance servers" Ben Yoxall, Secure Logiq's Global Sales Director, expressed his excitement about this strategic partnership, stating, "Our collaboration with Mayflex marks a significant stride in expanding the footprint of our high-performance servers within the IP surveillance market." "We pride ourselves on delivering unparalleled server solutions that empower our clients to excel in their surveillance endeavours." Service and support Echoing these sentiments, Robin Hughes, Co-founder of Secure Logiq, said, "Having worked with Mayflex in previous roles I’m excited to once again be working with the Mayflex team to distribute the Secure Logiq range." "Secure Logiq and Mayflex are both companies that strive for the very best in service and support and put the customer at the heart of everything that we do, so we are well aligned, and we are very much looking forward to a long and successful partnership.” Minimising ecological footprint We are thrilled to introduce Secure Logiq's outstanding range of servers to our esteemed clientele" Adam Herring, Security Director at Mayflex, stated, "We are thrilled to introduce Secure Logiq's outstanding range of servers to our esteemed clientele." "These products not only align seamlessly with our offerings but also exemplify our joint commitment to minimising the ecological footprint associated with product distribution." Logiqal Benchmark One of the highlights of Secure Logiq's technology, as highlighted by Adam Herring, is the 'Logiqal Benchmark' utility. This unique feature empowers users to create a completely virtual environment that meticulously replicates their entire IP Surveillance system. The utility also includes a 'camera replicator facility,' significantly reducing setup time and offering a multitude of other benefits.
Expert commentary
Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply chains. Transportation sector The attack began with the port's legacy computer system, which handles shipping containers, being knocked offline. This forced the port to halt the handling of shipping containers that arrived at the terminal, effectively disrupting the flow of goods. The incident was a stark reminder of the risks associated with the convergence of information technology (IT) and operational technology (OT) in ports and other critical infrastructures. This is not an isolated incident, but part of a broader trend of escalating cyber threats targeting critical infrastructure. The transportation sector must respond by bolstering its defences, enhancing its cyber resilience, and proactively countering these threats. The safety and efficiency of our transportation infrastructure, and by extension our global economy, depend on it. Rising threat to port security and supply chains XIoT, from sensors on shipping containers to automatic cranes, are vital to trendy port functions OT, once isolated from networked systems, is now increasingly interconnected. This integration has expanded the attack surface for threat actors. A single breach in a port's OT systems can cause significant disruption, halting the movement of containers and impacting the flow of goods. This is not a hypothetical scenario, but a reality that has been demonstrated in recent cyberattacks on major ports. Adding another layer of complexity is the extended Internet of Things (XIoT), an umbrella term for all cyber-physical systems. XIoT devices, from sensors on shipping containers to automated cranes, are now integral to modern port operations. These devices are delivering safer, more efficient automated vehicles, facilitating geo-fencing for improved logistics, and providing vehicle health data for predictive maintenance. XIoT ecosystem However, the XIoT ecosystem also presents new cybersecurity risks. Each connected device is a potential entry point for cybercriminals, and the interconnected nature of these devices means that an attack on one, which can move laterally and can have a ripple effect throughout the system. The threat landscape is evolving, with cybercriminals becoming more sophisticated and their attacks more damaging with a business continuity focus. The growing interconnectivity between OT and XIoT in port operations and supply chains is also presenting these threat actors with a greater attack surface. Many older OT systems were never designed to be connected in this way and are unlikely to be equipped to deal with modern cyber threats. Furthermore, the increasing digitisation of ports and supply chains has led to a surge in the volume of data being generated and processed. This data, if not properly secured, can be a goldmine for cybercriminals. The potential for data breaches adds another dimension to the cybersecurity challenges facing the transportation sector. Role of cyber resilience in protecting service availability Cyber resilience refers to organisation's ability to prepare for, respond to, and recover from threats As the threats to port security and supply chains become increasingly complex, the concept of cyber resilience takes on a new level of importance. Cyber resilience refers to an organisation's ability to prepare for, respond to, and recover from cyber threats. It goes beyond traditional cybersecurity measures, focusing not just on preventing attacks, but also on minimising the impact of attacks that do occur and ensuring a quick recovery. In the context of port operations and supply chains, cyber resilience is crucial. The interconnected nature of these systems means that a cyberattack can have far-reaching effects, disrupting operations not just at the targeted port, but also at other ports and throughout the supply chain. A resilient system is one that can withstand such an attack and quickly restore normal operations. Port operations and supply chains The growing reliance on OT and the XIoT in port operations and supply chains presents unique challenges for cyber resilience. OT systems control physical processes and are often critical to safety and service availability. A breach in an OT system can have immediate and potentially catastrophic physical consequences. Similarly, XIoT devices are often embedded in critical infrastructure and can be difficult to patch or update, making them vulnerable to attacks. Building cyber resilience in these systems requires a multi-faceted approach. It involves implementing robust security measures, such as strong access controls and network segmentation, to prevent attacks. It also involves continuous monitoring and detection to identify and respond to threats as they occur. But perhaps most importantly, it involves planning and preparation for the inevitable breaches that will occur, ensuring that when they do, the impact is minimised, and normal operations can be quickly restored. Building resilience across port security and supply chains In the face of cyber threats, the transport sector must adopt a complete method of cybersecurity In the face of escalating cyber threats, the transportation sector must adopt a comprehensive approach to cybersecurity. This involves not just implementing robust security measures, but also fostering a culture of cybersecurity awareness and compliance throughout the organisation. A key component of a comprehensive cybersecurity strategy is strong access controls. This involves ensuring that only authorised individuals have access to sensitive data and systems. It also involves implementing multi-factor authentication and regularly reviewing and updating access permissions. Strong access controls can prevent unauthorised access to systems and data, reducing the risk of both internal and external threats. Network segmentation Network segmentation is another crucial measure. By dividing a network into separate segments, organisations can limit the spread of a cyberattack within their network. This can prevent an attack on one part of the network from affecting the entire system. Network segmentation also makes it easier to monitor and control the flow of data within the network, further enhancing security. Regular vulnerability assessments and patch management are also essential. Vulnerability assessments involve identifying and evaluating potential security weaknesses in the system, while patch management involves regularly updating and patching software to fix these vulnerabilities. These measures can help organisations stay ahead of cybercriminals and reduce the risk of exploitation. EU’s NIS2 Directive EU’s NIS2 Directive came into effect, and member states have until October 2024 to put it into law The transportation sector must also be prepared for greater legislative responsibility in the near future. The EU’s NIS2 Directive recently came into effect, and member states have until October 2024 to put it into law. The Directive aims to increase the overall level of cyber preparedness by mandating capabilities such as Computer Security Incident Response Teams (CSIRTs). Transport is among the sectors labelled as essential by the bill, meaning it will face a high level of scrutiny. Getting to grips with the complexities of XIoT and OT integration will be essential for organisations to achieve compliance and avoid fines. Global transportation infrastructure Finally, organisations must prepare for the inevitable breaches that will occur. This involves developing an incident response plan that outlines the steps to be taken in the event of a breach. It also involves regularly testing and updating this plan to ensure its effectiveness. A well-prepared organisation can respond quickly and effectively to a breach, minimising its impact and ensuring a quick recovery. In conclusion, mastering transportation cybersecurity requires a comprehensive, proactive approach. It involves implementing robust technical measures, fostering a culture of cybersecurity awareness, and preparing for the inevitable breaches that will occur. By taking these steps, organisations can enhance their cyber resilience, protect their critical operations, and ensure the security of our global transportation infrastructure.
Open platform video technology software is more than just a product; it's a tool that helps customers achieve their desired business outcomes. Safety, round-the-clock security, and increased operational efficiencies are now the norm due to video technology. Responsible Technology Despite humanity’s impressive technological advances, we also recognise the immense responsibility that comes with technological innovation. It's not enough to focus solely on the positive impact video technology can make, we must also be vigilant in identifying and addressing any potential negative consequences it can have on society and its citizens. This is the role of Responsible Technology. Data privacy We want to use all the good things that technology innovation brings, whether it be video, AI, ML, facial recognition, etc. We want to use all the good things that technology innovation brings, whether it be video, Artificial Intelligence, machine learning, facial recognition, etc. to serve people in societies in a responsible way. That means making sure that we regulate technology in a way that respects human rights and data privacy. Addressing the challenges The challenge is, that rather often technology leaders and policymakers either have conflicting interests or collaborate too late. To be responsible, business leaders must support their societies and policymakers in making regulations in the interest of the common good. At Milestone Systems, we are actively looking at how we develop our software responsibly, how our partners responsibly sell our software, and very importantly, how our customers use our software with a responsible mindset. Ensuring good corporate governance As a long-time partner within the security industry, we’re celebrating our 25th Anniversary this year, we are supporting the regulation of video technology for the good of society. However, it of course needs to strike the fine line between the right legislation and not hindering innovation. UNGP The UNGP is the most authoritative and widely adopted set of principles for responsible business At Milestone Systems, we want to play an active role in this and that is why we have pledged our support to the UN's Guiding Principles on Business and Human Rights (UNGP). The UNGP is the most authoritative and widely adopted set of principles for responsible business. The principles call on governments and companies to identify, prevent, mitigate, and remedy actual and potential human rights abuses. Since its launch in 2011, the UNGPs have received wide support from states, civil society organisations, and the private sector, making them the key global foundation for business and human rights. Protect, respect, and remedy Through this commitment, we are taking steps to ensure good corporate governance and ethical standards in the development of our technology. We're generating mechanisms to prevent misuse and we are building educational practices internally. Based on the UNGP’s three pillars: protect, respect, and remedy, we are developing a set of Responsible Technology Principles and procedures for the development, selling, and use of our products. Need for video technology regulation In addition, we are currently evaluating all the various technology areas in which our video software can be used, such as with third-party integrations that utilise e.g., facial recognition. We are mapping out the advantages and disadvantages for societies. One key area of concern is how local authorities are mapping and storing data about us as individuals. This is the reason why we're inviting more legislation to regulate video technology rather than less. Engaging With policymakers We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard We are proactively reaching out to and connecting with policymakers and other relevant stakeholders to discuss our approach to and take on Responsible Technology and encouraging the political landscape to work with us around regulation and legislation. We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard and where we can openly weigh the advantages and the challenges of technology, whether it is video, facial recognition, machine learning, Artificial Intelligence, or other technologies. Striking a balance Implementing Responsible Technology is a journey, not a destination. To give it the focus needed, we have created a dedicated team to implement this initiative at Milestone Systems. At the same time, we are reaching out to the political landscape to discuss how we balance regulation without hindering innovation. Video technology used ethically We are a global company with worldwide operations, and we are having dialogues about how video technology is being used and how we can have meaningful talks about what regulation and legislation should look like. However, we don’t necessarily want to limit access to the technology itself. Facial recognition We encourage the policymakers to engage with us in the industry so that together we can strike the fine line Facial recognition is a great example of this. The EU is considering making live facial recognition illegal. That would be a huge inhibitor of proactive terrorism prevention. For example, if a well-known terrorist is walking down the street and is being mapped out against Interpol’s most wanted list, the authorities should be able to react. However, if a person walking down the street but is not mapped out or does not have any priors then the city should not be allowed to store the data of that individual’s whereabouts at that point in time. This potential legislation is concerning to me as a citizen of Europe. Instead, we encourage the policymakers to engage with us in the industry so that together we can strike the fine line for the better good of all of us. Maintaining high ethical standards We have a firm understanding and expectation that ethical standards are a huge driver in the security business. Citizens are not in favour of technology companies abusing data about them and monetising from things that they have not opted in to do. Soon, I think we will see many more companies and governments leaning toward suppliers that do have a responsible mindset and high ethical standards for partnerships. Ethical practices Our journey toward Responsible Technology is an ongoing process, and we must remain steadfast in our commitment to ethical practices and the protection of human rights. We recognise that the rapidly changing technological landscape continually presents new challenges and opportunities. For this reason, we continuously look into how we can improve, for example, our end user licence agreements to avoid potential human rights abuses. An industry responsibility Security companies must prioritise careful planning and preparation, including developing policies and procedures For Responsible Technology to truly become a reality, compliance with international human rights laws and data privacy regulations is critical. Security companies must prioritise careful planning and preparation, including developing policies and procedures that govern the ethical use of video surveillance systems. The secure and ethical community In today's technology environment where deep integrations, machine learning, and artificial intelligence are becoming the norm, Responsible Technology is more relevant than ever. The security industry has a unique opportunity to set an example for other sectors by promoting a secure and ethical development community that prioritises Responsible Technology, trustworthy data collection, and the protection of human rights. We must all rise to this challenge and embrace our role as ethical leaders for the greater good of both people and societies.
The term ‘marine’ comes from the Latin mare, meaning sea or ocean, and marine habitats can be divided into two categories: coastal and open ocean. Video surveillance (VS) applications can cover both types of marine environment with system for ships, maritime ports, onshore and offshore installations, etc. We should want to further analyse VS for ships and try to explain the types of ships on which it can be used, the ways in which VS can be used on ships, the typical certifications in use and what features a camera station must have to be installed on a ship. Starting with ships that have a minimum tonnage, around the world we have: liquefied natural gas (LNG) tankers, passengers ships, chemical tankers, crude oil tankers, container ships, general cargo ships and bulk carriers.As the LNG market grows rapidly, the fleet of LNG carriers continues to experience tremendous growth, offering more opportunities for VS Video surveillance for all marine vessels An LNG carrier is a tank ship designed for transporting liquefied natural gas. As the LNG market grows rapidly, the fleet of LNG carriers continues to experience tremendous growth. A passenger ship is a merchant ship whose primary function is to carry passengers by sea. This category does not include cargo vessels which have accommodation for a limited number of passengers, but rather includes the likes of ferries, yachts, ocean liners and cruise ships. A chemical tanker is a type of tank ship designed to transport chemicals in bulk. These ships can also carry other types of sensitive cargo which require a high standard of tank cleaning, such as palm oil, vegetable oils, tallow, caustic soda and methanol. An oil tanker, also known as a petroleum tanker, is a merchant ship designed for the bulk transport of oil. There are two basic types of oil tankers: crude tankers and product tankers. Crude tankers move large quantities of unrefined crude oil from its point of extraction to refineries. Product tankers, generally much smaller, are designed to move refined products from refineries to points near consuming markets. Container ships are cargo ships that carry their entire load in truck-size intermodal containers: a technique called containerisation. They are a common means of commercial intermodal freight transport and now carry most seagoing non-bulk cargo. Today, about 90% of non-bulk cargo worldwide is transported by container. A cargo ship or freighter ship is any sort of ship or vessel that carries cargo, goods and materials from one port to another. Cargo ships are specially designed for the task, often being equipped with cranes and other mechanisms to load and unload, and come in all sizes. Bulk carriers make up 15%–17% of the world's merchant ships and they are specially designed to transport unpackaged bulk cargo such as grains, coal, ore and cement in its cargo holds. For all these ships the protection of vessels, cargo and crew is a priority, that’s why the adoption of VS technology plays a key part in terms of security and safety. Human error is regularly named as a major factor in ship accidents, and one way to avoid it is to aid seafarers by providing them with technology and equipment that is reliable and easy to use in all weather and sea conditions. Marine VS encompasses liquefied natural gas (LNG) tankers, passengers ships, chemical tankers, crude oil tankers, container ships, general cargo ships and bulk carriers Emergency security solutions on ship One of the most important applications for camera stations is during “docking”. Mooring is the securing or confining of a vessel in a particular location with a fixed or a floating object (jetty, pier, ship, barge, buoy, etc.) as various cargo operations are carried out. Docking is the final stage of mooring operations when the ship docks to the jetty. This is a very delicate operation and cameras are very helpful in making sure docking is done without accidents.'Man overboard’ is an emergency in which a person has fallen off a boat or ship into the water, and can happen at any time during the day or night Another important application for camera stations is the Man Overboard detection system (MOB). ‘Man overboard’ is an emergency in which a person has fallen off a boat or ship into the water. Man overboard events can happen at any time during the day or night, in all types of weather and sea conditions, and from almost any location on the ship, ranging from a few tens of feet above the water, to over 180 feet. When these events occur, the immediate availability of important data is crucial. Accurate confirmation of the event including time of occurrence, location on the ship and location in the sea is critical. A proactive detection system must immediately and accurately detect man overboard events and provide prompt, actionable data to response personnel. A typical man overboard detection system can report a MOB event in under 1 second. VS on a vessel can also monitor the engine room at all times and provide a good view of people working on dock, machinery and stowed equipment. But what are the most important features that a camera station must have to work in one of the most aggressive environments in nature? Marine surveillance must operate in one of the most harsh environments in nature Ruggedised reliability in surveillance First of all, and perhaps it’s obvious, but it’s extremely important to have camera stations with amazing reliability. Housing units manufactured from AISI 316L stainless steel, passivated and electropolished, makes the cameras completely impervious to air, water, rusting and corrosion, therefore offering excellent weather protection and increased reliability. Housing units manufactured from AISI 316L stainless steel, passivated and electropolished, makes the cameras completely impervious to air, water, rusting and corrosion Sometimes ships also use cameras constructed entirely from technopolymer, which guarantees high impact resistance and superior protection from external weather agents. Keeping the camera glass clean at all times is another essential feature, and it can be done via a wiper/wash system that greatly reduces the need for maintenance. In the case of PTZ cameras, the best option would be a great pan and tilt speed (up to 100°/s). What is the operative temperature range for the cameras? Sea is everywhere and therefore ships go everywhere, from the Arctic Ocean to the Mediterranean, so we need cameras that have to be fully operational across a wide temperature range. -40°C to +65°C covers almost all areas. Analogue or IP Cameras? Actually, both options can be used, especially for applications like docking where it’s important to avoid image delay (as can happen with IP cameras due to the natural latency of data communication over a network). Marine certifications Last but not least, the certifications: Certifications guarantee the quality and reliability of camera stations. There is no compromise! One important certification is the Lloyd’s Register Type Approval which subjects cameras to rigorous testing for performance, vibration (critical on ships), humidity, etc. The application field of the LR Type Approval is VS in public places (e.g. passenger ships), open decks, enclosed spaces that are subjected to heat generated from other equipment, and technical premises. Often, VS cameras used in specific areas of ships, such as hazardous areas, are required to have ATEX and IECEX certifications.
Case studies
Teledyne FLIR Defense, part of Teledyne Technologies Incorporated announced that it has been awarded a $48.7 million firm-fixed-price, indefinite-delivery/indefinite-quantity contract to provide Maritime Forward Looking Infrared (MARFLIR) II sensors as well as multiple variants of its SeaFLIR® 280-HD surveillance systems for use by the United States Coast Guard (USCG). SeaFLIR 280-HD imaging system The Teledyne FLIR SeaFLIR 280-HD is a high-performance Electro-Optical/Infrared (EO/IR) imaging system with advanced features essential for long-range detection, identification, tracking, and threat assessment. The procured systems will be incorporated into new Coast Guard Cutters and used as sensor upgrades for existing Cutters with legacy technology. The USCG relies heavily on these surveillance systems when conducting a wide range of missions, including port and waterway security, drug interdiction, search and rescue, and enforcing domestic and international fisheries laws. The Naval Surface Warfare Center, Crane Division, is the government contracting and support activity for the programme. Enhanced capabilities The USCG continues to grow in number to save lives, and they depend on the most advanced imaging technology" “The U.S. Coast Guard’s mission areas continue to grow in number and importance to save lives, and in turn, they depend on the most advanced imaging technology to be successful,” said Dr. JihFen Lei, Executive Vice President and General Manager of Teledyne FLIR Defense, adding “We’re honoured to continue our relationship with the Coast Guard and Navy in providing the upgraded SeaFLIR 280 with its many enhanced capabilities.” Day-night surveillance Designed for 24/7/365 maritime duty, the rugged SeaFLIR 280-HD is ready for any mission scenario in any weather, day or night. Using an internal navigation system, the SeaFLIR 280 can determine and disseminate target location coordinates, or slew other systems to objects identified by its imagers. The system provides high-clarity IR with 20x optical zoom to aid search and rescue at maximum ranges, while HD daylight/lowlight cameras provide extra visible detail to reduce operator workload and speed critical decisions. Work will be performed at Teledyne FLIR’s facility in Billerica, Mass., and is expected to be completed by March 2027.
The GMB was founded in 1982 under the Gujarat Maritime Board Act, 1981. Gujarat Maritime Board (GMB) is a government agency of the Government of Gujarat, a state of India. It controls, manages, and operates a total of 44 minor ports in Gujarat including some with private companies and 10 offices. From 3% of the total national port traffic handled by minor ports of Gujarat in 1982-83, they grew to handle 31% of total national port traffic in 2016-17. They also handle 71.3% of all minor port traffic in India. In 2018-19, minor ports of Gujarat handled a total of 542 MMT of cargo. They are one of the fastest-growing Gujarat government marine agencies. Challenges As a rapidly and constantly sprouting Gujarat government marine agency, the GMB decided to develop a new corporate space at the Gandhinagar Gift City. On account of the same, they required a strong communication architecture to be installed that fulfills all the needs of a modern corporate enterprise. They required a solution that gives them a single platform unification of numerous business essentials. Their prime demands from the proposed solution can be summed up as: Corporate-grade Professional Communication Hassle-free Workow Management Single Box Solution for Multiple Networks Smooth Communication without Wired Connectivity Secure Business Connectivity Unified Services for Better Collaboration Solution: IP-based UC platform The solution was designed to be well-equipped to manage all business communications from one place Matrix studied the challenges in-depth and crafted a custom solution by proposing an IP-based UC platform along with IP extensions and gateways. The solution was designed to be well-equipped to manage all business communications from one place. The PRASAR UCS added in the solution suffices the much-needed - Collaboration, Communication, Messaging, and Mobility for any corporate space. Unifying all the communication networks and devices allows users to access the calls, messaging, and voicemails from any of the devices irrespective of their location. IP extensions Matrix also kept in mind the modern enterprises’ search for solutions that are future-proof, long-lasting, and hybrid in certain areas that give them a comprehensive solution. They prefer a system that is cost-effective on multiple fronts. This led the solution to be further developed with the addition of gateways, both VoIP and PRI. Finally, the solution was fully proofed by deploying two different-leveled IP extensions as required. The IP extensions were picked with a crisp vision of balancing user convenience and advanced call management. Results Matrix successfully understood their communication requirements and deployed an apt IP solution that exactly t their needs. This helped the GMB by facilitating the following communication features: A modern IP solution that is advanced as well as pocket friendly Next-generation communication technology for a future-proof investment Redefined call management with 100+ business calling features Unified communication on a single universal platform Workspace collaborations for less time wastage and more productivity Enhanced ease of management with web-based UI 24x7 emergency-ready corporate connectivity Increased employee responsiveness for more efficiency Access to new-age multi-location/remote communication mobility Robust and least-maintenance hardware architecture Minimum-downtime software for consistent communication Products and solutions offered 1) PRASAR UCS hosted on SPARK200 With IP-at-core, PRASAR forms the basis of a Voice over IP solution for modern-day business enterprises This Matrix IP-based Unified Communication Server is a combination of hardware, SPARK200, and software PRASAR UCS. With IP-at-core, PRASAR forms the basis of a Voice over IP solution for modern-day business enterprises that connects internal and external decision-makers at multiple locations for effective communication and real-time collaboration, while making the most of the existing telecom infrastructure. Single service for various communication mediums It is a platform that enables modern enterprises to use a single service for various mediums for communication like SMS, E-mail, Voice-mail, Instant messaging, Presence sharing, Audio-Video calling, and Audio-Video conferencing. It provides high-speed and HD quality audio-video collaboration with multiple units established over various geographies to accelerate organisational growth by bringing employees together anytime, anywhere, and catering smooth reachability to the target business audience. 2) MATRIX Series of IP Extensions SPARSH Series of IP Extensions provides High-Quality Speakerphone, Programmable features, and DSS Keys SPARSH Series of IP Extensions are elegantly designed to offer reliable performance, quality of business communication, and efficient call management. It provides High-Quality Speakerphone, Programmable features and DSS Keys, Corporate Directory, Message Wait Lamp, Voice Mail, and an Intuitive User Interface. SPARSH VP510E This premium business IP phone sets the benchmark for quality performance with its elegant design and crystal-clear voice. SPARSH VP510E features a vivid LCD Graphical Display, Context-Sensitive Keys, Direct Station Selection (DSS) keys, 32 Keys Expansion Module, Headset Connectivity, High-Quality Full Duplex Speakerphone, and High-Definition Audio Quality. SPARSH VP210 This entry-level Gigabit IP Phone SPARSH VP210 redefines the desktop telephony experience and quality of business communications. SPARSH VP210 provides features and functions normally available in high-end such as 128x64 pixel, graphical backlight LCD, 5-line display, context-sensitive keys, Full-duplex Speakerphone, Integrated PoE, Gigabit Ethernet, and a broad array of Call Management Features. SPARSH VP210 finds its applications in call centres, enterprises, small businesses, branch offices, and government sectors. 3) MATRIX Range of Gateways: Matrix Media Gateways can be used with any existing PBX without changing their existing telephony infrastructure The future of business connectivity is encapsulated in this next-gen solution range - Matrix Media Gateways. This advanced network bridging solution offers interfaces for multiple networks. It can be used with any existing PBX without changing their existing telephony infrastructure or in a standalone mode too. It works as an adjunct and supports flexible routing options, providing significant cost savings and round-the-clock connectivity. SETU VTEP The SETU VTEP Multiport VoIP-PRI gateway supports PRI protocol and adopts standard T1/E1 trunk interface and provides a smooth transition by enabling direct routing of calls between the fixed-line ISDN and the cost-effective IP networks for capitalising on low-cost VoIP telephony. By integrating a VoIP-PRI gateway with existing PBX telephone systems, businesses of all sizes can benefit from low-cost voice-over IP calls and achieve substantial cost savings without the high upfront costs associated with communications infrastructure changes related to the migration to VoIP. SETU VFX SETU VFX series is a range of multi-channel VOIP - FXO and FXS Gateways. VFX series offer 4-8-16-32 FXO/FXS Gateways to connect TDM-based telephony infrastructure to an IP network. For organisations that have already migrated to IP, SETU VoIP Gateways provides a POTS trunking option. Ideal for legacy TDM phone systems, these Gateways offer access to new generation VOIP and the benefits of low-cost long-distance calls.
Many businesses know this problem. Securing dispersed sites poses specific problems for facility managers. Cylinder replacements when a key goes missing often involve travel and high expense. Any alternative access control system which relies on electricity can be hard or impossible to use in remote locations. Battery-free, wireless electronic locks, managed remotely via cloud software, help meet these challenges. Access control challenge Näsijärvi Sailing Club in Finland has multiple bases all over Lake Näsijärvi, some located up to 2 hours’ sail from each other. Many mechanical “skipper keys” were in circulation, which allowed club members to unlock and use these facilities. However, keyholder registers and many traditional mechanical keys’ whereabouts were no longer up to date. This presented a security challenge that neither mechanical security nor traditional access control could solve. The sailing club was seeking a solution to increase their security and at the same time save effort and costs. Solution: Digital key Sailing Club needed wire-free locking devices suited to the club’s remote locations For a new, more efficient solution, the Sailing Club sought a programmable digital key system to help them regain control over facilities’ security. They needed wire-free locking devices suited to the club’s remote locations, with power provided by the user key. To manage everything, they required software that enables system management tasks to be completed from anywhere: a system that makes it easy to remove access rights from any missing keys and audit trail capabilities, so security administrators can check access logs if an issue arises. More control with programmable smart keys Näsijärvi Sailing Club chose the PULSE key-operated access control solution from ASSA ABLOYs group brand ABLOY to secure their premises and manage access for club members. Around 55 PULSE cylinders have been deployed across various Sailing Club locations. Authorised members also carry an individual key that opens all their permitted PULSE locks around the lake. Why is PULSE the best fit for clubs with remote sites? PULSE locks are ideally suited to an environment like Lake Näsijärvi, where access points are scattered. They generate all the electricity they need to power lock electronics from the key thrust. This innovative energy harvesting technology means neither cabling nor batteries are needed, which saves running and maintenance costs for the Sailing Club. The PULSE cylinder range includes door locks, cam-locks, furniture locks, and padlocks The PULSE cylinder range includes door locks, cam-locks, furniture locks, and padlocks, which can operate outdoors in the harshest climates. Almost any cylinder can be switched for a PULSE device and connected without wires or drilling. Advantage Another advantage is that a PULSE system is so easy to manage. The club administers it for themselves, saving them additional management costs. Secure facilities may be hours away by boat: PULSE saves wasted journeys. “The PULSE system allows keys to be updated and disabled at any time via readers and the cloud service,” says Ari Karjalainen, CEO of Ajan Lukko Lock and a member of Näsijärvi Sailing Club. Incidents are easy to investigate by consulting key or lock audit trails: “In cases of vandalism, the access register can be used to check whose key has been used to visit the premises and when,” adds Ari Karjalainen.
ACRE International's SPC protects the museum, which promotes information on maritime subjects comprehensively and interactively by employing multimedia techniques. Intrusion detection SPC is ACRE International's flagship intrusion detection product. It helps protect the museum's main attractions, such as their permanent interactive room called "People-Ships-Ports." Another exhibition, "Boats of People of the World," is a rich collection of boats varying from an Eskimo kayak to a Venetian gondola. The MCC also organises temporary exhibitions on popular maritime topics. Challenge Management also requested an intrusion system that could integrate with access control solutions Covering a large building, the museum required an alarm system that could sufficiently monitor more than 400 alarm zones, 55 areas, and 25 doors. Management also requested an intrusion system that could integrate with access control solutions, a feature that SPC met. Solution: Wireless security system Michał Drobczyński works at the Maritime Culture Center in Gdansk and says of SPC's protection, "Due to installing ACRE Internationa's SPC system, the museum is safe. The system meets our expectations in the field of security." "Thanks to their wireless equipment (receivers and detectors), we can protect the exhibits in the temporary exhibition. ACRE International turned out to be a beneficial company in installing and programming the security system in the museum building."Overall, the museum is protected by SPC6300 with 38 input expanders (SPCE652), 18 2-door expanders (SPCA210), 13 keypads (SPCK420), and 5 RF-expanders (SPCW130).
Australian company High Frequency designed a “self-service” linen portal for a commercial laundry servicing the thriving short-stay accommodation market. Called the “Mobile Linen Hub”, this modified shipping container provides access to linen for users 24/7. After taking the linen they need, the cost is then added to their account as they exit the hub. Access control with Wiegand 125 kHz reader High Frequency’s initial prototype used a standard Wiegand 125 kHz reader to control access. Each customer’s card, upon scanning, granted entry to the Mobile Linen Hub while activating UHF readers inside. However, the prototype encountered several problems with its 125 kHz Wiegand readers. The readers’ lack of security allowed cards to be copied, and their lack of data storage prevented them from displaying why a card had been declined, for example. Reasons for denied entry Ultimately, the inflexibility of a 125 kHz reader led to confusion and a lot of support calls Customers only heard a ‘denial’ buzz and saw a red light. Meanwhile, there were multiple reasons a customer could be denied entry. Their card could be invalid, their account could be suspended from non-payment, or simply, someone else could be using the Mobile Linen Hub. Ultimately, the inflexibility of a 125 kHz reader led to confusion and a lot of support calls. MIFARE DESFire reader High Frequency solved the problem by switching to Idesco’s 8 CD 2.0 D Pin RFID display readers. “A highly secure MIFARE DESFire reader, 8 CD 2.0 D Pin instantly solved our card cloning issue, with zero impact on our solution since Idesco handles both our card encoding and reader programming," notes Isaac Hayes, High Frequency. “Our new system deployed a single Idesco reader on both sides of our Mobile Linen Hub, connected to an RS485/Ethernet converter, with our bespoke software communicating with them across OSDP," Isaac continues. Display reader solution High Frequency discovered that the OSDP standard made displaying private messages in an RFID reader possible This new display reader solution has greatly decreased support call frequency while increasing the product’s usability. Confusion surrounding denied access was also solved, with the reader displaying messages on its screen for users, such as “Access Granted”, “Access Denied, Account on Hold” and “Portal Busy, please wait before entering”. While looking for a new solution for their system, High Frequency discovered that the OSDP standard made displaying private messages in an RFID reader possible. “During my research, it became apparent that Idesco was the only reputable company with a colour display, OSDP-compatible reader”, Isaac Hayes recalls. Mobile access solutions enhancing security “Idesco 8 CD 2.0 D Pin reader is now an integral part of Mobile Linen Hub’s design, and will be included in all manufactured models for the foreseeable future," he reports. Idesco Oy is a pioneer of RFID technology, with more than 30 years of experience. Idesco RFID readers and transponders, mobile access solutions, controllers, and touch screen devices. Its products collect data and enhance security in several access control, vehicle identification, and logistics settings around the world. High Frequency specialises in helping commercial laundries around the world implement RFID in a way that provides value to their business.
As drones are becoming commercially available to a wider audience, effective drone detection and monitoring have become increasingly important, especially for critical infrastructures and sites, such as power plants, utility centres, and airports. However, effective and accurate drone detection is challenging. In contrast to land-based monitoring and detection, aerial detection has a much wider, dome-shaped area to cover, with no real reference points. In addition, current drones are fast and small, and they can demonstrate erratic flying behaviour. Visual detection systems have an additional challenge, in that they need to detect objects in variable sky and weather conditions. Drone detection for critical infrastructures Teledyne FLIR recently provided a robust drone detection system for a Swedish critical infrastructure customer. The project completed in early 2022 was also made possible by Teledyne FLIR’s longtime distributor and integration partner CCTV-Systems AB, a company that has been in the video surveillance systems business since 1982. Just like Teledyne FLIR, CCTV-Systems AB has vast experience in providing threat detection systems for industrial and security sectors all over the world. Slew-to-cue feature The system detects the drones from a long distance and automatically points the FLIR PTZ camera to the exact position Teledyne FLIR offered an integrated drone detection system based on radar and a combination of thermal and visible sensors. The system uses a so-called slew-to-cue feature, where a radar will continuously scan the sky, detect the drones from a long distance and automatically point the FLIR PTZ camera to the exact position of the detected drone, whereupon the camera will continue to track the moving object using its pan/tilt mechanism. An integrated drone detection system “Today, Teledyne FLIR is the only company that can provide a total, integrated solution for this application,” says Johan Eklund, Managing Director at CCTV-Systems AB. “The company’s radar, dual thermal and visible PTZ system, and software platform are all seamlessly integrated to provide a high-performance surveillance system. And what’s more, all of the system’s components have been thoroughly tested and proven in the field.” Technical expertise “We are very fortunate to have such a dedicated and skillful partner in CCTV Systems AB,” says William Turner, Northern European Sales Manager at Teledyne FLIR. “To satisfy the complex requirements of a demanding client, this project cut new ground and called for high levels of technical expertise and customer commitment from Johan and his team.” FLIR Ranger R8SS-3D radar R8SS-3D provides hemispherical detection and can monitor the coverage area four times per second The system includes the FLIR Ranger R8SS-3D radar, which can detect objects within a three-kilometer range and track up to 500 drone targets simultaneously, while effectively filtering bird detections. The R8SS-3D provides complete hemispherical detection and can monitor the coverage area four times per second, run 24/7, and detect all ground and aerial threats in virtually any climate, day and night. Software surveillance system Radar detections are continuously tracked with the FLIR Ranger HDC MR, a high-definition mid-range surveillance system that uses thermal imaging technology to detect threats, even in conditions where visibility is poor, at night, or in degraded weather conditions, such as fog, rain, and clouds. Everything the system picks up is monitored through FLIR’s Cameleon software platform. This software enables operators to control the surveillance system and share all detector information with other agencies. Maximum detection accuracy Teledyne FLIR also ensures that the system can operate with maximum uptime with 24/7 situational awareness From the project onset, the end-users minimum requirement was to obtain 100% accurate classification at 500 metres. Teledyne FLIR was able to far exceed this requirement due to thorough tuning and calibration and to the system’s superior optics and high-performance radar capability. Teledyne FLIR also ensures that the system can operate with maximum uptime, not considered a luxury for a critical infrastructure where 24/7 situational awareness is always needed. Minimal maintenance The system makes use of an uncooled thermal sensor, which requires minimal maintenance leading to practically zero downtime. On the other hand, a cooled camera would require periodic replacement of the cooling elements. “This system is an ideal configuration for any critical infrastructure site that wants to keep its airspace free from threats and that needs 24/7 decision-making support,” says Eklund. “The system we installed in Sweden could also be used as a reliable, mid-range drone detection system for airports, refineries, nuclear plants, utilities, and more.”
Round table discussion
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Higher pixel count is better. It’s a basic tenet of the video surveillance market, or at least it is the implication as manufacturers continue to tout their latest products offering ever-higher pixel counts. But the reality is more nuanced, as our Expert Panel Roundtable panelists explain this week. Pixel count shouldn’t be seen as an end unto itself, but rather as a factor in determining what camera is applicable to which application. Pixel count is just one factor of several to consider, and the needs of the application must rule all decisions. We asked this week’s panel: How many megapixels are enough? At what point does additional resolution not matter, or not make economic sense?
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download