Visit us at Secutech India 2018 Date: April 5-7 Booth: # B-1, Hall 1 Venue: Bombay Exhibition Centre, Goregaon-E, Mumbai World Headquarters: 51 Stouts Lane, Monmouth Junction, NJ 08852, United States Phone: +1 732-355-9100, Fax: +1 732-355-9101 Infinova India Pvt Ltd. Office No.A1&A2, 2nd Floor, S.no.14/1/1, Venus Garden, Thite Wasti, Mundawa By Pass Road, Kharadi, Pune- 411014. Maharashtra, India. Landline and Fax: +91-20-6900-0630, Email: Teamindia@infinova.com
From the Editor’s Desk
(102 pages including 6 for cover) Volume II • Issue 11 • June 2018
®
®
ISO 9001-2015 CERTIFIED
Dear Readers, Heartiest Greetings from SecurityLink India! Deployments of CCTV cameras are rising with days, with growing awareness – be they under whopping Smart/ Safe City projects or just for mere individual or community safety. Recently, in a bid to address security concerns and check the lumpen elements that often created nuisance on roads, a group of youths in Bangaon village of Saharsa district in North Bihar has devised a self-financed security system using CCTV cameras. Police were not able to take action against those hooligans as witnesses often turned hostile. In Ahmedabad, CCTV cameras helped authorities catch students copying during Gujrat board exams. The installation of CCTV cameras at Bedia village in Gir-Somnath district has helped people change the perception that the presence of lions is harmful for cattle. The AAP Government in Delhi is planning to install 1.46 lakh CCTV cameras in Delhi schools in six months; and so on and so forth. Safety and security are a fundamental necessity for the socio-economic evolution of a society, and so they have been since the time immemorial. However, it has not been amply responsive till the recent emergence of science and technology based products and solutions. Mass people were ignorant and therefore insensitive towards the need and availability of safety and security solutions. Besides, safety and security were earlier perceived as a subject of the state. But today, the growing cases of diversified crimes have created the requirements for relevant technological developments, and necessitated the mass people to change their minds and consider them as the basic essentials of their living. Education and mass awareness have aided them to understand the urgency. Wide availability, and easy installation and maintenance of various brands of CCTV solutions are attractive incentives for the people to adopt them. The time and the mood of the market are conducive for the industry as well as for the nation. Today the CCTV market in India is growing at an annual rate of nearly 20% that is an encouraging figure. However, how far the installations are able to accomplish their aims is a matter of evaluation. Though CCTV installations are certainly acting as deterrents, crimes are growing day by day, and they often go unnoticed. There are frequent cases when CCTV footage is either not available or available footage is not clear enough to produce substantial evidence when needed, or monitoring of the footage is lacklustre. In a recent case of sexual harassment of a Delhi University student the installation could not produce any footage; few months back a fleet of horse riders successfully rode through Noida Expressway unnoticed, causing lots of difficulties for commuters, even though the way is under consistent surveillance; and etc. These incidents are flaws in the whole system that may be attributed to the lapses caused by negligence, human errors, corruption, or technical inferiority and incompatibility of the equipment installed for a desired objective. As often advised, it is not enough just to install CCTV cameras but to implement all-inclusive integrated solutions along with alert and apt responses of the human elements supervising them. Proper and timely maintenance and frequent auditing of data are prerequisites for the system to realize its goals. This issue of SecurityLink India carries an informative report by FICCI and E&Y on Cybersecurity called ‘Confronting the New-Age Cybercriminal: Disrupting the Web of Crime,’ besides other interesting updates. We trust you will enjoy studying them. Till next month, stay safe and happy reading!
10
Editor-in-Chief Santosh Pathak Principal Consultant Pritam Singh Mehta SecurityLink India Registered Office H-187/5, First Floor Jeevan Nagar Market, Kilokari (Near Maharani Bagh) New Delhi - 110014 Phone: +91 11 26342237 Telefax: +91 11 42828080 E-mail: editor@securitylinkindia.com Website: www.securitylinkindia.com Admin Vibha Dixit Circulation Sanju Singh Design S. S. Rawat Portal Design & Maintenance Monu Kumar Singh Printed, published and owned by Santosh Pathak and published at H-187/5, First Floor, Jeevan Nagar Market, Kilokari, (Near Maharani Bagh), New Delhi-110014. The editor’s name is Santosh Pathak. Printed at Infinity Advertising Services P. Ltd. Plot No. 171-172, Sector-52 Faridabad (Haryana).
With warm regards,
All Rights reserved. No part of this publication may be reproduced in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written consent of the publisher.
Santosh Pathak Mob: +91 9968172237
(The views expressed in this magazine are those of the authors and do not necessarily reflect those of SecurityLink India.)
National Roundup
June 2018
CONTENTS report Confronting New-Age Cybercriminal
20
NATIONAL ROUNDUP 30 31 32 33 34 35
36
FICCI Cyber Crime Management CAPSI & APDI Delhi Chapter Meet FICCI Smart Policing Awards Gujarat CSITMS Project with Infinova PSAs Concern over RBI Directive • Free Bus Rides for Private Guards in Delhi • CCTNS for Private Guards’ Verification • Matrix Secures AWHO Premises • Honeywell MAxPRO® VMS
37 38 39 40 41 42 43
Hikvision HCSA Program Delta Video Walls at Gift City Axis Felicitates Outstanding Partners Vivotek at Canadian Warplane Heritage Museum Oncam Appoints VP Sales for EMEA & Asia Zicom Uses IoT to Bring Down the Cost • Hikvision Secures Fino Payments Bank • Matrix COSEC DOOR FMX
FEATURE ARTICLES Integrating PoE with Outdoor IP Systems
12
44
Benefits of Convergence of Physical & Cybersecurity
52
E-attendance: BI’s Knock on the Door
46
Implementing Mobile Credentials in Access Control Market
71
New Performance Records for Bolometers
48
Distributed Cybercrime’s Growing Threat to CI
83
Facial Recognition to Prevent Crime & Improve Security
50
4 Ways to Proactively Protect Home
84
SecurityLink India ■ June 2018
National Roundup
SecurityLink India â– June 2018
13
National Roundup
June 2018
CONTENTS Application/ case studies 56 57 59 60 61 62
Airports Soar to Smarter, Safer Airside Operations New Roadmap to Reduce Fire Hazards World’s Largest Cathedral Trusts Vicon Wisenet for Concorde Istanbul Project Delta to Protect Commonwealth Games • Avigilon Reduces Neighborhood Crime • AutonomouStuff Deploys Quantum Solutions
March Solution for Passenger Rail Fleets • ST New Chips for European Utilities • Gemalto Strengthens Trust in Smart Energy Pacom Renews Sponsorship of Spanish Cycling Club Gemalto Automated Border Control in Colombia
63 62 65 66
White paperS Smart Coding Technology
Product showcase
International updates 14
86-97
72-82
SecurityLink India ■ June 2018
68
National Roundup
SecurityLink India â– June 2018
15
MEA Office:
Office#13, 5th floor, Deema Tower, Mirqab, Kuwait Telefax: +965 2247 5678 | Mobile: +965 9000 1133 Email: Sales-ME@infinova.com
India Office:
Office No. A1, A2, 2nd Floor, Sr. No. 14/1/1, Venus Garden, Thite Wasti, Mundawa By Pass Rd, Kharadi, Pune – 411014. Telefax: +91-20-6900-0630 Email: Teamindia@infinova.com
report
Confronting the New-Age Cybercriminal Disrupting the Web of Crime O
ver the last few years, cybercrimes have become more intense, sophisticated, and potentially debilitating for individuals, organizations and nations. Law enforcement agencies are finding it difficult to check and prevent the crimes in the cyber space because the perpetrators are faceless and incur very low cost to execute a cybercrime whereas the cost of prevention is extremely high. Targets have increased exponentially due to the increasing reliance of people on the internet. Cybercrimes which were restricted to computer hacking till some time ago, have diversified into data theft, ransomware, child pornography, attacks on critical information infrastructure (CII) and so on.
Cyber related risks are a global threat of bloodless war. India can work towards giving the world a shield from the threat of cyber warfare Narendra Modi Prime Minister of India
India is becoming increasingly vulnerable to this menace because of rapid digitization and proliferation of mobile data without matching pace of cyber security and cyber hygiene. At present, India is ranked at 3% in terms of cybercrime incidents as per data shared by a leading security vendor, which compiled data of bot-infected systems controlled by cyber criminals in different countries. As per CERT-In, one cybercrime was reported every 10 minutes in India during 2017. These statistics are quite alarming and therefore, merit focused and collective attention from law enforcement agencies (LEAs). 20
SecurityLink India ■ June 2018
Honourable Prime Minister Shri Narendra Modi1
report Honourable Prime Minister Shri Narendra Modi1
Over the last few years, cybercrimes have become more
Figure 1: Top 20 countries impacted by cybercrime Figure 1: Top 20 countries impacted byintense, cybercrime sophisticated and potentially debilitating for individuals, Figure 1: Top 20 countries impacted by cybercrime organizations and nations. Law enforcement is no agencies silver are bullet technology which can identify or predict 1% 2% 2% finding it difficult to check and prevent the crimes in the cyber 2% Taiwan Mexico Argentina 1% 2% which process 2% or technology) 2% space because the perpetrators of these crimeselement are facelessof the system (people,South 1% 2% 2% Taiwan Korea Mexico Argentina Japan and incur very low cost to execute a cybercrime the Austrialia is morewhereas susceptible to cybercrime, though empirically it is Canada South 2% 1% cost of prevention is extremely high. Targets have increased 1% 2% 2% Korea observed that the people are the weakest component of theIsrael Japan exponentially due to the increasing reliance of people on the Austrialia Canada Russia internet. Cybercrimes computer hacking 1% which were restricted cybertoecosystem. 3% 2% till some time ago, have diversified into data theft, ransomware, Israel 19% India 3% nature of the dark web Inherent anonymity and closed child pornography, attacks on Critical Information Infrastructure Others Russia Poland (CII) and so on. has turned it into a safe haven for 3% 3% cyber criminals and their Turkey 19% India 3% India is becoming increasingly vulnerable to thisThe menace because wares. dark web hosts a wide range of illegal online mar3% 23% France Others of rapid digitization and proliferation of mobile data without Poland United States of kets of cyber exploit kits, drugs, 3% counterfeit documents, stomatching pace of cyber security and cyber hygiene. At present, America 3% Italy India is ranked third in terms of cybercrime incidents behind bank account credentials, len credit cards, human trafficking, 4% Turkey Spain the United States and China (see fig 1) as per data shared by 3% 9% opillegal immigration etc. It has thousands of forums which 23% a leading security vendor, which compiled data of bot-infected France 4% China systems controlled in different United States by ofcyber criminalserate in acountries. tightly controlled environment. Crypto-currencies Brazil 3% 5% America Britain Italy are used for transactions so that these transactions cannot be As per CERT-IN, one cybercrime was reported every 10 minutes 6% 4% in India during 2017. These statisticstraced are quite to alarming and Germany individuals or organizations. Spain 9%therefore, merit focused and collective attention from Law Ransomware continues to be a major threat the world Enforcement Agencies (LEA’s). 4% China over. In 2017, WannaCry, Petya, NotPetya etc., caused Brazil Expansion of cyber ecosystem and its impact 5% major disruptions inbethe connected cyber ecosystem of Britain easily exploited by cyber criminals. There is no silver bullet The increase in technology convergence has created an 6% technology which can identify or predictconfirmed which element of the the world. India was also affected. CERT-In extremely complex ICT ecosystem of interdependencies, Germany 2
within and among critical sectors. This leads to an increased number of stakeholders and a larger attack surface which can
Expansion of cyber
impactecosystem and its
system (people, process or technology) is more susceptible to cybercrime, though empirically it is observed that the people are the weakest component of the cyber ecosystem.
Figure 2: Top cybercrimes in 2017 Fig 2: Top cybercrimes in 2017
200K+ Computers in 150 countries were be easily exploited by cyber criminals. There is no silver bullet impact affected by the Wannacry malware technology he which can identify or predict which element of the increase in technology consystem (people, process or technology) is more susceptible to vergence has created an extremecybercrime, though empirically it is observed that the people are ly complex ICT ecosystem of interdeWikileaks published a data trove containing the weakest component of the cyber ecosystem.
125+ machines in 64 countries faced the threat of Petya ransomware
T
Cyber risk researcher discovered a publicly accessible database with personal information for 198M USA voters in 2017
8761 documents stolen from the CIA
pendencies within and among critical sectors. This leads to an increased number of stakeholders and a larger Two days before France’s presidential runoff, attack surface can inbe64easily 125+which machines countries faced thehackers dumped a 9GB trove of leaked emails from the party of Emmanuel Macron of Petya ransomware exploited threat by cyber criminals. There http://www.thehindu.com/news/national/world-facing-bloodless-cyber-war-threat-modi/article7375190.ece
1
https://timesofindia.indiatimes.com/india/one-cybercrime-in-india-every-10-minutes/articleshow/59707605.cms
2
Cyber riskofresearcher a initiatives has brought about aConfronting the new-age he advent Digital Indiadiscovered and Smart City paradigm shift cyber-criminal in publicly accessible database with personal terms of connectivity, services and threats for both urban and rural eco-systems. While information for 198M USA voters in 2017 greater connectivity promises wider deliverables, it also paves the way for the emergence
9
T
of new vulnerabilities. Leading companies in energy, telecommunications, finance, transportation and other sectors are targeted by new-age cyber criminals. The ‘Make in India’ initiative has identified 25 core sectors as part of its effort to give a special thrust. While cyber security is not one of the sectors, it could be embedded in certain sectors like defence manufacturing, electronic systems, and IT & BPM. It is crucial for ‘Make-in-India’ to focus on cyber security as well as promote development of indigenous
odi/article7375190.ece
solutions s/articleshow/59707605.cms
he new-age cyber-criminal
to combat cyber-crime. 9
SecurityLink India ■ June 2018
– Dilip Chenoy Secretary General, FICCI
21
by attackers to deploy a malware forcefully and unknowingly into a victim’s computer to use their hardware for generating report cryptocurrency. It is becoming yet another tool of choice for cyber criminals because it cannot be classically categorized as a crime. Fig 3: Rise in cyber crime3:5 Rise in cyber crime Figure
Figure 4: Rates of cybercrime-as-a-service Account hacking program
US$12.99
Hacked Instagram accounts in bulk
1000-10,000 accounts US$15-US$60
Cybercrimes in the connected world
Cyber crime
2017
2016
Online banking
2,095
1,343
Facebook related
316
151
Email hacking
125
97
Sexual harassment
81
51
Lottery fraud
42
15
Data theft
47
43
Job fraud
49
40
Twitter related
12
4
3,474
2,402
Total cases
below
Botnet: Blow-bot banking Monthly basic rental US$750 | ne reason why cybercrimes are becoming botnet Monthly full Rental US$1200 | Monthly Support US$150
O
more sophisticated, better orchestrated and increasingly ambitious Disdain exploit kit Day US$80, week US$500, is because many of the perpetrators Month US$1400 operate outside the jurisdiction of the victim’s country. As per industry estimates, Stegano exploit kit, Unlimited traffic, day US$2,000 Chrome, Firefox, Internet Unlimited Traffic, month US$15,000 32% of the threat vectors originate from Eastern Europe Explorer, opera, Edge and Russia, and social engineering is the preferred mode of Microsoft office Lite exploit builder US$650 launch for most perpetrators. exploit builder Full version US$1,000 A report indicates that there are four distinct groups WordPress exploit US$100 of cyber-criminals –US$50 traditional gangs, state-sponsored atPassword stealer tackers, ideological hackers Android malware loader US$1,500 and hackers-for-hire. The report also states that Week the entrance of new participants has DDOS attacks long attack US$500-US$1,200 Cybercrime–as-a-service model has led to the emergence of a complex and multi-layered cybercrime economy where overt acts of crime have been replaced by a covert criminal ecosystem where the services and platforms feed off of and support crime– which has become increasingly low-investment, high-yield and a low-risk operation.
Cybercrime is the biggest challenge these days with development and access to technology across the globe. Cyber space is increasingly being used to https://economictimes.indiatimes.com/tech/internet/34-cases-of-wannacry-petya-ransomware-reported-to-cert-in-government/articleshow/59666898.cms radicalize young minds https://www.indiatoday.in/technology/news/story/ashleymadison-hack-could-expose-2.7-lakh-indian-cheaters-283928-2015-07-22 https://timesofindia.indiatimes.com/city/gurgaon/cybercrime-up-most-on-e-banking/articleshow/61634852.cms https://www.malwarebytes.com/pdf/white-papers/Cybercrime_NewMafia.pdf Rajnath Singh https://www.databreachtoday.com/how-much-that-rdp-credential-in-window-a-10590 10 Union Home Minister of India Confronting the new-age cyber-criminal 3 4 5 6 7
37 incidents of WannaCry and Petya attacks in India between May and June last year. Petya caused extensive disruption of services in India. One terminal of JNPT (Jawaharlal Nehru Port), Mumbai had to switch over to manual operations due to this attack. India was the worst affected country in Asia and seventh overall, due to Petya attack. Apart from ransomware, another area of significant concern is theft of personal identifiable information (PII) and financial credentials of individuals. In another incident of cybercrime, criminals stole personal data of over 2.74 lakh Indian users of the Ashley Madison website. Hackers, who stole 300GB of personal information of the users, put it up on sale over the dark web. Also, Cryptojacking is another lucrative method adopted by attackers to deploy a malware forcefully and unknowingly into a victim’s computer to use their hardware for generating crypto-currency. It is becoming yet another tool of choice for cyber criminals because it cannot be classically categorized as a crime. 22
transformed cybercrime from isolated and individualized acts into pervasive, savage practices run by distinct groups of individuals. Outsourcing is also possible for execution of these crimes on the dark web where cybercrime is offered as a service. Cybercrime-as-a-service not only allows malicious actors to leverage other cybercriminals’ resources to conduct attacks but also provides a cheap and easy option to others who are willing to enter the world of cybercrime at a very low entry cost. Netizens have increasingly become more active in leveraging these services, which is driving a surge in activities like illicit drug sale, trafficking of human beings, terrorism, child pornography and other crimes. Illustrative rates of some of the services offered are given next page. Cybercrime-as-a-service model has led to the emergence of a complex and multi-layered cybercrime economy where overt acts of crime have been replaced by a covert criminal ecosystem where the services and platforms feed off, and support crime which has become increasingly low-investment, high-yield and a low-risk operation
SecurityLink India ■ June 2018
report
T
echnological breakthroughs in the cyber landscape over the past few years have caused disruptions of immense magnitude with far reaching implications. On one hand, these have been enablers for good governance, smart policing, better medical care etc., while on the other; there has been a surge in cybercrimes, frauds and data thefts. Frequent criminalization instances of the web has resulted in proliferation of illicit trading of arms and drugs, cyberstalking, cyber-bullying, cyber extortion, child pornography and so on. The protagonists have graduated from being opportunistic individuals to organized criminal groups who offer cybercrime-as-a-service at a minimal cost over the dark net. To confront these new age cyber criminals, a well thought and effective cybercrime A new method of cybercrime has emerged wherein genuine Cyberattacks on energy grids are not a new thing. One such legitimate social media are used to manipulate attack which was reported 2017 by researchers from management strategy needs toandbe devised. Ifplatforms the law enforcement agencies havein January to win opinions of impressionable minds through effective and ESET who identified a new piece of malware that is capable of this battle, there is a need for a paradigm shift in the approach policing. The focus from conventional sustainedto social media campaigns. There is enoughneeds evidence of to shift controlling electricity substation switches and circuit breakers manipulation of the election process in some countries through directly, in some cases literally turning them off and on again. to contemporary methods with the right blend of upskilling thewhich three pillars – people, processes andwhich is being described this and method.upgrading This is an alarming sign has far-reaching They dubbed this malware Industroyer, implications for the future. as the biggest threat after Stuxnet. In-fact, it was used for technology. Predictive policing is needed to disrupt the expanding web of crime. Ukrainian blackout and in other critical sectors of the UK, the US Convergence of cyber and terrorism and the EU. Any can tailor this malware and –well-funded Rahulattacker Rishi Cyber terrorism has been the most discussed topic during the execute a hacking campaign for specific critical infrastructure last few years. Cyber terrorists use the computer and network targets. Government), EY Partner & Leader – Advisory Services (Digital
Figure 4: Rates of cybercrime-as-a-service Account hacking program
US$12.99
Hacked Instagram accounts in bulk
1000-10,000 accounts US$15-US$60
Botnet: Blow-bot banking botnet
Monthly basic rental US$750 Monthly full rental US$1200 Monthly support US$150
Disdain exploit kit
Day US$80, week US$500, Month US$1400
Stegano exploit kit, Chrome, Firefox, Internet Explorer, opera, Edge
Unlimited traffic, day US$2,000 Unlimited Traffic, month US$15,000
Microsoft office exploit builder
Lite exploit builder US$650 Full version US$1,000
WordPress exploit
US$100
Password stealer
US$50
Android malware loader
US$1,500
DDOS attacks
Week long attack US$500-US$1,200
Convergence of cyber and terrorism yber terrorists use computer and network technologies for promotion, communication and coordination to carry out attacks which cause public fear. The intent of conducting nationwide cyber-attacks by jeopardizing critical infrastructure is the latest trend.
Proactive cyber patrolling and monitoring of everything digital, whether it is connected to a public network or otherwise, is the only answer to this complex problem. Technological advances in Artificial intelligence (AI) and its core areas like machine learning (ML) and natural language processing (NLP) may lead to more sophisticated cyberattacks in future. Cyber criminals may even leverage AI and ML powered hacking kits built from tools that are stolen from state-sponsored intelligence agencies9.
Figure 5 gives statistics on motivations behind the attacks based on the type of cybercrime. Figure 5: Motivations behind attacks
Figure 5: Motivations behind attacks
4.70%
4.30%
3.40% 14.20%
14.50% 9.20%
2017
2016
77.40% Cybercrime
A new method of cybercrime has emerged wherein genuine and legitimate social media platforms are used to manipulate opinions of impressionable minds through effective and sustained social media campaigns. There is enough evidence of manipulation of the election process in some countries through this method. This is an alarming sign which has far-reaching implications for the future.
C
technologies for promotion, communication and coordination to carry out attacks which cause public fear. The intent of conducting nationwide cyber-attacks by jeopardizing critical infrastructure (power sector, financial sector, oil, and gas, etc.) is the latest trend. The below figure (v) gives statistics on motivations behind the attacks based on the type of cybercrime8.
Cyber espionage
Hacktivism
72.10% Cyber warfare
Cyberattacks on energy grids are not a new thing. One “Cybercrime the biggest challenge days with in development accessby to technology across the such isattack which wasthese reported Januaryand2017 researchglobe. Cyber space is increasingly being used to radicalize young minds” ers from ESET who identified a new piece of malware that is capable of controlling electricity substation switches and cirHonorable Home Minister, cuit breakers directly, in some cases literallyShri turning Rajnath them Singh off and on again. They dubbed this malware Industroyer, which is being described as the biggest threat after Stuxnet. It was used for Ukrainian blackout and in other critical sectors of Confronting the new-age cyber-criminal the UK, the US and the EU. Any well-funded attacker can tailor this malware and execute a hacking campaign for specific critical infrastructure targets. Proactive cyber patrolling and monitoring of everything digital whether it is connected to a public network or otherwise, are only answer to this complex problem. Technological advances in artificial intelligence (AI) and its core areas like machine learning (ML) and natural language processing (NLP) may lead to more sophisticated cyberattacks in 10
https://www.hackmageddon.com/2018/01/17/2017-cyber-attacks-statistics/ https://www.infosecurity-magazine.com/news-features/cybersecurity-predictions-2018-two/ economictimes.indiatimes.com/articleshow/51364115.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
8 9
10
SecurityLink India ■ June 2018
23
11
report
future. Cyber criminals may even leverage AI and ML powered hacking kits built from tools that are stolen from statesponsored intelligence agencies.
Emerging focus areas for law enforcement agencies
ple, is mass rolled out, trapping a few in the chain. Many of the cybercrimes are either reported after a significant delay or not reported at all due to a fear of social shame, lack of knowledge or understanding of whom or where to report. Thus the crucial evidence is lost which makes the task of law enforcement agencies more difficult.
Technical know-how and skills
R
apid and uncontrolled digitization coupled with inadequate response mechanism allows criminals to unleash cybercrimes through use of sophisticated tools which hide their identity, and tamper, hinder or misdirect investigations. On the other hand, the law-enforcement agencies are still trying to upgrade their technical abilities to match the skills of their adversaries. With the ever evolving threat landscape in the digital space, there is a constant need to upgrade technical proficiency and skills of the officers of LEAs. Whilst most of these officers are well versed in basic cybercrime investigation techniques, very few of them can be called cybercrime specialists. Moreover, domain specialization is not institutionalized which further restricts their capability to monitor and check any form of cybercrime including trading on the dark net, human trafficking, child and women sexual abuse material, digital forensics, cyber frauds etc. Some states have taken initiatives to upgrade their cybercrime investigation capabilities through local software development while others are in the process of procuring tools and systems for this purpose. Few states have also procured forensic tools but lack specialized trainers who can train the law enforcement personnel. Further, there is a big crunch of resources to operate these forensic tools. Thus statewide efforts can only bear fruits if capacity building is uniform across country and training programs are standardized to some extent.
Technological advancements
T
Low cost high impact tools
echnological advancements are making the task of cybercriminals easier. Encryption and steganography are being leveraged by cybercriminals to thwart the LEAs, who are not able to decrypt the information in time to predict and prevent crimes. Criminals use the dark and deep web with impunity to exchange information without risking identification through normal and traditional search engines. The complex encryption mechanism along with anonymization tools used to access and trade over the dark net put forth complex challenges for LEAs who are unable to break into these forums and track the criminals. Migration to VoIP, Volte and other over-the-top (OTT) services like WhatsApp and Viber etc., has made the task of intercepting voice calls extremely complex. These calls can only be intercepted with the active support of the respective service providers. Often, servers are located outside the country that makes it virtually impossible to monitor voice calls of criminals in real time. Tower dump and CDR data can only provide limited information in critical situations like the Mumbai attacks, or in other anti-terrorist operations. Cybercriminals create botnets by injecting malware into unprotected systems and use them to launch DDoS attacks, command and control, spam broadcast, exfiltration, cryptojacking operations etc. Tracking of botnets is a complicated task and may not point to the offender. As cybercriminals have easy access to advanced technologies, the gap between the capabilities of investigating authorities and activities of cybercriminals continues to widen.
C
Territorial jurisdiction
ybercriminals have easy access to low cost or freely available tools that can identify and exploit vulnerabilities in configuration, create phishing links and pages, design forms to steal personal information, voice impersonation tools and use dictionaries to guess passwords. Further, the distribution of these tools is widespread and law enforcement agencies have no or limited control over these. The internet penetration rate of India is growing rapidly. However, a lack of awareness and netiquette makes most of the users easy target for cybercriminals. Phishing, for exam24
I
t is a clichÊ that cyber space knows no boundaries. Conventional policing is geographically bound and thus inadequately equipped to handle crimes in the cyber space. Although, Section 75 in India’s Information Technology Act, 2000 specifies punishment for commission of any offence or contravention by a person outside India irrespective of his nationality, its implementation cannot be ensured due to non-availability of suitable agreements or treaties between countries from where
SecurityLink India â– June 2018
While India’s National Cyber Security Policy (NCSP) published in 2013 set the tone for formulating a comprehensive effort for protection of CII, there is still no clarity with regard to coordination mechanism between organizations such as of NCIIPC, NTRO and CERT-IN, among other agencies mentioned in the policy, specifically with regards to protection of critical Infrastructure14 .
through the internet is not treated as cyber terrorism. These pose major challenges for the law enforcement agencies.
report
Figure 7: Critical infrastructure
Figure 6: Critical infrastructure such criminal acts originate. The physical location of servers and data is another challenge. Even if the perpetrator is identiGovernment Health fied, the process of producing evidence becomes complicated for LEAs. Collaboration and rapid information sharing are Financial Banking required among nations to combat the growing menace of cybercrime. The double criminality or dual criminality principle Critical Strategic & Oil and Gas establishes a dependency on the individual laws of the country Infrastructure Public enterprises that is a required law for extradition in many countries so that Telecom Transport a suspect may be extradited from one country to stand trial for breaking laws of the other country. Nuclear Power & Electricity Every country has its own cyber laws which were enacted keeping its national interest in mind. The requirement of multinational cybercrime conventions is critical to ensure While India’s National Cyber Security Policy (NCSP) that investigation and subsequent prosecution meet legal rigpublished in 2013 sets the tone for formulating a comprehenor needed for bringing cybercriminals to justice. Cybercrime sive effort for protection of CII, there is still no clarity with conventions like the Budapest convention facilitate faster regard to coordination mechanism between organizations investigation and help prosecute cyber criminals within the such as NCIIPC, NTRO and CERT-In, among other agencies member nations – India is unfortunately not a part of this mentioned in the policy, specifically with regards to protecconvention. tion of critical Infrastructure. Cloud storage adds to the complexity as far as terri- http://www.digitalpolicy.org/nciipc-evolving-framework/ https://cis-india.org/internet-governance/blog/indias-national-cyber-security-policy-in-review torial jurisdiction is concerned. Situations wherein some Disrupting the web of crime data lies outside the jurisdiction of a LEA can make eviConfronting the new-age cyber-criminal dence collection and subsequent presentation before the Strategy courts a major challenge. The data retention periods for Figure 8: Cybercrime management strategy Figure 7: Cybercrime management strategy phone and internet logs are inconsistent across countries. Capacity This limits investigation capabilities of law enforcement building agencies e.g., despite the EU directive to retain data for a International period of six months; in Germany, service providers are collaboration Cybercrime supposed to store call data records (CDR) and metadata management Technical for a period of 10 weeks and cell phone location data for augmentation four weeks only. The corresponding figure in respect of Strengthen the legislative framework India is six months. 13 14
Strategy
Sustaining critical infrastructure in wake of cyber terrorism
Awareness
Strengthen institutional framework
I
ndia has made significant investments in establishing the National Critical Information Infrastructure Protection Center (NCIIPC) in accordance with section 70A of Strategy India’s IT (Amendment) Act, 2008. Its aim is to regulate and raise information security awareness among the critiAwareness Technical augmentation Awareness cal sectors of the nation rather than technology intervenost of the cyber frauds occur due oftoinnovative a lackcybercrime of awareOne of the easiest and simplest methods of preventing Evolution techniques and the tions. It started off with only five sectors, thoughcybercrime other is greater awareness. Most of thepoor cyber frauds occur threat amongst landscape hasthe resulted in the need to enhance te ness and cyber hygiene citizens. due to a lack of awareness and poor cyber hygiene amongst the capabilities for law enforcement agencies. A focused ap countries like the US, the UK, the UAE etc., have considBasic canof various reduce the effects of various forms of and prevent citizens. Basic awareness canawareness reduce the effects forms and investigation is required to investigate ered more than ten sectors as critical national infrastrucof fraudulent social engineering significantly. and cybercrimes. ForInnovative law enforcementand agencies, it is impor fraudulent social Innovative engineering significantly. appealing cyber awareness campaigns (with long recall value) make a transition from working in isolation to a collabo ture (CNI), that are essential for society and economy. appealing cyber awareness campaigns (with long their recall val- through techn can help in this regard. As part of public awareness campaign, approach and increase capabilities citizens should be informed about the most recent cybercrime empowerment of their cadre. Such collaboration may b Non-critical systems/ sectors are taken care by CERT-In. ue) can help in this regard.
M
and cyber frauds and means to tackle them. They should be encouraged to report all incidents of cyber frauds, without the fear of being ridiculed harassed. SecurityLink India ■ orJune 2018
private sector or other states who have taken progress in this domain.
25
This would help identify gaps in the technical capabilitie and undertake steps to overcome them. Further, it wou
and undertake steps to overcome them. Further, it would act as an enabler in the long terms for creating in-house advanced technical capabilities, better administration, focused investigation and to shorten the investigation time period. An indicative breakdown of a conventional cybercrime cell can be viewed in Figure (9).
report
Figure 9: Illustrative Organization structure of Cybercrime Wing Figure 8: Illustrative Organization structure of Cybercrime Wing
Cybercrime wing Illegal and explicit content related offenses
Hacking related offenses and white hacker (ethical)
Dark web monitoring and investigation
Data leakage and privacy offences
Digital forensics
Technology usage for traditional crime
http://www.itu.int/ITU-D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf Technical augmentation Laws, rather than guidelines are more needed which are 11
E
volution of innovative cybercrime techniques and inenforceable and deterrent in nature. 17 Confronting the new-age cyber-criminal creasing threat landscape have resulted in the need to Policies need to be rephrased and effective legal frameenhance technical capabilities for law enforcement agenworks need to be put in place as part of the overall strategy to cies. A focused approach and investigation is required to counter cyber offences. The center has to identify and operainvestigate and prevent cybercrimes. For law enforcement tionalize sectoral CERTs to tackle cyber threats in specific agencies, it is important to make a transition from worksectors. The standards on critical infrastructure protection ing in isolation to a collaborative approach and increase (CIP) need a detailed roadmap. their capabilities through technical empowerment of their Certainly, the public and private partnership is crucial cadre. Such collaboration may be with the private sector for sharing cyber security information, but there should be or other states who have taken progressive steps in this an approach to facilitate the coordination between security domain. firms and initiate new campaigns on recommendations towards technology verge.
Capacity building
L
EAs have taken the first step towards capacity building by training officers on cybercrime investigation techniques. It should be taken further by providing focused training in areas like dark web monitoring, network security, cryptography, image processing, ethical hacking, digital forensics etc. Experts for each domain need to be identified and mapped against sub-units of the cyber wing. The skill upgradation should be carried out in smaller cycles to keep in pace with technological progress.
International collaboration
T
o facilitate interaction with national and international agencies, India is to setup its first cybersecurity cluster called as Hyderabad Security Cluster (HSC) similar to the lines on world’s largest cybersecurity cluster – the Hague Security Delta.
Legislation
W
ith the current geopolitical situation prevailing in India, IT laws are required to be strengthened to check the growing crime on the world wide web. India should participate in as many international conventions and mutual legal assistance treaty (MLAT) treaties and increase the number of MoU’s with international agencies. 26
Strengthening the institutional framework
C
enters like ‘Cyber Swachhta Kendra’ are steps towards the right direction in creating a secure cyber ecosystem. But it would need a lot more background work to create a realm of tools that citizens trust and use to protect their sensitive data. Though we have forensic science laboratories (FSL) to conduct digital forensic investigations, the center should also facilitate crime investigation labs focusing on specific domains under cyber security, viz., dark web monitoring, open source intelligence, crime against children and women and other malware attacks. As a first level of defense in cybercrime and cyber security, implementing a security operations center (SOC) with adequate people, process and technology are essential to strengthen the institutional framework. Initiatives taken by the Government of India under the Ministry of Home Affairs formulated two new divisions to thwart cyber fraud and check radicalization, namely, Counter Terrorism and Counter Radicalization (CTCR) Division and Cyber and Information Security (CIS) Division. The objective of CTCR is to devise strategies and prepare action plans for combatting terrorism, whereas CIS has been created for monitoring online crimes and counter threats like online frauds, dark net, hacking, identity theft, etc.
SecurityLink India ■ June 2018
e the TNS) and ndertaken ctioning s. This which n also matic policing. d which .
collection d analytics r criminal. ng, s abases) as e possible
Big data can help in descriptive, diagnostic, predictive and prescriptive analysis, as given in figure (11), thereby giving the LEAs unprecedented advantage over the cyber criminals. Predictive policing can only be achieved through the adoption of a comprehensive and focused approach in this direction.
report
Fig 11: Cybercrime data modelling techniques Figure 10: Cybercrime
data modelling techniques
Big data modelling techniques to tackle cybercrime
With the proliferation of digitization, many Predictive projects like the Crime and Criminal Tracking Analyze current and historical facts to forecast about future or otherwise unknown crimes Network and System (CCTNS) and Integrated Criminal Justice System (ICJS) have been unDescriptive dertaken by the police forces to bring transparAnalyze real-time crimes along with the relationships between factors responsible for them ency in police functioning and to provide a hassle-free environment to the citizens. This brings Diagnostic in multiple databases and software applications Identification of why crime occurred by analysis of the background/history, study signs to identify probable causes which need to be managed by police departPrescriptive ments. Policemen also collect data from sources Using data and analytics to improve policing decisions and therefore the effectiveness of initiatives to prevent criminal actions like CCTV footage and automatic number plate recognition (ANPR) data through routine policCybercrime management ing. Thus, a huge amount of unstructured data is generframework ated which has to be incorporated in the overall response nitially, cybercrime evolved as a threat to individuals and strategy. Confronting today the new-ageit cyber-criminal organizations, however, has started impacting the Big data technologies can be applied to policing for the nations at large. In order to tackle this problem, a synergized collection of data from various sources and apply intelliand holistic framework is required to be developed which gence and analytics on it to gain a richer understanding on must be universally acceptable and implementable in order specific crime or criminal. LEAs can benefit tremendously to counter the threat of cybercrimes and associated risks in by collecting, integrating, analyzing and delivering realcyber space. An illustrative framework [as shown in figure time crime data using this technology. The inputs can be (11)] explains that cybercrime is a shared responsibility of from internal (crime databases) as well as external sources Initially, cybercrime evolved as a threat to individuals and Crime Mapping analytics and Predictive organizations. However, today it has and startedevery impacting the each stakeholder without whose contribution, (like social media). Some of the possible scenarios are deSystem (CMAPS): By leading policethe nations as well. In order to tackle this problem, a synergized and agency holistic framework is required to be developed which must be cyber ecosystem cannot be protected. picted in figure 9. universally acceptable and implementable in order to counter An Indian Law Enforcement Agency has
I
Figure 9: Indicative areas of Figure 10: Indicative areas of big data for analytics big data for analytics
Video survelliance and analysis
Detect and prevent social media misuse
Detect and prevent financial frauds
Big data analytics Cybercrime management
Cyber threat detection and intelligence
the threat of cybercrimes and associated risks in cyber space. An illustrative framework [as shown in figure (12)] explains that cybercrime is a shared responsibility of each and every stakeholder without whose contribution, the cyber ecosystem cannot be protected.
Way ahead
F
implemented an application with free and open source tools called Crime Mapping Analytics and Predictive System (CMAPS). It is integrated with emergency management system like Dial-100, CCTNS (Crime and Criminal Tracking Network and Systems), archived crime data and ISRO satellite image repository to create and visualize cluster maps used for tracking crimes.
requency, sophistication and destructive potential of cybercrimes are increasing at an alarming pace. Traditional methods of cyber security are not adequate to combat these
Figure 11: Cybercrime management framework
Figure 12: Cybercrime management framework
Cybercrime management framework
Criminal/ citizen database integration and analysis
Digital forensic capture and analysis
Industry experts and consultation Academic institutions Regulators ► ► ► ► ►
RBI SEBI TRAI IRDA CERC & others
Product vendors and OEM’s Government organisation
Big data can help in descriptive, diagnos-
and prescriptive analysis, as given in figure (11), thereby giving the LEAs predictive and prescriptive analysis, as edictive policingtic, can only be achieved through the adoption of a comprehensive
given in figure 10, thereby giving the LEAs unprecedented advantage over the cyber criminals. Predictive policing can only be achieved g techniques to tackle cybercrime through the adoption of a comprehensive and focused approach in this direction.
orecast about future or otherwise unknown crimes
19
► ► ► ►
DRDO C-DAC NIC Other autonomous and non-profit bodies
Strategy and planning – National Cyber Security Policy, IT Act2000 amended in 2008
International collaboration ►
Indian Computer Emergency Response Team- CERT-In
Indian Cyber Crime Coordination Centre -I4C
CII National Critical Information Infrastructure Protection Centre - NCIIPC
Law enforcement agencies
Sectoral CERT ► Finance ► Power ► Oil and gas ► Telecom
Cybercrime wing
Guidelines ► ►
NCIIPC
► ►
TRAI
(Central/State Police, CBI, NIA, NTRO, STF etc.)
Technical enhancement ► Cyber Forensic labs ► Training labs ► R&D labs ► Emerging technologies
Banking - RBI, SEBI, IRDA, etc. Others
Illegal and explicit content related offenses Hacking related offenses and white hacker Dark web monitoring & investigation Data leakage and privacy offences Digital Forensics Technology usage for traditional crime
Security Operations Centre - SOC Government entities Private entities
Capacity building
User awareness
Crime reporting portal
Public and private sector employees
SecurityLink India ■ June 2018
Students
Confronting the new-age cyber-criminal
►
► ► ►
Mutual Legal Assistance Treaty MLAT Memorandum of Understanding – MoU International cyber conventions Threat intelligence Capacity building
National collaboration ► ►
►
►
Ministry of External Affairs Ministry of Electronics & Information Technology Ministry of women & child development Other ministries & State governments
Citizens
27
21
report
crimes. So, there is an urgent need to devise mechanisms which are proactive and are able to identify and prevent cybercrimes. Cybercrime management is an effective and credible mechanism to thwart cybercrime. This requires higher focus and commitment with a multi-stakeholder framework, and with an impetus on the following aspects: ●● Strong bilateral agreements (national and international) on cybercrime investigations, information sharing, intelligence, the applicability of international and territorial laws, capacity building, research and development etc. ●● Modular restructuring of cybercrime cells with high tech tools, refining practices and investigation techniques along with human skill enhancement in the areas of digital forensics, dark web monitoring, tackling crime against women and children etc. ●● Strengthening the national core networks and systems with establishment/ enhancements of cybersecurity incidence response team (CSIRT), security operations center (SOC) etc. ●● Developing and refining cybercrime reporting methodologies along with the adoption of emerging technologies like robotics processing & automation (RPA), artificial intelligence (AI) and analytics for smart policing and investigations. ●● Sponsoring nationwide cyber awareness programs for citizens, and central and state government employees. In order to build a credible and strong cybercrime management framework, it is essential to create an empowered state-of-the-art cybercrime coordination center which should be the nodal agency for formulating a national cybercrime strategic plans and policies, and gathering information and interacting with all major stakeholders. It should be able to coordinate activities of all LEAs and other stakeholders to thwart criminal activities by international cyber gangs who infiltrate the critical networks and extricate data. The need of the hour is to develop a framework for solving cyber cases as developed by few countries including China. An Inter-Ministerial Committee on Phone Frauds (IMCPF) has been constituted in the Ministry of Home Affairs in Sep, 2017 comprising MHA, MeitY, Department of Financial Services, Department of Telecommunication (DoT), Reserve Bank of India (RBI) and other law enforcement agencies. This Committee should be mandated to include cybercrimes also as part of its charter because the distinction between phones and computers has virtually disappeared with the proliferation of smart phones. 28
To strengthen the law enforcement against cybercrime, international law enforcement agencies like the EUROPOL have already established a dedicated hub, called the European Cybercrime Centre (EC3). It has made a significant contribution to the fight against cybercrime and has formulated a three-pronged approach or framework. This comprises forensics, strategy and operations. Though EC3 draws on existing law-enforcement, it had set up Joint Cybercrime Action Task Force (JCAT) to work on international cybercrime cases. They also publish the internet organized crime threat assessment report (IOCTA) which gives findings on new developments and emerging threats in cybercrime. The two major concerns considered by law enforcement agencies (like the FBI) in the developed countries are ‘reporting the cybercrime and public awareness.’ By reporting internet crime, victims are not only alerting law enforcement to the activity, but aiding in the overall fight against cybercrime. Digital crime complaints are increased only with the help of announcements and advertisements reiterating the importance of reporting. Encouraging these initiatives on awareness may help the LEAs to mitigate and combat cybercrime. Awareness may also include current or top crimes reported like financial frauds, personal data breach and phishing. Currently, India has MoUs with Bangladesh, Israel, Japan, Russia, Singapore, Spain, Malaysia, US, Uzbekistan, Vietnam and the EU in the fields of cybercrime and cyber fraud. The Indian government should further increase collaboration with other countries in this sphere. This will result in a more coordinated governance on cyber related issues. In addition to this, modernization of the LEAs and capacity building at various levels will allow India to carry out effective and timely cybercrime management at all levels. LEAs have to strive to step up the investigation, leverage provisions of various procedures and agreements, share intelligence and ensure multi-agency collaboration to secure the prosecution of criminals. It will ensure the efforts and resources that are effectively expended in the response to the evolving landscape of crime. Takedowns of websites and forums on the dark web through multinational collaboration have been done in Europe recently. This initiative has to be supported and cooperation to be extended to other nations so that the web of crime is disrupted and prevented from turning into a web of profit for the cyber criminals.
SecurityLink India ■ June 2018
National Roundup
With an unmatched nationwide presence, SIS Group’s Facility Management Companies are geared to make Bharat swachh. Our portfolio of brands provide hard FM, soft FM and pest control services to a diverse set of customers across India. Whether you are looking for an outcome based service model or mechanisation-led facility management, Dusters, ServiceMaster Clean and TerminixSIS are there for you.
Soft Facility Management
Hard Facility Management
Janitorial, Housekeeping, Façade Cleaning, Carpet Cleaning and Kitchen Stewarding.
Servicing HVAC, Plumbing, Electrical, Carpentry, Fire and Safety and Building Automation.
Pest Control General Pest Management, Termite Control, Mosquito Control, Rodent Control and Fumigation.
www.sisindia.com A 5000 crore Indian multinational company
SecurityLink India ■ June 2018
29
National Roundup
Homeland Security – 2018
Cyber Crime Management F
ICCI has recently organprotect itself from the growized a two-day confering menace of cyber-crime ence on Homeland Security through a series of meas2018 on the theme of ‘Cyber ures, which include review Crime Management’ in asof criminal justice system, sociation with Vivekananda greater investment in cyberInternational Foundation. crime management, creation The Conference was inauof indigenous security prodgurated by S. S. Ahluwalia, ucts, laying down extensive the Union Minister of State testing infrastructure, greater for Electronics and IT who contribution in setting secucautioned against indiscreet rity standards at international use of internet as it is fraught fora, legally empowering the with grave threats of cybernational coordinator to deal attacks, thereby depriving the with security issues, and S.S. Ahluwalia, Union Minister of State for Electronics and It inaugurating the session while Sumeet Gupta, Senior Director, HLS, FICCI (L) looks on user of precious data and loss high spending by industry on of privacy. R&D. On the occasion, the Minister also efficiently. He underlined the need for FICCI President, Rashesh Shah, released the FICCI-EY report on ‘Con- government, industry and other stake- while lauding the work being done by fronting the New-Age Cybercriminal: holders to come together to evolve the government to create digital infraDisrupting the Web of Crime.’ standards and guidelines on the use of structure in the country, stressed the National Cyber Security Coor- systems to ward off cyber-attacks and need for a robust mechanism to tackle dinator at National Security Council create internal security systems to suit the menace of cyber-crime. He suggestSecretariat, Gulsan Rai called upon in- the country’s needs. ed proactive cyber patrolling and monidustry professionals to put their heads Dr. Arvind Gupta, Director, Vive- toring of everything digital. together to design a framework and kananda International Foundation & Rahul Rishi, Partner, Advisory Sersystem to test whether the processes in former Deputy National Security Advis- vices, EY, said that to confront the new place were resulting in doing the job er suggested that India would do well to age cyber criminals, a well thought and effective cybercrime management strat Self-regulation and exercise of utmost care in uploading egy needs to be devised. If the law enforcement agencies have to win this batand downloading information from the Net is a must as any tle, there is a need for a paradigm shift indiscretion would lead to involuntarily aiding to the cyber in the approach to policing. The focus criminals in their malicious intent. Training people and creating needs to shift from conventional to conprofessionals trained in ethical hacking will play a major role in temporary methods with the right blend of upskilling, and upgrading the three countering the designs of the cyber criminals pillars – people, processes and technol– S. S. Ahluwalia ogy. Predictive policing is needed to disUnion Minister of State for Electronics and IT, Govt. of India rupt the expanding web of crime. 30
SecurityLink India ■ June 2018
National Roundup
Delhi Chapter Conference C
omdt. H.S. suggested that these Chowdhar y guards can be ex(Retd.), President, empted from bus Delhi Chapter of fares while travelCAPSI & APDI and ling in public transhis team of office port from their resibearers have sucdence to their place cessfully organized a of work and back. CAPSI-APDI Delhi Low cost dwelling (From L to R) Mahesh Sharma, C. Pal Singh, Lt. Gen. B.S. Sandhu (Retd.), Chapter Meet and units can also be Kunwar Vikram Singh, Somnath Bharti & Comdt. H.S. Chowdhary (Retd.) Conference on 19 made available to May 2018 at PHD Chambers of Commerce, New Delhi. The them under the requisite schemes of the government. event was attended by over 80 private security agency ownThe event also saw busiers/ representatives from across the region. The Chairman, ness session presentations folCAPSI & APDI, Kunwar Vikram Singh along with the office lowed by discussions on topics bearers from national headquarters also attended the event. Lt of great concerns for the indusGen B.S. Sandhu (Retd.) graced the event as the Chief Guest try. Anil Puri, Vice President, while Somnath Bharti, MLA, Delhi Assembly was the Guest CAPSI talked on the impact of of Honour. GST on the industry and enuWelcoming the particimerated actions being taken by Somnath Bharti presenting pants, Comdt. Chowdhury the association to provide relief conclusive address outlined the role played by the to the members. He also spoke Delhi Chapter in the overall on the recently formulated code of ethics. Maj Gen K Magrowth of the industry in the jumdar (Retd), CEO, CAPSI highlighted the benefits that can state, and voiced a concern that accrue to the members by getting themselves registered with the present ruling by the ConMinistry of Micro, Small & Medium Enterprises (MSME). trolling Authority that a trainThe Chief Guest, Lt. General Sandhu acknowledged the Anil Puri making his ing center must possess miniexcellent contributions of security guards to the local populapresentation mum one acre of vacant land in tion, and suggested that a common uniform for all guards can order to be recognised by the Authority is discriminatory and be thought of in order to recognize these hardworking persons. needs to be changed. Somnath Bharti, as the representative of Delhi GovernThe Chairman in his address highlighted some of the ment took sincere notes of the concerns raised by the industry major initiatives undertaken under the aegis of CAPSI for and promised members that they will be adequately addressed. the wellbeing of private security industry. He emphasized In his concluding remarks, he lauded the tremendous works that there are over four lakh security guards deployed in the being carried out by Delhi Government for the betterment of state of Delhi, a force much greater in number than the pothe society at large, despite all odds. He stated that the issues lice force of the state, who through their day and night vigil projected during the conference have been well noted and he ensure safety and security of the citizens and infrastructure. would attempt to find solutions to them; and if needed, he will CAPSI is committed to the welfare and wellbeing of these organize a meeting of CAPSI with the Chief Minister of Delhi personnel and in this context is keen to join hands with the so that relevant issues are properly addressed and the security state government to undertake projects for their benefits. He sector as a whole can benefit out of it. SecurityLink India â– June 2018
31
National Roundup
Smart Policing Awards Conferred on State & Central Police Forces
V
ijay Goel, the Minister of State for Parliamentary Affairs and Statistics & Programme Implementation has recently presented FICCI Smart Policing Awards for 2018 in 18 categories to the representatives of the state police forces and central armed police forces. FICCI Smart Policing Awards were instituted in 2016 to recognise and propagate best practices in policing in India. The awards showcase initiatives taken by the police across the country for the safety and security of citizens. The objective is to change the public perception and build a positive and progressive image of the police forces. The awards were given in the categories of Anti-insurgency, Border management, Child safety, Community policing, Crime investigation & prosecution, Cybercrime, Disaster management, Elderly safety, Emergency response, Human trafficking control, Intelligence collection, Maritime security, Road safety & traffic management, Smart police station, Surveillance & monitoring, Training & capacity building, Women’s safety, and other policing initiatives. The jury comprised G. K. Pillai, former Union Home Secretary, Government of India; Ms. Manjari Jaruhar, former Special DG, CISF, Government of India; Jayanto N. Choudhury, former DG, National Security Guard; Alok Bansal, Director, India Foundation; and Dr. Sushma Yadav, Professor of Public Policy 32
It is critical to recognize police personnel and inspire public confidence in the police forces who act as guardians of the society. Awards should be instituted on ‘public confidence’ so that people look up to the police personnel with respect and help them perform their duties more effectively – Vijay Goel Minister of State for Parliamentary Affairs and Statistics & Programme Implementation
& Governance, Indian Institute of Public Administration (IIPA). Mr. Goel, in his opening address said that the awards should inspire the police personnel in the country to emulate the best policing practices exemplified by the awardees and earn the respect of the public. Mr. Goel also released the FICCI Compendium on Best Practices in SMART Policing 2018. SecurityLink India ■ June 2018
The Home Secretary, Rajiv Gauba, called for proper and regular risk assessment of cyber-attacks and underlined the need for preparedness to stay ahead and foil the attempts of the cyber criminals. The readiness to face the growing challenges posed by cyber attackers required sound legal arrangements and state-of-the-art technological capacity which, in turn, needed investment and expertise. He sought cooperation and collaboration of the government, law enforcement agencies, and the private sector in enhancing the capability to stand up to the threats posed by criminals in the cyber space. G. K. Pillai, Advisor, FICCI Committee on Homeland Security said that awards bode well for the morale of the police forces at the grassroot level. “It was important not to be just smart, but also to focus on training and skills development, monitoring of crime and adherence to protocols at every level,” he said. He recognised that a major problem was the criminal justice system that gave rise to delays in trials and conviction, and hoped that the government would pay greater attention to address the issue. Immediate Past President, FICCI Ladies Organisation and Joint Vice-Chairperson, Shri Ram School, Ms. Vasvi Bharat Ram; and Co-Chair of FICCI Homeland Security Committee & Chairman’s Office, Head Special Projects, Reliance Industries Ltd. Rajan Luthra, also shared their perspectives on the subject.
National Roundup
Gujarat CSITMS Project of City Surveillance A
few years back, when Gujarat government decided to deploy CCTV based city surveillance and intelligent traffic management system (CSITMS) across major cities such as Ahmedabad, Vadodara and Gandhinagar, Infinova with successful integration with Larsen & Toubro (L&T) provided a real-time surveillance system that was able to integrate digital maps, video with good quality, and high-quality evidences for challan generation as well as court proceedings. Infinova’s video analytic capabilities included red light violation detection, wrong lane detection, over speed detection, automatic number plate recognition identifying traffic rule offenders, and other criminal activities. It was an initiative taken by the Government of Gujarat for intelligent traffic monitoring and also to bring transparency in the imposition of traffic lines. Infinova’s round-the-clock surveillance system provides real-time information including audio and video to enhance quick response in all emergencies situations and heavy traffic. The integrated system helped prevent crimes, reduce threats, and enhanced safety and security in public area.
Infinova deployed 220 PTZ cameras for accurately monitoring traffic across major cities of Gujarat. The IP based PTZ cameras with in-built remote control provide immediate response to the operators’ commands, making it highly responsive during emergency situations. Infinova’s smart surveillance system assures 360 degree coverage and offers highest precision in day and night. The camera system installed is dynamically efficient and resistant to bad weather conditions. The project has marked significant progress by creating smart surveillance and intelligent traffic management solutions, and generated a spectrum of scalable security solutions by executing large number of cameras over the cities. By providing extensive video management systems, picture intelligence units and geographical information systems, the project has tremendously helped deal with increase in road traffic. The integrated surveillance solutions have reduced traffic congestions by improving incident response time and optimizing traffic flow proactively. Infinova’s multi-faceted traffic management solutions have also helped analyze and even predict traffic patterns by leveraging automated information. Infinova is a leading security and surveillance product manufacturer, acclaimed globally, and is committed to technology, innovation and quality. It manufactures end-to-end analog and digital surveillance solutions and is specialized in offering integrated video surveillance solutions. Infinova has the technical ability and manufacturing flexibility that allows integrators to propose customized solutions. Additionally, it collaborates with other manufacturers of surveillance equipment and software to help the channel partners create turnkey solutions. Infinova backs-up partner’s products to assure integrator’s as well as customer’s trust.
SecurityLink India ■ June 2018
33
National Roundup
Cash Logistics & Private Security Agencies Flag Concerns over RBI Directive CAPSI Files a Writ Petition in Delhi High Court
T
he RBI has recently issued a notification regarding cash-in-transit companies involved in replenishment services of ATMs, cash pickups and drops. As per the notification, only those companies are recognized for these services which have a minimum net worth of INR 100 crore and a fleet of 300 vehicles, among other requirements. The cash logistics private security agencies at large don’t go well with the notification and voice their concerns. As Central Association of Private Security Industry (CAPSI) claims, the RBI decision has shaken more than 65 medium and small companies that are involved in cash logistics, and which do not fall under the criteria, and therefore they would render jobless and have to shut their companies. In this connection, CAPSI has approached Competition Commission of India (CCI) and petitioned to D K Sikri, Chairperson, CCI to take immediate action to stop the directive of RBI which is against the spirit of fair competition and jeopardize the interests of a large section of the industry. CAPSI has also approached MSME as the RBI circular grossly violates the spirit of the MSME act; the decision will result in closing of more than 65 companies. As CAPSI suggests, high ranking officials of MSME assured support to the cause. A delegation of CAPSI comprising Kunwar Vikram Singh, Anil Puri, Pawan Alhuwalia, Mahesh Sharma and Sanjeev Paul met Shiv Pratap Shukla, Minister of 34
State, Ministry of Finance and discussed the RBI notification towards CIT business. The Minister informed that he will bring this serious issue to the notice of PMO so that appropriate action can be taken soonest. They also discussed the
CAPSI Delegation meet, Shri Shiv Pratap Shukla
negative impact of GST on the entire PSI business which the Minister said that the matter is already under consideration of the Ministry. The grouping of private security agencies has also written a letter to the Prime Minister of India, Narendra Modi for his intervention. In the letter Kunwar Vikram Singh, Chairman, CAPSI alleged that the RBI decision would facilitate only two or three foreign-based companies and would create monopoly of foreign firms in the business. CAPSI also filed a writ petition in the Delhi High Court challenging the RBI notification. A separate petition was filed by Premier Shield Pvt. Ltd. which was heard on 30 May 2018.The judge clubbed their petition with that of CAPSI, and that will be heard on 17 August 2018. ConsidSecurityLink India ■ June 2018
ering that only partial redressal has been granted, the association has decided to file an appeal to a Division Bench, which is likely to come up for hearing in July when the court reopens. Kunwar Vikram Singh, said that the RBI decision is a serious security threat to the economic state of nation and the nation at large. Under the notification only a few big companies mainly foreign ones will be eligible to undertake this critical national assignment. This will render more than 65 companies out of business and cause them huge financial losses. Majority of Indian companies are being run by exservicemen. “The government intelligence organizations must carry out a risk analysis on handing over the entire cash management to foreign based companies, and imagine a scenario when they stop cash delivery to banks and ATMs under instructions from their masters who may conspire with our enemies and create huge upheaval in the country. It can prove fatal for a country like India,” said the Chairman, “Moreover, should these companies crash due to some international financial crisis and terminate their operations in India, what will be the fate of our banking sector and public enterprises. RBI must have considered these serious security threats before taking such decision.” CAPSI represents more than 2,000 entities that provide private security services.
National Roundup
CAPSI Demands Free Bus Rides for Security Guards in Delhi A delegation of CAPSI comprising Chairman, Kunwar Vikram Singh; Secretary General, Mahesh Sharma; Vice President, Anil Puri; DG & Advisor, C Pal Singh; CEO, Maj Gen K Majumdar (Retd.); Delhi Chapter President, Comdt. HS Chowdhary (Retd.); and Proprietor, Royal Bodyguard, Teja Singh Tanwar met Arvind Kejriwal, Chief Minister, Delhi along with AAP legislator Somnath Bharti and presented a few issues pertinent to the private security guards in Delhi.
T
he Chairman apprised the CM that there are over four lakh security guards working in Delhi at present which can act as a force multiplier in ensuring safety and security to the habitants and infrastructure of the state. This work force is currently approximately 30% deficient and with an estimated annual growth rate of 22%, the private security industry is one of the major job facilitators in the state. In this preview, CAPSI is keen to work in conjunction with the Delhi Government in areas of mutual interest in order to achieve the desired level of safety for populace. CAPSI offered that a security guard in uniform on the way to his duty and back home travelling in the public transport can act as a deterrent to the criminals’ planning and their unlawful activities, and he mere can force them to refrain from such acts. In other words, a security guard by his sheer presence in the bus or in any other public transportation system can be able to provide incidental security to passengers. The private security
guards are duly authorised and verified by the police and so their services can be used to boost safety of bus passengers in lieu of free ride given to them. They will act as ‘eyes and ears’ to ensure safety of CAPSI Delegation Meets Delhi Chief Minister women and children travelling in buses. “The Chief Minister agreed to con“Each security guard shall be givsider this demand. The association of- en a special badge so that public may fered services of security guards to keep recognise him/ her as protector of citiwatch in buses and boost safety of wom- zens. The Chief Minister appreciated en and children,” Somnath Bharti said. the social responsibility character of CAPSI in a statement also con- CAPSI and wanted us to organise sefirmed that Mr. Kejriwal has agreed to curity training to students of the 12th consider the demand of the association class in all schools. The Delhi Governto allow private security personnel to ment will sign a MoU to commence travel free in public buses in the city. these programmes at the earliest. It The proposed ‘concession’ will be given will also launch the publicity camto the security guards in uniform com- paign to popularise its partnership muting to and from the places of their with CAPSI for ‘Yatri Suraksha’,” said Kunwar Vikram Singh. duty only.
COP Portal to Verify Private Security Guards J
oint Secretary (PM) Ministry of Home Affairs has recently issued directions to all Controlling Authorities to use CCTNS (Crime & Criminal Tracking Network System) to check the crime record of private security guards, as well as the owners/ directors of the private security agencies so that the police verification of the private security guards can be done speedily and certificates can be issued at the earliest. This will speed up the verification processes for the renewal of PSARA license. Almost 90% police stations across country have been connected through computer network under CCTNS, thereby antecedents of a person especially his/ her criminal records can be checked and verified soon. CAPSI has been persuading MHA to speed up the verification process so that every security guard is verified through its systems. This notification of the MHA will really help in renewal of pending licenses. SecurityLink India ■ June 2018
35
National Roundup
Maxpro® VMS
Elevator Based Access Control Solution Secures AWHO Premises A
rmy Welfare Housing Organization (AWHO) embarked on a historic journey to construct houses for serving/ retired army personnel and their widows in selected stations throughout the country. Today, AWHO’s presence is visible across the length and breadth of India. During the last 38 years, the organization has constructed approx. 29,000 dwelling units in 93 projects at various stations and is in the process of constructing more than 6,000 dwelling units at 14 stations, while 6,076 dwelling units are under planning at eight stations.
Challenges
O
ne of the AWHO townships located at Indore faced difficulties in monitoring visitors and keeping watch over the movement of maids and drivers in their multistoried building. Protection of the residents and their valuables from intruders was one of the concerns for them. AWHO also wanted a combined solution of elevator based access control to restrict user/ floor wise access in the buildings.
Solution
I
n order to overcome the challenges, Matrix offered its elevator based access control solution which allows access and entry in the elevator using biometric or RFID card credential, only to authorized residents. As soon as user shows his/ her enrolled credentials to the reader installed inside the elevator, floor buttons which are accessible will be enabled. Thus, monitoring and controlling user access was made easy with Matrix solution.
Results ●● Easy living with fully automated elevator based access control solution. ●● Controlled and monitored access of users for enhanced security of residents. 36
SecurityLink India ■ June 2018
One-Stop Platform for Security Integration Honeywell’s latest video management system offers video surveillance experience with maximum efficiency and minimum effort
I
n today’s scenario, the ability to secure buildings, assets, inventory and people are key to any organization’s reputation and success whether operated in banking, retail, commercial, logistics, or residential business. Protecting business from theft or vandalism, while providing real-time surveillance of premises, enable efficient operation, protect profitability, and provides peace of mind. Honeywell’s MAXPRO video management system (VMS) controls multiple sources of video subsystems to help security professionals deliver more efficient and effective surveillance for complex building environments. The MAXPRO VMS platform offers a truly scalable architecture, and a single command and control interface to efficiently operate various products from an expansive list of video equipment from Honeywell and other third parties. It provides world-class integration with enterprise-wide access control and alarm intrusion systems, thereby further maximizing the value proposition of the system. M A X P RO VMS enables superior access control and redefines video security with
National Roundup
The new edition enhances Honeywell’s growing line of IP video technologies to deliver scalable high-quality video solutions for any business need. With MAXPRO VMS, you’ll discover an intelligent management solution that leverages your existing video infrastructure to collect, manage and present video in a clear and concise manner. It integrates with a variety of Honeywell products including Pro-Watch® access systems, and support the latest equIP cameras to provide a comprehensive connected building platform – Sharad Yadav General Manager, Buildings, Honeywell Home and Building Technologies, India
a framework that integrates to Honeywell’s proven Pro-Watch® security management system. This framework provides a quick way to develop the connection of plug-ins to video and security subsystems, as opposed to bolt-on components. This provides complete control of user provisioning, physical monitors, salvos, and video panels based upon alarm/ event actions from Pro-Watch. MAXPRO VMS is a powerful and dynamic video management solution that bridges the gap between analog and digital video systems by seamlessly integrating traditional analog components with the latest digital and IP video technology to form a single comprehensive surveillance network. It intelligently determines the capabilities of each subsystem across various sites. The subsystems can be any combination of analog switchers connected to analog monitors and cameras, digital monitors, enterprise network video recorders and digital video recorders, and they can all be managed with virtual switchers, multiplexers and monitors for viewing and recording images from the latest IP cameras.
Certified Security Associate (HCSA) Program Gets Overwhelming Response in Mumbai
H
ikvision has recently introduced the Hikvision Certified Security Associates (HCSA) Program in India. The first batch of three-day HCSA training program was conducted from 26 to 28 April 2018 in Mumbai which got overwhelming response from the young security professional community. The participants at the Program received certificates along with the enriching technology and product training experience. The HCSA training program will be conducted regularly in the coming months. The comprehensive HCSA Program included training sessions on optics basics, Turbo HD analog solution, PTZ configuration, network basics, IP camera, NVR, fish eye camera, iVMS 4200, and smart functions and applications. The aim and intention of the Program were to give hands-on training and demonstrations, and thereafter a dedicated online examination was conducted to felicitate the successful participants with HCSA certificates. “Hikvision has set an industry standard by offering professional video surveillance certification to validate video expertise under Hikvision Certified Security Associate (HCSA) program in India. Hikvision certification program is upcoming and open to Indian customers and partners. Besides, Hikvision provides meaningful endorsement to those who pass and become Hikvision Certified Professionals,” said Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd. The Hikvision Certified Security Associate (HCSA) level certification focuses on training participants in essential configurations, operations and maintenance of Hikvision video surveillance products and its features. It is designed for technical engineers who have worked in the security industry for several years and have already gained some security basics. The certification program is open to anyone looking to gain expertise in video surveillance and total security solution. The trainee should have at least one-year of work experience in the security industry and be familiar with security basics. SecurityLink India ■ June 2018
37
National Roundup
Video Walls at the Heart of GIFT City
(Gujarat International Finance Tec-City)
D
central command and control location for managing traffic and utilities remotely. Delta video walls at the center will not only monitor utilities but will also provide real-time monitoring of security and surveillance. Operators can manage the city’s growing population and infrastructure with this solution – with minimum effort and maximum efficiency,” commented Nilesh Purey, Vice President IT at GIFT City. Being a leader in DLP® technology, Delta has always been active in providing reliable video wall solutions known for their high brightness and sharp image quality. With its indepth knowledge and rich experience in the smart cities sector, Delta has installed two sets of 100 square feet of DLP video wall made up of 72” WUXGADLP cubes with redundant power supply at the city control and command centre. The sharp image quality of Delta’s video walls ensures to offer operators’ a high level of attention to every kind of detail, from intricate graphics to minute text. The command and control system is responsible for coordination and integration among various service providers, disaster management, and emergency services, ensuring effi-
38
SecurityLink India ■ June 2018
elta, a leading provider of video wall solutions, in collaboration with their channel partner Alpha Digital, has set up state-of-the-art video walls at the control and command centre of GIFT City (Gujarat International Finance Tec-City). With this addition, operators would be able to monitor real-time data and improve the availability, safety and efficiency of services in GIFT City. Being one of India’s first smart cities that has been constructed from scratch, GIFT has been included in the Smart City Mission Statement with its futuristic infrastructure. It’s an underconstruction central business district, located between Ahmedabad and Gandhinagar in the Indian state of Gujarat. GIFT is also home to BSE’s & NSE’s International Exchange which has earned for India a place in global capital markets. The city control and command centre (C-4) of this smart city is the first of a kind ICT platform, allowing effective utility infrastructure monitoring/ management as well as city surveillance from a single location. “The City Control and Command Centre (C-4) is a mix of software and hardware platform that acts as a single
cient services to users, safety and security, and record keeping/ documentation. Inaugurated by the Prime Minister of India, Narendra Modi, GIFT also hosts India’s only International Financial Services Centre (IFSC), which will certainly aid in the economic growth of the entire nation. GIFT City is also home to multiple financial institutes including insurance, reinsurance companies, banks and stock exchanges along with many reputed IT & ITeS companies. Currently there are more than 10,000 people working in various sectors in GIFT City. Delta Displays, a division of Delta, is a pioneer in developing professional displays for control rooms in surveillance, security, traffic, command & control, utilities, process control, telecom and broadcast applications. Delta offers a wide array of display technologies including rear projection 4K and full HD laser DLP® video walls, LED-DLP® video walls, Xtra thin-bezel LCD video walls, and high-resolution indoor/ outdoor LED displays with a powerful and highly flexible wall management software suite.
National Roundup
Felicitating Outstanding Partners At South Asia Pacific Partner Summit 2018 held in Singapore Over 25 key channel partners invited across India and SAARC
A
xis Communications concluded their three day annual South Asia & Pacific Partner Summit 2018 held in Singapore. The Summit, a joint event for the whole region, provided a platform to interact with key Axis partners from 11 countries, as well as Axis business heads and representatives both from the region and their headquarters. The event also helped facilitate cross pollination of ideas among key partners. The conference hosted interactive discussions around the growing importance of security in retail, smart city applications, in-depth panel discussion on innovation in cyber security and how it is interwoven with the organisation’s physical security needs. Axis Communications also felicitated the loyal partners and distributors for their outstanding works in their respective fields. The invited members and top performers included 22 partners from India, three from Bangladesh, and four
from Sri Lanka. It provided the members and sponsors an opportunity to engage and interact with top management from Axis Communications. They also got insights on the company’s vision and new technologies in the offing. Taking forward the Axis Communications’ value of crediting a major portion of their success to their channel partners, the participants were given insights into how Axis List of winners from India & SAARC region ●● Distributor of the Year – Inflow Technologies Pvt. Ltd. ●● Solution Partner of the Year – Toshniwal Industries Pvt. Ltd. ●● Project of the Year - Aegis Automation India Pvt. Ltd. ●● Partner of the Year - Datacom Pvt. Ltd.
We owe a significant amount of our success to our partners and we believe in recognising and lauding their efforts and contributions. Axis is a strong channel focus organisation wherein we work hand in hand with all our partners who help us take the Axis brand to newer zeniths – Sudhindra Holla Sales Director, India and SAARC, Axis Communications SecurityLink India ■ June 2018
Sudhindra Holla, Sales Director - India and SAARC, Axis Communications with attendees
can support them in leveraging new market opportunities. India business strategy, product innovations and solutions were also discussed in depth at the conference. Axis Communications, which started its Indian operations in August 2007, is a leading provider of network video solutions for professional installations across verticals. The company’s customers in India include the Novotel Shrem Goa; Café Coffee Day chain; Fortis Healthcare, Punjab; Indian Public School, Coimbatore; and some key smart city surveillance installations like Junagadh, Kolhapur and Nanded. 39
National Roundup
Tackles the Dynamic Challenges
At Canadian Warplane Heritage Museum Successfully to Counter against Statue Vandalism
“
It is far better to face bullets than to be killed at home by a bomb,” read out a World War I poster on display at the Canadian Warplane Heritage Museum. The poster gives its visitors a glimpse of how security, from outside and from within, had been an urgent need then, and how little things have changed as more of the same is required even today, albeit in a different form. But as we near the centennial celebrations of the iconic war, VIVOTEK has ensured that at least the glorious remnants of the era are safe and secured in the museum as they once made their homeland.
In a bid to enhance its security, the heritage museum has deployed VIVOTEK’s sophisticated surveillance systems to effectively counter the modern-day challenges, securing the memorabilia from acts of theft, vandalism and pilferage. The deployment has been done through VIVOTEK’s Hamilton (Ontario) channel partner and regional leader in surveillance and security systems, A. S. Secu-
Establishing surveillance and security framework at Canadian Warplane Heritage Museum is an embodiment of the expertise that VIVOTEK holds in such deployments. Today, much like Canada, India also faces a unique challenge. Multiple statues are being vandalized throughout the country. We believe that preserving our legacy is an integral factor in building the nation and India needs it more right now than it has ever before. As various countries are preserving their national heritage using advanced surveillance systems, such systems can also help our center and state governments in ensuring better security and surveillance in public spaces – Sanjeev Gulati Country Manager - India & SAARC, VIVOTEK 40
SecurityLink India ■ June 2018
rity & Surveillance, Inc. Securing a space, however, is not an easy task, particularly if it is of such a massive size as the Canadian Warplane Heritage Museum. The spectacular museum, for instance, is home to about 50 aircrafts, an extensive aviation gallery, and an exhibit gallery, besides a 400-vehicle parking lot, constantly moving crowd, and specific regions with contrasting lights and blind spots which could emerge as a soft target for the masked mob that has been lately defacing properties in Hamilton. VIVOTEK has tackled the dynamic challenges presented by the museum by tightening the security framework with sixteen network cameras. This includes the deployment of IB836B-HT bullet
National Roundup
cameras having 2 megapixel full HD sensor (with 30 meter ranged built-in IR illuminators) that leverage WDR and SNV technologies for high contrast and low light environments. These devices, being rated with IP66 and IK10 standards, can also withstand rough weather and direct impact on them. Its ND9541 network video recorder, on the other hand, is a H.265 (high-efficiency video coding) recorder that comes equipped for up to 32-channel network and 4 hard disk drives for efficient and adequate storage. The updated surveillance system at the museum also includes VivoCam Layer 2+ managed PoE switch (AW-GEV-264-370) to provide uninterrupted power backup for all cameras. The building structure also required range extension through PoE extender AP-FXC-0210 for two cameras located
indoor using the daisy-chain installation. Commenting on the surveillance blueprint Anthony Stayrer, the Director of A.S. Security & Surveillance said, “In our almost a decade-long reselling experience and being voted the #1 security company in Hamilton, we have never experienced the superlative quality and functionality of the equipment deployed and the level of sophistication extended by VIVOTEK in terms of service delivery. What serves as an icing on the cake is being able to complete the entire surveillance enabling operations within the tight 48-hour constraint that we had to adhere. Our collaboration with VIVOTEK has, in its truest essence, established a new benchmark in establishment security and we look forward to more such collaborations in the future.”
VIVOTEK Canada tech support and representative, Oliver David stated, “We are delighted that our business associate and the end-customer are both deeply contented with our surveillance offerings. Our tie-up with A. S. Security & Surveillance has been effectual in delivering the desired result and we are glad to have the brand on-board as our gold partner.”
Appoints VP Sales for EMEA & Asia
O
ncam, the leading provider of 360-degree video capture and business intelligence technology, has recently announced the promotion of Simon Reed to Vice President of Sales, EMEA and Asia. In these dynamic regions, Reed will lead the implementation of the company’s strategic vision to expand market share, propel new deployments of the company’s award-winning technology, and boost strategic alliances. In this role, Reed will collaborate with the company’s regional sales directors across the UK, Europe, Turkey, APAC and South Asia, and align with other senior sales executives to streamline account acquisition. Reed’s extensive experience in building strategic alliances will help Oncam optimize growth opportunities and accelerate global go-to-market strategies. He will focus on building strategic partnerships, and driving sales for video surveillance and business intelligence solutions. “Oncam is clearly the technology leader in 360-degree video and there is enormous opportunity to build sustainable, highgrowth initiatives in these dynamic regions,” said Reed, “I’m thrilled to expand my role within Oncam and look forward to working with our global sales ecosystem to drive business development and sales efforts.” “Simon’s aptitude and contributions over the past two years have been invaluable to the organization and he embodies the values that Oncam holds in such high regard, including a dedication to customer service, teamwork and integrity,” said Firas Banshee, CEO, Oncam, “We are dedicated to investing in the people necessary to further boost the positive trajectory we’ve seen in the EMEA and Asia regions while identifying new avenues for opportunity as the market expands.” Oncam, founded in 2007, is part of ONVU Technologies Group, and is a leading innovator in 360-degree video technologies globally. Oncam is headquartered in Switzerland and operates from regional hubs in the UK, US, Turkey, Hong Kong and India. SecurityLink India ■ June 2018
41
National Roundup
Reducing the Cost, Enhancing the Efficiency Zicom used the Internet of Things to bring down the cost by 90% and increase the efficiency of ATM surveillance
Z
icom is one of the pioneers of the concept of SaaS and introduced a new business model called Zicom SaaS by leveraging the IoT space. Zicom Security-as-a-Service (SaaS) solution provides comprehensive security services on a monthly subscription basis without any ‘capital investment and management’ for the customers using the power of cloud. Historically banks spend an average of INR 30,000 to 40,000 per month on their ATM security towards ‘manpower security expenses,’ plus the CCTV equipment installed in the ATM which record the crime but never prevent it. India Infoline Ltd. (IIFL), a conglomerate of financial services company that offers loans against gold ornaments, relied on standalone closed-circuit TVs (CCTVs) and security guards to protect their branches. Many ATMs of Federal Bank Ltd. did not have even security guards.
Solution offered
Z
icom offered banks their SaaS to customize the e-surveillance system and use IOT to have twoway conversations – from one central hub to any ATM across the country. For the first time ever, CCTV cameras pro-actively prevented a crime instead of only recording. The Zicom ATM surveillance system uses internet to connect sensors installed at ATMs by which they are able to track each ATM, and connect it to the national command centre to monitor every activity taking place in real time, 24 hours and 365 days of the year. Unlike any other, Zicom command centre works towards preventing crime and getting into the rescue operation when required with features such as two-way communication at an ATM, panic button to raise an alarm, and quick response service (QRS) mechanism to inform the police about a crime taking place.
Impact
T
his strong fullproof mechanism for the e-surveillance system has made the entire security process simpler, and as a result banks can completely rely on it. SaaS helped re42
SecurityLink India ■ June 2018
duce man power as well. Earlier banks were spending Rs. 40,000 monthly on security, ATM Surveillance under IoT by Zicom brought the cost down to Rs. 4000 a month which is 90% reduction at each ATM. Zicom has now created a security model for the bank that also helps in conserving energy with the help of remote monitoring. It has helped Federal Bank save about Rs. 7,000-8,000 per month on each ATM. S. Venu, Chief Administrative Officer of IIFL says that since Zicom partnered with IIFL the company is able to monitor any branch across the conglomerate’s large network from their office in Mumbai. He further adds that this has improved the productivity and efficiency of his auditors and vigilance team. Zicom Electronic Security Systems today covers over 5500 ATMs, and various banks across country such as ICICI, Indian Bank, Ratnakar Bank, HSBC, Punjab National Bank, Vijaya Bank, State Bank etc.
National Roundup
All-in-One Pyronix Intrusion Panel COSEC DOOR FMX Door controller with multispectral fingerprint sensor & Hikvision Surveillance Solution Secure Fino Payments Bank I F ino Payments Bank takes forward the parent company’s (FinoPaytech) legacy in ensuring banking for all through a nationwide digitally enabled distribution network of around 400 branches and over 25000 banking points. These access points provide utmost convenience and unmatched paperless banking experience right from eKYC-based accounting opening to allowing customers do banking/ payments transactions anywhere, anytime and through any platform – digital/ mobile or physical touch points.
Challenges
F
ino Payments Bank faced many challenges related to location security and maintenance. One of the leading micro finance organisations (Fino Payments Bank) having offices in Tier II, Tier III and Tier IV cities, the bank functions involve cash deposits, withdrawals and other financial dealings. Every branch of Fino Payments Bank has a cashier cabin and client servicing area. The major security concerns were about assets and property. The bank wanted to monitor all sites at the bank headquarters. The standard solutions were unable to meet the security requirement at each site. Area of concern for the bank was maintenance of different systems at remote locations.
Solution
H
ikvision offered an integrated solution based on the requirements of the Bank that turned out to be a perfect enabler of security management challenges for various branches spread across India. “Integrated solution from Hikvision has helped us not only to get a perfect solution with a combination of hardware and software but also controlling and maintaining the same from one location,” said the Management Representative of Fino Payments Bank, “Additionally, it is easy to use and install. It is a hassle free solution with sensors, HDD, intrusion and CCTV, all from one vendor along with software to manage and control the system.” SecurityLink India ■ June 2018
n the fast-paced evolution of technology, organizations have started adapting the biometric application systems for access control and time-attendance. Compared to the traditional biometric readers scanning a single layer of skin, multispectral biometric attendance system employs multi-layered reading. Matrix COSEC DOOR FMX is a high performance door controller with multispectral sensor technology. It reads surface as well as the subsurface of a finger producing more accurate image even when the finger surface features are distorted or difficult to read due to dirt, usage, age or environment. Powered by a high-speed processor and live finger detection algorithm, DOOR FMX is specifically engineered for high security applications including defense, airports, R&D labs, banks, and industries such as education, mining, construction and heavy manufacturing for their access control and time-attendance needs. Features: ●● Multispectral sensor with fingerprint detection. ●● Supports fingerprint, RFID card and PIN. ●● Interactive GUI with 4.3’’ TFT capacitive touch screen. ●● 5,00,000 transactions and 50,000 users. ●● PoE, ethernet, Wi-Fi, 3G/ 4G. ●● Seamless integration with third party devices. 43
feature
Considerations for Integrating Industrial PoE Solutions with Outdoor IP Surveillance Systems
M
ission-critical applications that use outdoor IP surveillance systems include highway traffic control and monitoring, oil field and pipeline monitoring, power generation and distribution monitoring, as well as water and wastewater station monitoring. For these applications, asset owners place a lot of importance on the reliability and availability of their surveillance systems. This is because IP surveillance systems enhance the safety of staff, monitor critical facilities, and help streamline operations. Furthermore, in order for security managers to monitor site conditions and respond to any events that occur, HD PTZ cameras that have high power consumption and higher bandwidth requirements are often deployed to facilitate monitoring across large areas and provide uninterrupted high-resolution video. A challenge that often occurs when operating in harsh environments, which include extreme temperatures, high environmental noise, and potential cybersecurity risks, is making sure the PoE switches can provide high power output and sufficient network bandwidth reliably. To overcome these challenges, system integrators should consider several points when integrating industrial PoE solutions into their outdoor IP surveillance systems.
Supplying highpower PoE to modern surveillance devices
I
n order to perform to the standard that asset owners expect, surveillance cameras are required to support a growing number of functions. A type of deployment that often encounters difficulties is when PTZ surveillance cameras are used to patrol a large outdoor area during periods of low light. Turning on additional functions such as a heater, blower, or IR in challenging weather conditions can require more power than usual. For project deployments that include multiple HD PTZ cameras surveilling large areas with a lot of activity taking place, it is important to have a PoE injector or switch that is capable of supplying up to 60W, as well as a power supply that can sufficiently support any other connected devices.
Use cybersecurity features to protect networks
I
Sufficient network bandwidth design
P surveillance systems are often deployed to enhance the safety of people and monitor critical infrastructure such as transportation systems. Those in charge of managing networks that support critical infrastructure must address cyberthreats and network vulnerabilities. Therefore, any industrial PoE solutions that are deployed should not introduce any vulnerabilities to the surveillance network. The security features of any devices deployed on surveillance networks should be given a lot of detailed consideration.
W
Conclusion
Providing built-in failure recovery
sset owners need to carefully consider specific features when selecting an industrial PoE switch in order to meet their customer requirements such as a high-power PoE, sufficient bandwidth, fault recovery features, and last but not the least, cybersecurity protection. The advanced features provided by industrial PoE switches can help reduce the total cost of ownership while satisfying key technical requirements to ensure that surveillance cameras provide excellent video quality and maximize total system availability.
hen designing a network topology that will support multiple surveillance cameras in industrial applications, it is important to reserve sufficient uplink bandwidth to ensure high-quality images can be transmitted under any conditions without packet loss.
F
or cameras that are deployed in harsh environments or hard to reach places, it is advised to use an industrial PoE solution to supply power and Ethernet to IP cameras. PoE switches should support automatic failure check and de-
44
vice recovery as they reduce the amount of site visits human operators need to make when an issue with the network occurs. Finally, for networks that host surveillance solutions, failure recovery is another beneficial feature.
SecurityLink India â– June 2018
A
feature
SecurityLink India â– June 2018
45
feature
E-attendance BI’s Knock on the Door By Ruchir Walia – Product Manager, TA Netgables Pvt. Ltd.
I
n 1865 Richard Miller Devens, while talking about the then banker Sir Henry Furnese, in the book ‘Cyclopaedia of commercial and business Anecdotes,’ coined the term ‘Business Intelligence.’ The book states that Sir Furnese would maintain a complete and perfect train of business intelligence, throughout Holland, Flanders, France, and Germany. This resulted in him gaining various profits owing to his early receipt of information. In 1989 Howard Dresner proposed Business Intelligence as an umbrella term, to describe concepts and methods to improve business decision making by using fact based support systems. Later, Dresner became a Gartner Group Analyst, and today Business Intelligence is defined as an umbrella term in Gartner’s Glossary that includes the applications, infrastructure and tools, and best practices that enable access to, and analysis of information to improve and optimise decisions and performance. Pulling together these definitions, the analysis of information for profitability can be framed as the core purpose of Business Intelligence (BI). On the basis of the information available in our surroundings and definitions, it can be perceived that an organisation looking for business intelligence might have to 46
go through heavy transitions in order to implement it. The required tools along with the information flow, need to be verified. The perception moves against BI for small scale industries, and when it comes to private security providers, BI struggles to find a seat among various operational requirements.
BI and private security organisations
M
usselman and Jackson in 1992 defined business as an activity that meets the needs of society and the economy, and the company that is organised to engage in these activities. For private security sector the definition summarises business as the activities involved in providing security to customers and their belongings. Griffin and Ebert extended the business definition to providing goods and services to earn profit. This definition includes the business owners’ or managers’ interest. The organisations’ aim to maximise their profit makes it necessary for the decision makers to think out of the box. The usual practises are being challenged with the change of technology, and technology is evolving on day to day basis. Recently, some out of box solutions have been introduced around SecurityLink India ■ June 2018
the world. Google, in an event recently had introduced a new level of artificial intelligence (AI) solution which can make calls on behalf of the user. Alexa, the amazon’s virtual assistant is now easily available in the market. Microsoft has been talking about the power of AI for a while. AI is filling gaps between human imagination and reality. Business is a different game altogether. Imagination has different meanings and definitions in business and therefore BI, as has been highlighted above, is business’s answer to profitability. The private security sector has a complex operational process. Remoteness is a crucial factor with its respective impact on every business step, from recruitment to delivery of services. While we mention the various business steps we shall not overlook the point that all the steps have the delivery of services as their epicentre. After all, it’s the delivery of services, i.e., the guards’ presence at the customer location that turns into earnings. This makes the attendance and allocation of guards, the front-runner for BI in the private security sector. BI is dependent on data and its utilization. In case of attendance, there are numerous solutions now available in the market which can help the agency
feature
to sail towards BI and profitability. Some of the possibilities and solutions are as follows.
Biometrics
A
common practise apart from the pen and paper is the use of biometrics. The staff can punch their movement time, but the biometric’s output needs to be merged with the existing system before it turns into a meaningful resource. Biometrics, though low cost, is more of an old age solution, and the attendance process at the time of shift change, at customer’s location, can become messy. Also, it requires installing the machine at the customer’s premises. Looking from the future perspective, biometrics and BI do not gel-in as a solution.
Video cameras
V
ideo cameras have now become an integral part of the security industry. Usually, it is considered as an agent to serve customers, but video cameras can help with attendance marking as well. Video analysis, a new trend in the market, is a technique of automatically analysing video and determining events like guards entering the premises, leaving the premises etc. Though the solution sounds interesting, it faces challenges on the cost front. Video analytics is an expensive option and organisations would prefer this kind of solution at high end locations only.
whenever the person holding the card enters the premises, their attendance is marked automatically. The RFID is useful when the agency can ensure that the guards will enter and leave from the specified gate or the RFID reader only. Also, the malpractices such as a guard giving his card to another fellow and leaving his duty cannot be controlled through RFID. The control measures for such malpractices can again be expensive or may even struggle with feasibility issues.
GPS based attendance
A
n interesting solution that has evolved with the growth of mobile phones is GPS based attendance. The agency can ethically track their guards and their movement. The solution’s usefulness is not just restricted to attendance marking, but can be used for various other services also. Various agencies have tried this method through either their telecom provider or through other service providers. With telecom providers, due to the established infrastructure, the cost might look to be on the lower side but connectivity emerges as an issue. Along with the connectivity, the low cost solution may give only brief information, which might fail the main purpose of having GPS based system. The service providers dealing in GPS can provide meaningful data, but then, the solution needs to be implemented at the bottom of the pyramid and decision makers have to decide if the cost can be justified or not.
RFID
R
adio frequency identification, popularly known as RFID, uses electromagnetic fields to detect the object. The common practise is to use RFID tags as identification cards and
Mobile based attendance
A
nother available attendance marking solution is marking attendance through mobile devices. Field ofSecurityLink India ■ June 2018
ficers travel from location to location, and they can mark the attendance of the guards through their mobile phones. UP government has, few days back, implemented a similar requirement for their sanitation department. The phone based attendance marking has restrictions of its own. The field officer cannot carry heaps of documents stating daily allocation data and spend hours at a site marking attendance, and thus the solution needs to be defined in a manner in which it can save time. In order to mitigate the malpractices, customer involvement is required. Saralweb launched one such solution at 12th Security skill and leadership summit, 2017, which handles the allocation of guards that can remarkably reduce the attendance marking time.
The way ahead
T
he solutions mentioned above will need some more works for BI to be introduced in day to day practises, but the agencies will need to decide on the method they would like to opt in order to initiate BI process. The solution should be chosen wisely, as it will determine the level of BI that can be introduced in the system. The data collection, implementation, as well as availability are major challenges for BI to be introduced. The agencies need to decide amongst various available options. A system which can answer to complexity as well as customer involvement needs to be developed. The age old practises are becoming obsolete. Quality of service and cost are major worries for private security providers. BI is the way forward and attendance seems to be the top contender to initiate BI and related activities for private security agencies. 47
feature
Setting New Performance Record for Bolometers Matching speeds of high frame-rate cameras
ULIS bets on faster design and inherent lower cost of bolometers (thermal sensors) to increase attractiveness of thermal imaging for machine vision
U
LIS, a designer and manufacturer of the widest range of thermal image sensors for commercial, defense and security applications, has achieved unmatched performance with its bolometer (a type of thermal sensor) that now meets speeds of fast imaging applications. It has gained a response time that is four-times greater than standard bolometers. ULIS has achieved this faster speed without any trade-off in sensitivity. The company is the first to overcome this technological challenge in its aim to significantly raise the overall Factor of Merit (FoM) of bolometers. FoM, a relative measure of thermal sensor sensitivity against response rate, is a key parameter camera makers use to compare the performance of thermal sensors. In contrast to standard bolometers, ULIS’ quicker response time means that it can detect fast moving objects without producing a blurred image. This new pixel technology enhancement, in conjunction with the bolometer’s comparably lower price, make it ideal for inclusion in machine vision cameras, where high frame rates for in-line quality inspection are required but previously the cost of adopting thermal imaging had been prohibitive. The bolometer will also have wider application in defense such as missile warning systems. 48
“ULIS is thrilled with the outstanding results we have achieved in improving both the response time and sensitivity of the bolometer. This is a proof of the continued strength of our affordable pixel technology and the skillset within our R&D teams,” said Sébastien Tinnes, Marketing Team Leader at ULIS, “We feel camera makers will benefit tremendously from thermal image sensors, which, when used in conjunction with visible or SWIR cameras, can provide valuable additional information on product quality.” ULIS’ new pixel technology achieves an FoM of 125 to 150mK.ms, enabling sharper images that aim to improve the quality of in-line production controls such as automated glass manufacturing line monitoring. ULIS presented its results in a technical paper entitled ‘ULIS Bolometer SecurityLink India ■ June 2018
for Fast Imaging Applications Sets New Response Time Record’ at OPTO2018 in Paris. They showed gains in FoM performance from the standard NETD=50mk multiplied by TTC=10 to 12ms (meaning FoM 500 to 600mK.ms) to a new level of NETD=50mK multiplied by TTC=2.5 – 3ms (meaning FoM 125 to 150mK.ms), a four-fold improvement. FoM is a parameter that combines sensitivity (NETD) and response Time (TTC). Response time measures how quickly the bolometric pixel membrane responds to the infrared radiation changes taking place. Sensitivity determines how well the sensor can detect an object in all-lighting conditions, as well as in complete darkness. Both sensitivity and response time are linked. Traditionally, they move in counterproductive directions, reducing the response time tends to degrade sensitivity.
feature
SecurityLink India â– June 2018
49
feature
How Facial Recognition can Prevent Crime and Improve Security By Ashish P Dhakan – MD & CEO, Prama Hikvision India Pvt. Ltd.
Why facial recognition
P
ublic security threats and demand for new security solutions from end-users continuously push security manufacturers to innovate and upgrade technologies. International news and media reports on terror incidents of violence often shock public consciousness. They act as a grim reminder of present danger to public security. These security concerns need to be addressed with innovative solutions. For everything from safe city projects to home protection, developments are underway all over the world, with their respective challenges. Safeguarding family members, homes, property, and vehicles are the most common applications using these emerging technologies. But the number of video surveillance cameras used in
any given application, with their various networks and demanding resolutions, has increased dramatically with an equal increase in challenges. The ability to decipher through oceans of data to find the critical small chunk of data is now in high demand. On the security side of video intelligence technologies, increasing customer safety has been the primary driving factor. On the business side of video intelligence technologies, increasing customer satisfaction has been the primary driving factor. Here, both service and safety are critical. Facial recognition technologies can help in addressing these critical issues and improve our abilities to overcome the challenges involved. More than just speed or enhancement of current methods, facial recognition technology opens new avenues for security. It also focuses on new realms of data wherever it’s needed.
Security industry difficulties & requirements
I
dentifying suspects during post-event investigation poses many difficulties. Challenges include everything from reviewing 50
SecurityLink India â– June 2018
footage from scores of cameras, comparing two face images of the same person with a 10-year age gap, and extracting the 5% (or less) of useful information from massive amounts of data, to implementing pre-event alarms to prevent incidents and managing increased video storage challenges due to increased resolutions. These obstacles can prove paralyzing for standard video surveillance systems, even with up-to-date equipment. The sheer amount of information being processed bogs down the system hardware. This is where more data-heavy solutions are needed, precipitating the development of deep learning and artificial intelligence products. Along with those new technologies, facial recognition is undoubtedly one of the most important right now.
Common insufficiencies in facial recognition solutions
C
onventional intelligent video surveillance carries very strict requirements for detecting background changes in scenes. For human facial recognition process, two key steps are required. The first one is feature extraction, where the features are designed by humans and are always subjective. This method performs
feature
well in very specific environments, and subtle changes in lighting, environment, etc., sacrifice accuracy. The second step is ‘Classification Learning,’ which uses shallow learning and analysis. Far from ideal, the results here directly restrict the breadth and depth of intelligent applications.
Deep-learning benefits for intelligent video surveillance
D
eep learning is intrinsically different from other algorithms. The way it solves the insufficiencies of traditional algorithms is encompassed in a few concepts.
From ‘Shallow’ to ‘Deep’
T
he algorithmic model for deep learning has a much deeper structure than that of traditional algorithms. Sometimes, the number of layers can reach over a hundred, enabling it to process large amounts of data in complex classifications. Deep learning is
straction (deep) where we can perceive the object.
From ‘Artificial Features’ to ‘Feature Learning’
D
eep learning does not require manual intervention but relies on a computer to extract features by itself. This way it is able to extract as many features from the target as possible, including abstract features that are difficult or impossible to describe. More the features, more accurate the recognition and classification will be. Some of the most direct benefits that deep learning algorithms can bring include achieving comparable or even better-than-human pattern recogni-
tion increases significantly. Hikvision has demonstrated its ability to advance ahead of the competition. Its advantages in artificial intelligence in security have come about by having its own excellent algorithm development team and using the most powerful GPUs in our computer platforms. The results include winning in multiple international deep learning algorithm competitions such as ImageNet, PASCAL VOC, the MOT Challenge, and more. Achieving the best results come from a combination of having the right hardware and developing algorithms that can perform the computational requirements. Hikvision has the industry’s first data computing platform with bestin-class hardware, and completely independent algorithm team.
Hikvision’s facial recognition solution
H very similar to the human learning process, and has a layer-by-layer featureabstraction process. Each layer will have different ‘weighting,’ and this weighting reflects on what was learned about the images’ ‘components.’ The higher the layer level, the more specific the components. Simulating the human brain, an original signal in deep learning passes through layers of processing; further it takes a partial understanding (shallow) to an overall ab-
tion accuracy, strong anti-interference capabilities, and the ability to classify and recognize thousands of features. With deep learning technology, the average accuracy of facial recogni-
SecurityLink India ■ June 2018
ikvision’s facial recognition solution pushes the limits of what is possible with today’s advancements in recognition abilities. This solution detects human faces and recognizes attributes creating pre- and post-event face contrasting. With immense ca-
51
feature
pabilities for data storage behind this solution, Hikvision’s Face Library can generate blacklists and whitelists to trigger alarms and automate entry and exit authorizations in a range of applications. Hikvision embeds its algorithms within the cameras and recorders, so no PC server is needed. This means less delay in transmission, decreasing the burden on back-end devices. More than just efficiency, Hikvision holds high success rates – the facecapture rate can reach to 95% accuracy, with face-comparison accuracy
rate up to 98% (Based on controlled tests, the facial recognition engine requires face images with minimum 40 pixels between the subject’s eyes (‘inter-pupillary’ distance), preferably 60 to 300; the maximum pan and tilt angles are 25 degrees and 15 degrees respectively for facial image capture). Multiple models and types are available with a wide variety of front-end or back-end combinations to meet multitudes of scenarios and environments, and with world wide support, all human faces are supported. (At the time of writing this
article, faces fitting characteristics of Asian ethnicities have the highest degree of accuracy.) Systems integrators will see a wide range of applications becoming possible with this facial recognition solution. It can be applied in banks, luxury shops and hotels to recognize VIP customers and initiate specialized services. Hikvision’s solution can also be applied in security scenarios like police stations, customs, international airports, government installations, and much more, to improve security and investigation efficiency.
How the Convergence of Physical Security and Cybersecurity will Benefit Businesses By Robert Lydic – Global VP of Sales, ISONAS
T
he physical security industry is rapidly changing, ever evolving, and one that is growing faster than most other sectors of the greater global market. The latest research shows that the forecasted growth rates will be a compound average growth rate (CAGR) of 7.2% and a total market revenue opportunity of $41.27B through 2022. These economic indicators make the industry a very attractive investment for entrepreneurs, and for investment from large corporations from other industries. At ISC West 2018, this was extremely evident as there was a palpable buzz from technologies such as artificial intelligence (AI), 52
machine learning, cloud-based video management systems and cloud-based access control systems. New market entrants such as Amazon, and a seemingly increased interest and investment from the likes of Intel, IBM, and even Microsoft were present and contributed strongly to the buzz of the industry’s largest tradeshow.
Need for education and enhanced security
W
ith the increased profile of the industry, one can clearly see that the physical security industry is expand-
SecurityLink India ■ June 2018
feature
ing globally to new consumers, bringing with it an increased need to further secure products and services with comprehensive physical and cybersecurity protocols, and the need for education. This convergence of physical security and cybersecurity will create new industry leaders that will emerge to lead a new segment of the combined market through strong investment and leadership. According to a report published from Allied Market Research (AMR), the global managed security services market is projected to reach nearly $40.97B, with a CAGR of 16.6% over the next five years. Correlating these two market data points, the forecast for the physical security market is expected to have nearly 18% of the total market opportunity comprising cloud services at nearly $7B.
Sharing security service best practices
I
n September 2017 at the Cloud+ Conference in Austin, Texas, the leaders of the Access Control as a service (ACaaS) and Video Surveillance as a Service (VSaaS) markets, converged to share industry trends, observations of customer adoption, best practices in implementation and service, financial models, and several in-depth discussions on securing physical security of cloud implementations through cybersecurity. These cybersecurity discussions absolutely dominated every discussion with the clear message that as a cloud service provider, manufacturers and integrators must continue to create robust and scalable cybersecurity offerings to protect customer data and facilities.
Interestingly, an analysis of all of the past cyber breaches was presented by keynote speaker Dean Drako of Eagle Eye Networks, who, through a powerful visual diagram, noted that all existing breaches in the physical security industry were entirely on manufacturer provided hardware solutions, VMS physically installed on customer premises, and camera specific vulnerabilities across multiple providers.
Cloud versus non-cloud services
T
he insight that one was able to glean from this information, and that of a greater analysis of cybersecurity hacks across all industries, was that manufacturers and providers of cloud services were more secure and reliable by orders of magnitude than non-cloud solutions. The reason for these phenomena also became glaringly evident; the security protocols of a cloud service provider is central to the business’s value proposition, and as such should be addressed across all levels of manufacturing, implementation and customer utilization. Conversely, non-cloud deployed products rely on field implemented cyber strategies from integrators and end users which often expose lack of skills, education and budget to fully secure these physical security products.
Ensuring successful deployment
A
s a SaaS service provider, the technical personnel make up results in an expansion of staff and expertise. Network personnel, cybersecurity personnel, firewall experts, and cloud-specific software development staff all need to be added to
SecurityLink India â– June 2018
53
feature
core physical security engineering expertise to ensure that the product developed can be successfully implemented and deployed. These new jobs in the physical security industry will astronomically expand as the market continues to grow $6 Bn in a little over 4 years providing new opportunities to existing and new personnel to enter the industry. As a leader in access control hardware and an ACaaS provider, ISONAS has taken it upon themselves to implement a process to ensure that their customers can easily implement their products and gain great peace of mind in regard to the security of the solutions.
manufacturer is providing the latest solutions available in the market. An added benefit is that customers gain the scalable benefits of enterprise corporate cybersecurity protocols at a fraction of the cost of implementing these on their individual premises. As an industry, however, it is not simply the responsibility of the cloud service provider to ensure that the customers data in video and access control are being protected. It is also incumbent on the integrator to ensure that the installation and implementation of the products and solutions are deployed in an educated and skill-based manner.
Data security strategies
I
mplementing a process to protect millions of customer’s data records and facilities begins with mapping out a strategy to secure software and hardware. This means employing high-level, seasoned cloud deployment experts to create a strategy in our AWS infrastructure and all ancillary supporting technologies to minimize attack surfaces, create complex proprietary associations in a multi-layered and multi-tiered connection throughout the application, and lastly ensuring that all communication to and from customers’ devices are encrypted and secured. Once implemented ISONAS took it upon themselves to validate the infrastructure and the customers experience by subjecting the environments to 3rd party penetration tests.
Addressing cyber threats
T
hese tests, taken up quarterly, ensure a customer that the latest in cyber threats are being addressed and that the
Knowledge of networks and cybersecurity best practices
T
he products and services utilized must be easy to implement, be clear in their requirements of the end user networks, and simplistic to apply. Nearly all manufacturers of these products are working diligently to ensure that the integrator has all of the tools at their fingertips to ensure a successful implementation. However, it will remain important that the integration implementation personnel gain a greater knowledge in networks and cybersecurity best practices for their solutions. In most cases, this will mean additional jobs for new higher-level personnel, access to additional services to provide to end users, and an elevation of networking and security expertise within their business.
Expanding the reach of physical security
T
hese new-found skills and expertise will likely bleed into new markets and expand the reach of the traditional physical security market. It truly is an exciting time to be a part of a rapidly expanding market in the physical security space and to watch the industry react to the growing need for cybersecurity within products and services. In the next four years, there will be new innovations, new investments, and new winners and losers in products and services. It seems clear that those integrators and manufacturers who have begun to create the strategies and products for tomorrow will be well ahead of those who are not actively addressing the need for SaaS products, yet the window to opportunity remains wide open.
54
SecurityLink India â– June 2018
For Exhibiting and more information please contact : Jay Sheth: jay.sheth@nm-india.com / +91 9967971606 I Eshita Sharma / mumbaichapter@fsai.in / +91 9818805922 Supported By
Official Publication
Organisers
Media Partner
application/ case study
Airports Soar to Smarter, Safer Airside Operations Honeywell NAVITAS™ better connects data from air traffic control, maintenance and aircraft, improving awareness and predictability throughout airports
H
oneywell has recently announced new smart airport technology that helps enhance the safety and efficiency of airside operations. The Honeywell NAVITAS™ software suite intelligently integrates air and ground traffic control with maintenance operations so airports can more easily accommodate growing air traffic while promoting safety and on-time performance. Developed to comply with the latest industry standards set forth by organizations – including the International Civil Aviation Organization (ICAO), European Aviation Safety Agency (EASA), International Electrotechnical Commission (IEC), Federal Aviation Administration (FAA) and European Organisation for Civil Aviation Equipment (EUROCAE) – Honeywell NAVITAS includes modular and scalable software components, combined with an intuitive user-
56
friendly interface, providing real-time insights for air traffic controllers and maintenance operators. The components assist personnel in visualizing and routing aircraft movements – from enhancing situational awareness about traffic conditions and more safely expediting
SecurityLink India ■ June 2018
aircraft turnaround times, to automating fault diagnostics for airside equipment – all despite the increasing complexity and stress associated with today’s airport operations. “Airports around the globe are seeing dramatic increases in traffic, and while that makes the world more connected, it increases complexity to ensure safe and reliable operations,” said Sonja Strand, Vice President and General Manager for Honeywell’s Global Airports Business, “NAVITAS helps orchestrate these complex environments like never before through mobile applications, dashboards and heads-up displays that are intuitive. By harnessing the power of the Internet of Things, we’re making data user friendly, and making airports smarter in the process.” The Honeywell NAVITAS modules include: ●● Honeywell NAVITAS Tower Man-
application/ case study
ager helps improve the productivity of air traffic controllers by enhancing situational awareness of airport surface operations. It gives controllers access to rich, real-time information on ground, air traffic and meteorological conditions, presenting the information in a single, easy-touse interface, and providing visibility into a multitude of traffic events while reducing the chance for error. The system helps manage the air traffic controller’s responsibilities, while making it easier to issue and track aircraft clearance information to keep landings and takeoffs safer and on time. ●● Honeywell NAVITAS Surface Manager helps airports get more out of their existing infrastructure by enhancing ground traffic safety, fluency and throughput in a wide range of weather conditions, while helping
to reduce their fuel burn and carbon footprint. The module also provides the software necessary for airports to use all four levels of an AdvancedSurface Movement Guidance and Control System (A-SMGCS), including surveillance, routing, guidance and airport safety support, along with enhanced movement conflict detection and resolution, which can include ‘follow-the-greens’ based guidance that automatically illuminates lighting on the tarmac to guide aircraft to clear taxiways. ●● Honeywell NAVITAS Engineering Manager helps engineers and technicians manage maintenance by enabling them to more effectively monitor system health, more easily perform fault diagnostics and to streamline workflows, which also often helps reduce operational costs. It features a mobile interface and au-
tomates the diagnostics and failure reporting, while simplifying manual tasks and reducing paperwork, giving personnel better visibility into the availability, reliability and performance of airside systems. Personnel can easily create, manage and issue work orders to expeditiously resolve issues and keep equipment up and running. ●● Honeywell NAVITAS Performance Manager features dashboards that allow airport staff to collaborate and analyze operations in line with key performance indicators. The module which is accessible both on premise and remotely provides access to a common base of holistic information and allows for the application of big data analytics for real-time and predictive insights, often enabling more efficient and informed decisionmaking.
New Roadmap Charts Path to Reduced Fire Hazards from Materials N
IST firefighters Justin Grossnickle and Martin Neal look over the end of a controlled test to study the impact of fire on cross-laminated timber buildings. CLT is a construction material identified in a new NIST report as needing more flammability research. Fire researchers tell that there’s a simple solution for reducing fire hazards and that is to eliminate flammable materials. If it doesn’t burn, the experts say, then there won’t be a fire. Of course, that
option isn’t very practical or realistic; after all, who wants to sit on a block of cement when one can have a cushiony recliner? A better strategy for reducing the thousands of deaths and injuries and billions of dollars in damage resulting from the more than a million fires each year in the United States is detailed in a new research roadmap published by the National Institute of Standards and Technology (NIST). The roadmap provides SecurityLink India ■ June 2018
guidelines for developing science-based approaches to solving numerous fire problems for multiple materials, from lightweight automobile composites to cross-laminated timbers, and prioritizes the most critical and urgent fire hazards to which they can be applied such as upholstered furniture. “Our hope is that this roadmap will help the global fire community develop research strategies and implementation plans for addressing fire and materials 57
application/ case study
problems, now and in the future,” said NIST Materials Research Engineer Rick Davis, one of the authors, “The roadmap identifies and describes the major challenges associated with these problems and then detailed potential solutions so that users such as designers and manufacturers can continue to create safer materials that still yield quality products with high consumer satisfaction and market profitability.” The research roadmap resulted from a recent NIST-led workshop that brought together key national and international stakeholders from industry, government, academia and public laboratories. Workshop attendees focused their discussions on four areas in which fire hazards are major concerns. They are innovative construction materials such as the growing use of cross-laminated wood for tall buildings, advanced polymers and composites such as polyester fabrics used in furniture and lightweight composites used in automobile bodies, next-generation fire retardants with an emphasis on those that suppress combustion without being health hazards, and transportation and infrastructure vulnerabilities such as fire risks on trains.
58
For each of these areas, the experts considered the direction of current R&D and how it may impact future fire hazard reduction goals such as developing new materials, establishing product flammability standards and advancing computational tools. They also addressed emerging technologies and practices such as the increasing use of high-energy density (lithium-ion) batteries that have been in the news for flammability concerns. The workshop participants agreed that the highest priority for future scientific studies and development projects in flammability should go to cross-cutting research approaches that can work against multiple hazards across a wide range of materials and applications. These are: ●● Real fire behaviors: To understand how the actual use of a product impacts its fire service-life (the fire resistance over the life of a product) and burning behavior; ●● Engineered fire-safe products: To enable the development of technologies that yield products compliant with flammability regulations for their entire lifetime; and
SecurityLink India ■ June 2018
●● Bench-scale and computational tools: To develop and use physical testing methods and computer modeling systems that accurately predict a material’s real-life fire behavior. The new roadmap strongly recommends that these research approaches be applied to the five most critical and urgent fire hazards as defined by the experts at the recent workshop. These are residential upholstered furniture, residential buildings in Wildland Urban Interface (WUI) communities, timber used for multi-storey buildings, passenger railway cars and insulation applied to the exteriors of high-rise buildings. “The workshop participants determined that these application areas should be prioritized for R&D because reducing flammability in all five should significantly reduce the overall losses from fires in the future,” Davis said, “The benefits from the new research roadmap, Davis said, could eventually be greater than just getting low-fire-hazard products to market. It’s our hope that the research resulting from the roadmap will lead to science-based quality control measures, testing procedures and performance standards for materials flammability, which in turn, should reduce the costs of making products, simplify regulatory compliance for manufacturers, and provide consumers with more fire-safe product choices.” Davis added that along with being actively engaged with its partners to promote and urge acceptance and use of the new roadmap by others, NIST has already begun putting it to work. “Based on extensive discussions with our in-house experts after considering the roadmap’s guidelines, we are planning changes in our upcoming year’s research and modifying our longterm strategies,” he said.
application/ case study
World’s Largest Cathedral Trusts Vicon To Delivering World-Class Security NYC’s Cathedral of Saint John the Divine upgrades to a Valerus VMS system
T
he Cathedral of Saint John the Divine, the largest Cathedral and fifth largest church building in the world has recently completed installation of a Vicon Valerus video management system to secure the Cathedral and surrounding 11.3 acre complex in Manhattan. As the seat of the Episcopal Diocese of New York, the Cathedral is the site of daily religious services, community programing and social outreach. It also plays host to a busy schedule of art exhibitions, concerts, receptions, public and private events and visiting dignitaries, who have included Nelson Mandela, the most reverend Desmond Tutu and President Bill Clinton. The new Valerus system, installed by the Long Island office of ITsavvy, an IT products and technology solutions provider, combines over 70 Vicon highresolution IP cameras, a Valerus application server and multiple recording servers. The system’s wide range of cameras includes models with powerful zoom that provide detailed coverage of surrounding city streets, and others chosen for their ability to perform well in the low and challenging light inside the Cathedral. Cameras also provide coverage of the Cathedral’s exterior, administrative and residential buildings that support the Bishop,
clergy and Diocese, a world-class textile conservation laboratory, visitor center, information booths, and surrounding grounds and gardens. The Valerus system is vital for providing safety for all visitors, staff, residents and students, as well as protecting the property and its many valuable artifacts. Cameras are particularly helpful in protecting the Cathedral from liability in slip-and-fall incidents. They also document, for the police, any incidents that arise from the Cathedral’s service to the mentally ill and indigent. Live and recorded video from the Valerus system is frequently shared with NYPD and local security forces from Columbia University and other neighboring institutions. Keith Hinkson, Director of Security at The Cathedral of Saint John the Divine says, “The searching feature is so much easier on Valerus, and we can see up to 99 cameras on one screen. This is SecurityLink India ■ June 2018
huge for an institution like ours. I can go from one camera to the next with no trouble whatsoever.” “Vicon is incredibly proud that a world-class institution as prestigious as The Cathedral of Saint John the Divine has entrusted its security to an end-toend Vicon solution including our latest Valerus software. Our participation in this project illustrates that Valerus can deliver security effectively to the most high-profile installations,” said Bret McGowan, Vicon’s Senior V.P. of Sales and Marketing. 59
application/ case study
Wisenet IP Network Cameras Chosen for Phase One of Concorde Istanbul Project
A
combination of Wisenet high definition SND-L6013R dome and SNO-L6013R bullet cameras has been installed throughout the Concorde Instanbul Project to create a safe environment for people who live, work and visit the area. Images from the cameras are transmitted to a central control room over a new IP network infrastructure where security personnel are able to view them 24/7 on large screen monitors. The images are also recorded and stored for 30 days on Wisenet network video recorders (NVRs), in case they are needed for evidence purposes. The contract to renovate rather than demolish five old and dangerous residential tower blocks as well as Fikirtepe’s commercial area, was awarded by the Ministry of Environment and Urbanisation to the main building contractor, Teknik Yapıspecilaise, who are experts in carrying out building works on risky
60
buildings. ITG Projects were subsequently chosen to implement the neighbourhood’s new video surveillance system and IP network.
Successful partnership
T
he video surveillance system was designed by Hanwha Techwin in cooperation with distribution partner EDS Electronics. “We are proud to have been chosen to fulfil the video surveillance requirements for the first phase of this major project,” said Vildan Keser, Marketing Manager for EDS Electronics, “The synergy we have with the Hanwha Techwin team, which has been established as a result of working together on many other projects, enabled us to deliver a highly effective solution.” The Wisenet products supplied for the project includes: ● ● SNO-L6013R 2 megapixel weatherproof network bul-
SecurityLink India ■ June 2018
let cameras which are ideal for monitoring public areas such as the corridors in residential tower blocks as they have a ‘Hallway’ feature for the monitoring of narrow vertical areas. They also have built-in IR illumination and WDR to capture high quality images in varying light conditions. The SNO-L6013R also features motion detection, privacy masking zones, audio support, PoE, an SD/ SDHC memory slot and LDC (lens distortion correction) which compensates for image distortion which can occur with wide angle lenses. ● ● SND-L6013R 2 megapixel IR dome cameras which share the same features of the SNOL6013R and are Both cameras utilise H.264 and MJEG compression and offer the flexibility to choose from a wide range of image resolutions to optimise video streams and significantly reduce the load on the network and data storage systems. ● ● XRN-2010 32 channel NVRs which have 8 internal HDDs that provide up to 48 terabyte of video storage and are able to support additional E-SATA/ iSCSI storage. The XRN-2010s are also able to support H.265, H.264 and MJPEG compression and are able to record and store images from 4K (12 megapixel) cameras should they be installed in future phases of the project.
application/ case study
Vehicle Access Control Equipment
Protect the 2018 Commonwealth Games in Australia Barriers protect major event venues including the main games stadium, Gold Coast Convention Centre, Athletes Village and core street closures throughout Gold Coast area
D
elta Scientific, the leading manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, has recently announced that Delta’s innovative MP5000 portable barrier systems were selected to protect people attending the 2018 Commonwealth Games. The Commonwealth Games, held during 4-15 April on the Gold Coast, Queensland, Australia, included 4,400 athletes from 70 Commonwealth nations throughout the world, competing in 19 championship sports. It was the largest sporting event in Australia since the 2000 Sydney Olympic Games. Organizers required a vehicle access system that could be rapidly deployed and would create secure vehicle check points that carried crash-certification. Security focus had begun years prior to the games. The focus went beyond hostile vehicle mitigation (HVM) measures to include various other identified security risks. Perimeter security measures were aligned with the recently implemented Australia and New Zealand Counter Terrorism Committee (ANZCTC) strategy for the protection of places of mass gatherings. A core element of this strategy was the effective and practical implementation of HVM measures at key locations. As the Australian partner of Delta Scientific, Knight Brothers Pty Ltd secured the contract for the vehicle barrier systems in late 2017 and liaised closely with organizers to ensure that specific security measures could be achieved through implementing Delta’s unique barrier systems. “Barriers protected major event venues including the main games stadium, Gold Coast Convention Centre, the Athletes Village and critical street closures throughout the Gold Coast area,” reports Matthew Knight, director of Knight Brothers, “It was important for the Games’ operations that access for emergency and authorized vehicles was maintained through the duration of the event. “The primary use of the 20-foot (6m) Delta portable barriers was in public areas where ground fixation or insitu HVM measures were not practical or achievable,” Matthew Knight adds, “Barriers were deployed in a variety
of configurations in order to meet security and access needs. This included direct access points as well as heightened temporary security check points with stringent vehicle inspections undertaken by Australian Defense Force personnel. Secure access points at other locations were operated by contracted security personnel.” Delta’s MP5000 portable barricades can be installed in 15 minutes or less to protect streets, entrances or wide expanses such as access to pedestrian areas. They protect people and critical infrastructures at public events and places of mass gathering such as the Commonwealth Games. These mobile deployable vehicle crash barriers carry a recognized K8 rating (M40 ASTM rating). They lower to let vehicles through but, when raised, they will stop a 6800 kg vehicle traveling 64 km/h. At the Games, stand-alone battery operated hydraulic systems with supplementary solar power charging and remote-control operation activated the barriers and allowed a high rate of vehicle throughput in meeting specific operational requirements. Knight Brothers worked closely with Delta Scientific to adapt certain elements of the barrier systems to meet the needs of the Commonwealth Games. This included the ability to externally power the system through Australian compliant methods such as mains power or solar power arrays. “Training of barrier deployment and operation was conducted directly to Commonwealth Games security staff during barrier delivery and commissioning. This ensured seamless integration of the systems across various deployment locations,” reports Daniel Knight, Director of Knight Brothers, “We were very proud to be a part of this prestigious sporting event and to provide the first known deployment of portable active vehicle barriers systems on Australian soil. With the continued support of industry leading Delta Scientific, we look forward to expanding our offering to Australian event and venue organizers, to enable them to meet their ever-increasing requirements of temporary HVM measures.”
SecurityLink India ■ June 2018
61
application/ case study
Video Analytics Technology
Helps Reduce Neighborhood Crime For New York’s Long Beach Housing Authority
A
vigilon Corporation has been selected by the Long Beach Housing Authority (LBHA) to improve safety for its residents in Long Beach, New York, USA. Committed to providing high-quality housing assistance to its residents, the Long Beach Housing Authority is a government-managed public housing project that owns and manages over 370 affordable rental units. To enhance resident safety, the LBHA installed a complete Avigilon surveillance solution that includes Avigilon HD Pro, HD dome and HD multisensor cameras, as well as Avigilon Control Center (ACC) video management software and Avigilon network video recorders. The LBHA system features Avigilon cameras with patented Avigilon self-learning video analytics including the award-winning 4K HD Pro camera. Providing high image quality and accurate detection of people and vehicles in critical areas, these cameras notify security staff and allow them to zoom in and quickly identify and respond to potential security events. Avigilon HD multisensor cameras were also chosen for their flexible design, which can capture multiple angles of street and property areas up to 360 degrees, enabling maximum scene coverage while minimizing blind spots. Using advanced search capabilities in ACC, LBHA’s operators can quickly search for and identify people and vehicles of interest, saving time and effort during critical investigations. “We’ve seen a dramatic 70 percent reduction of crime in our housing development since installing Avigilon’s surveillance system,” said Mike Cruz, Executive DirecThe Long Beach Housing Authority installed a complete Avigilon security solution, helping to reduce neighborhood crime by 70 per cent tor for the Long Beach Housing Authority, “With Avigilon’s self-learning video analytics and clear video footage, we’re able to quickly and effectively find the critical evidence we need to assist police in investigations, helping make our neighborhood a safer place.” “The demand for video analytics is increasing globally, and we believe that all video surveillance systems will eventually feature video analytics,” said Dr. Mahesh Saptharishi, Avigilon’s Chief Technology Officer, “The solution deployed by the Long Beach Housing Authority is a great example of how Avigilon self-learning video analytics are increasing the effectiveness of a security system.” 62
SecurityLink India ■ June 2018
AutonomouStuff Deploys Quantum Storage Solutions To Empower End-to-End Autonomous Vehicle Development Storage kits powered by stornext multitier data management support autonomous driving research
Q
uantum Corp. has recently named AutonomouStuff LLC its primary partner for storage distribution in the automotive market, enabling them to deliver Quantum's comprehensive end-toend storage solutions for both in-vehicle and data center environments. Quantum's StorNext®-powered scale-out storage provides high-performance ingest of data into the data center when test vehicles return to the garage, thereby speeding time to result for sensor-generated in-vehicle data. Quantum in-vehicle storage is designed to fit the environmental and space requirements of autonomous vehicles. The combined solution enables AutonomouStuff to extend its offerings beyond in-vehicle solutions to include data center storage to support analysis and long-term data retention.
Active data management enables large-scale research
S
torNext solutions combine high performance storage with low cost archive storage to enable easy data integration and management for the transition between high performance analysis and long-term retention. With this type of active data management, large-scale projects are substantially more economically viable, lowering data storage costs by an order of magnitude.
application/ case study
Storage designed to scale with autonomous vehicle research requirements
Q
uantum has worked closely with AutonomouStuff and its customers to define and create a complete end-toend research solution that includes durable in-vehicle storage for test vehicles. The resulting solution is self-protecting, self-managed data center storage where analysis and solution development takes place. It also provides autonomous vehicle developers with an easy way to move data from test vehicles to the data center while achieving the lowest cost storage and delivering high-performance shared access, integrated protection and data life cycle management. Quantum's multitiered storage approach automatically places less active data on the most cost-effective storage media while active data resides on high-performance storage. This is critical for autonomous vehicle development environments that generate petabytes of data which needs to be retained for many years to meet regulations and to validate algorithms as designs evolve. Bobby Hambrick, Founder and CEO, AutonomouStuff said, “Autonomous research generates an enormous volume of data which is vital to achieving the goal of a safe autonomous vehicle. Quantum multitier data storage kits powered by StorNext offer a highly scalable and economical solution to the data dilemma researchers face.” Molly Presley, Vice President, Global Marketing, Quantum said, “The promise of safer, more autonomous vehicles has captured the public imagination, and intelligent storage solutions are key to delivery of that promise. In partnership with AutonomouStuff, Quantum is in the vanguard of delivering storage solutions that balance performance with cost to help advance research of significant value to society.
New HD Video Recording and Management Solution for Passenger Rail Fleets arch Networks® has recently announced the March Networks RideSafe™ RT Series IP Recorder, a new video recording and management platform designed to help passenger rail operators improve security and incident investigation using integrated high-definition (HD) video and vehicle data. Available in two 20-channel models – the RT20E and the RT20EP with eight PoE ports for vehicles that require integrated camera power – the RideSafe RT Series IP Recorder is ideal for rail fleets ready to transition to scalable, all-IP video capture. It provides operators with sharp megapixel video evidence at a full 30fps per channel, and time-saving video and data extraction over Wi-Fi or 4G wireless networks. The recorder complements March Networks’ complete video solution for mobile and wayside environments, which also includes mobile IP cameras, user-friendly client software and video systems designed for use in stations and other transit facilities. All of the products integrate seamlessly and can be centrally managed with powerful March Networks Command™ Enterprise video management software. In addition, March Networks mobile and fixed recorders come with all channel licensing included, providing rail operators with a convenient, plug-and-play platform right out of the box. “March Networks has spent more than a decade designing and delivering high performance, highly reliable video systems to rail and transit operators worldwide,” said Réal Barrière, Transit Solutions Product Manager, March Networks, “This new RideSafe RT Series solution delivers all the benefits of our accumulated expertise, as well as the advanced integration and investigation capabilities necessary for successful fleet management.” Continuing the company’s commitment to video solutions that enable better operational intelligence and risk mitigation, the March Networks RideSafe™ RT Series delivers innovative search and investigation capabilities through integrations with leading Train Control and Management Systems (TCMS), Passenger Information Systems (PIS), GPS and other peripheral devices. Rail operators can use the Command software to search for recorded events including emergency brake activation, speed, location and driver-tagged incidents, and review these incidents along with the associated video. The combined video and data enables fleet operators to investigate complaints, liability claims and other events quickly and cost-effectively and resolve disputes with the help of compelling video evidence. They can also use the investigation tool to proactively identify and address potential issues such as a malfunctioning door, before an incident occurs. In addition, the recorder is purpose-built for reliable operation in demanding rail environments, incorporating features such as an embedded Linux OS, solid state drives, front panel diagnostic LEDs, an optional battery backup, and real-time system health monitoring. It is also compliant with multiple environmental, electromagnetic (EMC) and shock/ vibration regulatory standards, including EN50155.
M
SecurityLink India ■ June 2018
63
application/ case study
Strengthening Trust Next-Generation Security-on- in Smart Energy
a-Chip for Smart Things
Comes with Certified Protection Profiles for European Utilities
S
TMicroelectronics has brought together the latest digital security techniques in a single chip to protect smart things and networks including those for utility infrastructure against cyber threats. Focused on providing state-of-the-art security for connected objects, the STSAFE-J100 gives the object an unalterable identity that can be authenticated; it also handles encrypted communications and provides secure storage. It is easily integrated in IoT (Internet of Things) devices like smart meters, data concentrators, and utility gateways. Customizable with market-specific applets, the STSAFE-J100 secure element combines CC EAL5+ certified hardware and a CC EAL5+ certified secure operating system. Device designers can take advantage of the freedom to create their own security profiles, or get to market faster using ST’s pre-certified profiles such as German BSI and French Enedis smart-utilities specifications. The STSAFE-J100 extends ST’s successful track record in robust, user-friendly, hardware-digital security for e-government, transportation, banking, and consumer projects, with over 1 billion embedded secure elements delivered yearly to protect devices and networks worldwide. “Today’s on-line services and connection to remote objects need a high level of protection against ever-evolving cyber threats. It is crucial to offer device makers state-of-the-art security for a minimum integration effort,” said Laurent Degauque, Marketing Director, Secure Microcontroller Division, STMicroelectronics, “The flexible STSAFE-J100 solution raises the bar with extra performance and support for the latest encryption algorithms and security standards, including security profiles for the important German and French smart-metering markets.” To help customers take full advantage of the flexibility of the STSAFE-J100 and ensure uncompromising threat protection, ST provides secure device-personalization service. Personalizing each device with its unique identity and cryptographic keys is a fundamental part of the secure-element philosophy to create trusted hardware resistant to cloning or hacking. ST’s service is safe and costeffective, and relieves customers of responsibility for secure programming, preventing exposure of keys and secrets, and distributing programmed devices. The STSAFE-J100 occupies minimal real-estate on the main system board, in either a 5mmx5mm VFQFPN32, 6.0mmx4.9mm SO8N, or 4.2mmx4.0mm UDFN8 package. 64
SecurityLink India ■ June 2018
With its new end-to-end security solution Award-winning dedicated smart energy offer provides reliable connectivity, secure digital identities, ensuring sensitive data integrity and confidentiality over the long life of smart energy assets
G
emalto is strengthening trust in the smart energy sector with an endto-end security solution which protects the entire ecosystem. Deployed by smart meter makers and distribution systems operators, the offer provides seamless connectivity solutions, secure digital identities and security lifecycle management for the long life of smart meters, as threats and stakeholders evolve over time. The solution protects connected energy assets and the data they exchange, allowing people and businesses to trust the expanding smart grid.
Secure smart grids improve sustainability, efficiency and reduce threats
T
oday’s highly successful smart grids have become comprehensive IoT networks with millions of connected meters that share massive real time data about people, businesses and energy consumption. The valuable insight they provide enables consumers to save on energy bills and utilities and energy players to better balance supply and demand. It is also crucial information to help integrate renewable energy sources, improve sustainability. As the
application/ case study
marketplace and number of connections continue to expand by an estimated 30% each year, so does the cyberattack surface. The motivations for hacking this critical infrastructure are high and diverse such as energy consumption fraud, insight into households’ activity and absence, grid instability, pressure on governments, ID theft. Digital security is paramount to an efficient grid’s success.
Gemalto protects and secures the expanding smart grid sector
T
he dedicated Gemalto cybersecurity solution for electric utilities establishes a foundation of trust at the very core of the ecosystem by establishing end-to-end security between energy meters, data concentrators and energy companies’ back-end systems. Rugged and reliable IoT connectivity modules ensure 24/7 data availability. A strong and unique digital identity system is implemented at the manufacturing stage to ensure devices and applications can strongly authenticate themselves, proving their legitimacy to access sensitive data. Leading-edge encryption technology safeguards against data tampering and strong security lifecycle management enables remote security and data access updates, without costly truck rolls. “The smart energy ecosystem is one of the most advanced in terms of security requirements because of the potentially disastrous consequences of malicious hacking,” said Guillaume Lafaix, Senior Vice President Mobile Services and IoT, Gemalto, “The Gemalto cybersecurity solution for utilities ensures the integrity and confidentiality of smart meter data while defending against hacking and emerging threats that are typical to this business.”
Renewed Sponsorship of Spanish Cycling Club P
ACOM, a STANLEY product and technology company and leading provider of security and access control solutions, has renewed its sponsorship of a Spanish cycling club. Valencia-based Club Ciclista DoYouBike-PACOM will once again benefit from investment in its equipment and activities, while PACOM’s corporate identity will feature prominently on members’ cycling jerseys and other collateral to enhance its brand awareness. Club Ciclista DoYouBike-PACOM was founded in 2012 as a way to allow likeminded cycling enthusiasts in the region to meet, share their love for the sport, improve their times and enter various team-based events. Now a medium sized club with 45 members, it participated in over 40 events throughout Valencia and beyond in 2017, mostly in mountain biking leagues such as Circuito BTT Serranía, which has 10 races during the year. Club Ciclista DoYouBike-PACOM is also represented in Circuit MTB Valencia and Circuit BTT La Ribera, and has taken part in Orbea Monegros, 24h CycloCircuit, Titán de la Mancha and Vuelta Cicloturista Valencia. Miguel Ángel Garcia, General Manager at PACOM España said, “We are delighted to once again have the opportunity to sponsor and support Club Ciclista DoYouBike-PACOM. One of our colleagues has been a member since the club first formed, so we all feel a great sense of attachment to it and have seen it achieve a number of notable successes. In 2017 the club achieved third position overall in the teams category of Circuito Serranía BTT, being the largest team in one race and the third largest in two others, and we look forward to watching it build on these achievements during 2018.” Already this year Club Ciclista DoYouBike-PACOM came second in its first race at Marcha BTT Marines (Circuit MTB Valéncia) and aims to build on the third position achieved at Circuito Serranía BTT. PACOM’s sponsorship will help the club in these objectives by elevating the club to the next level, improving its overall infrastructure and helping to attract new members. James Ford, Marketing Director at STANLEY Product and Technology, concluded, “We are very proud sponsors of Club Ciclista DoYouBike-PACOM and I wish all of its members the greatest success for this season and beyond. Not only does sponsorship allow us to support the club in its activities, it also contributes towards our corporate social responsibility based objectives and improves awareness of our position as the foremost provider of security and access control technology.” SecurityLink India ■ June 2018
65
application/ case study
Automated Border Control in Colombia Gemalto’s biometric authentication technology revolutionizes automated border control in Colombia
G
emalto and INCOMELEC SAS, a Colombian partner, are transforming the immigration and border crossing in Colombia through biometric iris verification implemented by Migración Colombia, the country's border control agency. This innovative solution was launched in February with a pilot program at Bogota’s El Dorado International Airport. The Automated Border Control (ABC), known locally as ‘BIOMIG,’ is benefiting both citizens and border officials. Gemalto’s ABC speeds identity authentication and significantly reduces bottlenecks in the immigration process while maintaining strong security control for each traveller.
66
Gemalto ABC Iris solution secures and speeds immigration
A
growing majority of airport arrivals in Bogota – up to 60% – are Colombian citizens re-entering the country. This often results in long immigration queues, congested waiting areas and travel weary citizens. ‘BIOMIG’ mitigates these challenges while complying with Colombia’s stringent border control security requirements.
How does it work
T
he solution integrates a highly intuitive iris recognition terminal that allows swift long range iris capture from 35 to 45 centimetres away.
SecurityLink India ■ June 2018
This eliminates physical contact with the terminal and improves comfort and ease of use. To use the service, Colombian citizens aged 12 and older only need to visit one of 30 BIOMIG enrolment stations at the airport as they exit the country. In less than one minute, their unique iris scan is securely registered with Colombia's Border Management System (BMS). When re-entering the country, previously enrolled citizens simply enter their national ID number on a touchscreen integrated with an automated door barrier by INCOMELEC, SAS. After a quick glance at the iris reader terminal, identity is validated via a secure digital process and the automatic doors swing open. Gemalto has supported Migración Colombia with state-of-the-art solutions for secure document authentication, biometric solutions and software integration for their border operations. “The challenge with border control solutions is to minimize and simplify immigration procedures while improving ease, speed and convenience for end users – without compromising security. This is exactly what the ABC Iris solution achieves,” said Francesc Ortodo, Sales Director for Government Programs Latin America at Gemalto, “Colombian citizens can now benefit from strong biometric security within a trusted environment.”
application/ case study
2018. September 19, 20 & 21 BOMBAY EXHIBITION CENTRE - MUMBAI, INDIA
Unique pla orm with unparalleled business & networking oppo unity for professionals involved in the Safety and Security Industry
www.capex.co.in / www.future-cities.in For space booking, pa nership, delegate registration and speaking oppo unities: Vijay +91 98 3377 2109 / vijay@fai est.in Nikita +91 98 1910 7179 / nikita@fai est.in *Future Cities is the mega event that will present for the first time in India a 360 degree vision of the built environment: Municipalika - 15th edition of Sma & Sustainable Urban Solutions CAPEx - Innovative Building Materials & Technologies IIPM - India's first andSecurityLink the onlyIndia B2Bâ– event for the real-estate sector 67 June 2018
white paper
Video Surveillance System
Smart Coding Technology By Prasenjeet Bhattacharya – Business Head, Surveillance & IP Products, Panasonic India
ideo surveillance techniques since the launch of IP cameras have seen many technological advances that have delivered increased resolution and improved picture quality through better lenses, sensor and image processing technology. These advancements are capable of bringing much needed improvements in evidential image quality and enable the user to realize the investments made in CCTV through deliverable results in terms of clear identification. Delivering these advancements requires additional design thinking in terms of total bit rate throughput. Typically higher resolutions FHD & 4K require much greater bandwidths that impact on the design and cost of both the network to stream high definition images across and the recording hard drive capacity needed to store them on. System designers now not only need to think in terms of the angle of view or depth of field that a camera needs to produce but also to think of the content within the camera image in terms of what is useful and what is not. For example, streaming and recording scenes in high definition of empty streets devoid of movement, people or cars, or the skyline create lots of useless image data that requires lots of bandwidth to stream and store. Panasonic have now developed a cost viable solution to the high definition bandwidth problem by enabling important content to stream as high definition whilst economizing or eliminating on unimportant content in an image. This technology is called Panasonic Smart Coding and its employment reduces the total cost of ownership and makes the investment in high definition within the reach of a much wider section of the video surveillance marketplace.
●● Technology that assigns high resolution data to important content such as people or cars. ●● Technology to reduce noise generated in low-illumination environments or at night, therefore eliminating the streaming of noise seen as movement in current compression algorisms. As we are eliminating the unnecessary streaming or high resolution data, even greater results in overall bit rate throughput can be saved by combining Smart Coding with Panasonic high-resolution 4K surveillance cameras. Panasonic’s Smart Coding Technology is based on the coding of the moving video standard, and as such special modules and the likes are not needed for display or playback by a client who is employing this technology. The two technologies that make up the Panasonic Smart Coding innovation are made of several elements that are described as follows;
Smart Coding Technology
GoP Control
S
he video stream comprises I-frame data encoded closed in the screen (as still image) and P-frame data where the difference from the previous frame is encoded. If the refresh cycle is set to 1 second (the default setting for Panasonic
V
mart Coding is a license free feature available on Panasonic i-PRO and i-PRO Extreme cameras. Total bit rate throughput can be reduced by combining the two main technologies that make up the Panasonic Smart Coding innovation; 68
Technology to assign data only to subjects to be monitored
B
it rate is sufficiently assigned to subject matter that is important such as people or cars, and therefore it needs to be streamed and recorded as high definition video. However, so-called background elements such as walls and roads are not so important therefore they don’t really need to be as sharp as content, and so a lower or no bit rate is assigned to them. Overall the total bit rate that needs to be streamed and recorded is reduced. This technology uses various techniques to accomplish the overall reduction in throughput.
T
SecurityLink India ■ June 2018
white paper
cameras) at a frame rate of 30fps, stream data is generated where 29 P-frames follow after one I-frame. The data from this I-frame to the next I-frame is called Group of Picture (GoP). To playback stream data generated in this way, decoding must be done in order from the I-frame. For that reason, the I-frame is also called the reference frame. If the refresh interval (interval between I-frames) is long, much decoding is performed until playing back the end frame of that GoP. I-frames encode the entire screen, so the volume of data is large. P-frames encode the difference from the previous frame, so the volume of data becomes smaller.
Advanced mode utilizes the concept of long term prediction frames. Its reference frame structure consists of I-frames, and P-frames, which reference two frames (an I-frame and the previous P-frame), and key frames (P#30,#60), which reference the first I-frame (IDR) in the GoP. Figure 4 shows the reference relationship at 30fps with an I-frame interval of 60 sec and key frame interval of 1 sec.
Figure 4: reference frame structure of Advanced mode
If there are no key frames in the GoP, decoding needs to be done sequentially from the I-frame at the head of the GoP. However, key frames can be decoded using just the I-frame. For example, if key frames are present in the GoP, #61 can be displayed by decoding just IDR#0, P#60, and P#61. Additionally, by inserting key frames, random accessibility can be secured. The advanced mode improves prediction efficiency by using two reference P-frames and reduces the bit rate by expanding the I-frame interval whilst maintaining random accessibility.
Figure 1: The image of video stream
Auto-VIQS Control Figure 2: The encoded volume of I-picture and P-picture
The GoP Control function detects motion of subjects. It makes the interval between I-frames shorter if there is a motion or longer if there is no motion. By making the interval longer in scenes with no motion, the number of I-frames with large data volume can be reduced, greatly reducing the total bit rate. In scenes with motion, the interval is made shorter to secure accessibility to scenes the user wants to view.
A
uto-VIQS (variable image quality on specified area) Control can automatically deter mine areas with and without motion and therefore reduces the data volume of those without motion. In the example below Auto-VIQS has realized two areas of importance that have a lot of movement (seen in red) and one area of little or no movement (seen in yellow).
Figure 5: Left: Original image. Right: The image is an example of a separate still area and an area with motion
Smart facial coding
S Figure 3: The difference of I-frame insertion interval
mart facial coding reduces bit rate by detecting the face and motion areas and keeping the face area at high image quality, slightly reducing high-frequency components of the motion areas, and reducing high-frequency components of other still areas.
SecurityLink India â– June 2018
69
white paper
Figure 6: Smart Facial Coding explanatory diagram
Smart Facial Coding and Auto-VIQS can be selected independent of GoP control on H.265 cameras.
Noise reduction technology for Panasonic H.264 cameras
N
oise from image sensors at night or in other low-illumination environments causes unnecessary data volume as noise is seen as movement with current compression technologies. The data created rises in volume with higher resolution cameras like 4K that are often less effective at low light and therefore create more noise. Panasonic have created two technologies to provide a more effective response to noise generated which when employed can reduce data volume by 20% in comparison with conventional camera noise reduction techniques.
old, and estimating a noise model in advance. Pixels with a signal level lower than the threshold are averaged with the surrounding pixels to reduce noise. A Bayes mathematical estimation is then performed on the estimated noise model and the noise model that shifts in the time axis direction. If the pattern’s are similar, they are reduced as noise; if they differ, the after image is minimized as motion. Up to approximately 25% of data can be reduced by this function
FDF
F
requency Divided Filter (FDF) analyzes frequency and reduces fine noise that is generated at slightly low illuminance to achieve low bit rate. Images are divided into multiple bands, and an optimum coring filter for each is applied to enable noise to be reduced while leaving edge components. Up to approximately 25% of data can be reduced by this function.
Figure 8: The image diagrams for the description of FDF
3D-MNR
3
D-Multi-process Noise Reduction (3D-MNR) analyzes differences in signal levels and reduces grainy noise generated in low-illuminance environments to achieve a low bit rate. Noise generation patterns can be estimated and predicted by individual luminance level using Panasonic’s own noise reduction algorithm. Noise generated when increasing gain to secure brightness in video is reduced by individual pixel accurately and in fine detail.
Figure 9: The outline flow of FDF processing
Conclusion
S
Figure 7: The image diagrams for the description of 3D-MNR
First, noise detection is performed with high precision by creating statistics for the difference of the signal level of the surrounding pixels by luminance level, deciding the thresh70
ince 1957, Panasonic has over 50 years of experience in the surveillance camera industry and has served a broad range of customers around the world. Based on the Panasonic group’s intellectual properties and technologies, Panasonic, the leading company in the audio and video solution market, continues to develop better video surveillance systems. Panasonic’s Smart Coding is a technology to reduce video surveillance system costs. It concentrates data volume into that for important scenes and areas, and it reduces data volumes for scenes and areas without motion as well as reduces noise in low-illuminance situations, enabling data volume to be reduced.
SecurityLink India ■ June 2018
feature
Examining Implementing Mobile Credentials in the Access Control Market T
here are several factors that make the widespread adoption now difficult, the first of which is the pitfalls of different phones and the platforms on which they run. Not everyone carries the same type of phone – or even a smartphone. When you have 3,000 people in a company who all need credentials to access a facility, it is rarely feasible to give each person a phone that will run the application needed. Another consideration is how to handle visitors and contractors that might require short- or long-term access to a facility. Perhaps more obvious is the challenge that emerges when a mobile device runs out of battery, thereby rendering it useless when trying to access a facility.
their information with regards to location-based data, or where an employee is at any given moment. Naturally, with this level of access to personal information, there’s going to be a concern about how that data is used. While there is definite movement in the direction of mobile credentials across enterprises, another issue is the proprietary nature of the technology. Since it’s still emerging, there are no common standards in place that police can use, so end users that choose to invest in the technology are often locked into a single manufacturer’s system without the flexibility that more open-platform solutions allow.
Considering privacy
Addressing these concerns
A
nother challenge end users face when considering implementing a mobile-based access control solution is the concern employees may have regarding privacy. When using mobile credentials on a private mobile phone, there’s a certain level of access an employer has to the phone. Employees are concerned as to how employers are using
M
any end users are now shifting toward a hybrid approach to access control that utilizes both traditional badges that allow access to a facility, as well as the option to use their mobile device as their credentials. The argument is that many employees will have their phones on them at all times, but might not always remember a badge or ID. Having the option to use either solution is becoming a more widespread use of mobile-based systems. With regard to privacy concerns, it’s important for security managers to work closely with human resources and other C-level executives to implement best practices for the use of this technology in an effort to better inform employees and guide implementation. SecurityLink India ■ June 2018
Customer point-of-view
W
e are seeing an increasing customer demand for mobile credentials, so it’s important to understand their needs when discussing which access control solutions are ‘right’ for an organization. Many want the flexibility to offer multiple options to their employees, but again, have to consider the privacy implications as well as the technology involved in trying to implement such a solution. Another consideration is the actual physical implementation. Most mobile based credentialing systems are built with bluetooth, which has a long-range capability; and this can be problematic. For example, turnstiles that are in close proximity to each other might pick up credentials that are a greater distance away. Standards such as near-field communications (NFC) that can be found in a lot of devices can address some of these concerns, but NFC’s ability to be used openly in an iPhone environment is not fully established and therefore isn’t a viable option unless the same kind of devices is used across an organization. 71
International Updates
Americas: Hundreds of Human Trafficking Victims Rescued
N
early 350 potential victims of sexual exploitation and forced labour have been rescued in an INTERPOL coordinated operation targeting human trafficking in the Caribbean, Central and South America. More than 500 police officers in 13 countries also arrested 22 individuals during Operation Libertad (3-9 April), held under the INTERPOL Project to combat human trafficking in the Caribbean. The Joint Regional Communications Centre (JRCC) in Barbados hosted the operational coordination centre, with specialist officers from INTERPOL’s Trafficking in Human Beings unit deployed to the region. Support was provided by the INTERPOL Command and Coordination Centre at the General Secretariat in Lyon, France and at the INTERPOL Regional Bureau in Buenos Aires, Argentina. In addition to coordinated police raids, searches were carried out against INTERPOL’s criminal databases, generating 30 hits, including 25 for stolen and lost travel documents. Computer equipment, mobiles phones and cash were also seized. “Operations like this show the power of INTERPOL providing a platform for the 13 participating countries, but what sits behind these numbers is the human story,” said INTERPOL Executive Director of Police Services Tim Morris, “Whether it is someone’s mother, father, brother, sister, son or daughter, there is an intensely personal story that is usually unfortunately accompanied by a lot of sufferings.” 72
Targeting the most vulnerable
B
oth men and women, including minors, were discovered working in night clubs, farms, mines, factories and open-air markets. With thousands looking to cross borders in search of work, traffickers are targeting the most desperate and vulnerable members of society with promises of a better life. Cem Kolcu, Coordinator of INTERPOL’s Trafficking in Human Beings unit, said, “What traffickers don’t advertise are the working conditions their victims will be subject to once their final destination is reached. During this operation, we identified women being forced to work out of spaces no bigger than coffins, for example.” In Guyana, young women were found working as prostitutes next to extremely remote gold mines, from which they could not escape. This is a common modus operandi as the geographical location of the mines also complicates investigations. “Isolated locations make it difficult for officers to avoid detection when travelling to these camps. By the time intelligence is acted upon, perpetrators have had the opportunity to act and move the victims,” explained Diana O’Brien, Assistant Director of Public Prosecutions, Ministry of Public Security, Guyana.
A victim-centric approach
T
o ensure victims received the necessary care following their rescue, social services and NGOs were involved SecurityLink India ■ June 2018
in conducting post-operation interviews and providing support services to victims. Because they can earn more than they would in their home countries, some victims don’t identify as such, making it difficult to gather evidence and prosecute cases of suspected trafficking. Other victims are manipulated and intimidated into providing false information. In Saint Vincent and the Grenadines, Asian ‘employees’ at a factory had been stripped of their passports and made to be completely dependent. Having never received wages, they relied on their handlers for housing, transport, food and the most basic necessities. With similar examples across the region, this highlights the need to raise awareness amongst vulnerable communities in both source and destination countries and to ensure appropriate support mechanisms are in place.
INTERPOL global task force on human trafficking
T
he operation was the culmination of the two-and-a-half year project funded by the Government of Canada, which provided specialized training to investigators and immigration officers in order to enhance operational expertise and regional coordination to combat human trafficking. The programme is one of several projects under the INTERPOL Global Task Force on Human Trafficking, which received the backing of G7 Security Ministers last week.
International Updates
Record-Breaking Education Program for Global Security Exchange
Now in its 64th year, security’s flagship event to deliver 300+ sessions, from AI to Active Shooter
A
SIS International has recently announced the education program for upcoming Global Security Exchange (GSX). Produced in partnership with InfraGard and ISSA, the five-day event is expected to attract more than 20,000 operational and cyber security professionals to the Las Vegas Convention Center for a comprehensive education program, unparalleled networking, and an immersive exhibit floor showcasing thousands of cutting-edge security products and services. “This has been a record-setting year,” said Nancy Green, ASIS International Vice President of Learning, “We received a staggering 700+ proposals to our GSX 2018 call for presentations, and our program lineup features more than 300 sessions led by ASIS, InfraGard, and ISSA subject matter experts. This enthusiastic response mirrors the excitement we have been hearing from security professionals about the investments and enhancements we’ve been making to GSX, as the security industry’s flagship event.” Learning formats will include deep dives, case studies, lectures, mock trials, panels, simulations, and workshops. There will also be a spotlight on enterprise security risk management (ESRM), with education sessions ranging from in-depth pre-conference workshops to practical presentations that bring this business strategy to the dayto-day workplace. “There is an abundance of expertise
and hands-on experience represented among speakers and attendees at GSX,” noted Darren T. Nielsen, CPP, PCI, PSP, Chair, 2018 GSX Education Selection Committee, “The education program will tap into this collective wisdom, and learning will be bidirectional – a true exchange of insights and lessons learned.” A selection of topics being addressed include: ●● Securing Big Data in an Evolving Regulatory Landscape. ●● How Augmented and Virtual Reality Affect Security. ●● Ransomware: Managing Data Extortion Crises. ●● School Emergency Preparedness Using a Tabletop Exercise. ●● The Dark Web: Protecting Brand, Reputation, and Assets. ●● Surviving a Mass Shooting: Case Studies in Successful Tactics and Techniques. ●● The Psychology of Radicalization SecurityLink India ■ June 2018
in the Lone-Actor Terrorist: Making Sense of the Senseless. Education will extend beyond the classrooms with more theaters on the exhibit floor, as well as expanded Career Center programming and a career fair. An exciting addition in 2018 will be the X Stage featuring TED-style talks from global thought leaders, academia, and government officials. These sessions will address high-level, thought-provoking ideas around emerging risks and technology innovations that could fundamentally change the profession. More details will be announced this summer. “GSX brings the industry together to share ideas and engage in meaningful discussions,” stated Richard E. Chase, CPP, PCI, PSP, 2018 president, ASIS International. “Sessions are problem-centric/outcome-focused and designed to give attendees the opportunity to learn, interact, and most importantly, be part of the solution.” 73
International Updates
Updates Risk Management Framework to Incorporate Privacy Considerations A
Conversely, if you’re using the CSF, you can bring in the RMF and give your organization a robust methodology to manage security and privacy risks.” In addition to the RMF-CSF alignment, the update has several important objectives including: ●● Integrating security and privacy into systems development: Building security and privacy into information systems at the initial design stage is a major concern. The RMF also references NIST systems security engineering guidance at appropriate points, including NIST’s SP 800-160, which addresses the engineering of trustworthy secure systems. ●● Connecting senior leaders to operations: The RMF provides guidance on how an organization’s senior leaders can better prepare for RMF execution, as well as how to communicate their protection plans and risk management strategies to system implementers and operators. ●● Incorporating supply chain risk management considerations: The
74
SecurityLink India ■ June 2018
ugmenting its efforts to protect the nation’s critical assets from cybersecurity threats as well as protect individuals’ privacy, the National Institute of Standards and Technology (NIST) has issued a draft update to its Risk Management Framework (RMF) to help organizations more easily meet these goals. The RMF update, formally titled Draft NIST Special Publication (SP) 800-37 Revision 2, is a guidance document designed to help organizations assess and manage risks to their information and systems. Previous versions of the RMF were primarily concerned with cybersecurity protections from external threats. The updated version adds an overarching concern for individuals’ privacy, helping to ensure that organizations can better identify and respond to these risks, including those associated with using individuals’ personally identifiable information. The update will interest federal agencies and contractors that do business with them, as it connects the RMF with NIST’s well-known Cybersecurity Framework (CSF), highlighting relationships that exist between the two documents. “Until now, federal agencies had been using the RMF and CSF separately,” said NIST’s Ron Ross, one of the publication’s authors, “The update provides cross-references so that organizations using the RMF can see where and how the CSF aligns with the current steps in the RMF.
RMF addresses growing supply chain concerns in the areas of counterfeit components, tampering, theft, insertion of malicious software and hardware, poor manufacturing and development practices, and other potential harmful activities that can impact an organization’s systems and systems components. ●● Supporting security and privacy safeguards: The RMF update will provide organizations with a disciplined and structured process to select controls from the newly developed consolidated security and privacy control catalog in NIST’s SP 800-53, Revision 5 (link is external). Aligning the RMF with other NIST guidance and publications will provide clarity for federal agencies, which are required to implement multiple frameworks. While adhering to the CSF is voluntary for private companies, its use for the federal government is mandatory under Executive Order 13800. Compliance with the RMF is mandatory for federal agencies in accordance with the Federal Information Security Modernization Act (FISMA (link is external)). The RMF is also required and in widespread use in the Department of Defense and the intelligence community. “It was imperative for us to figure out how these frameworks fit together,” Ross said, “Many agencies are trying to follow both.” Ross added that the privacy enhanced RMF might be
International Updates
valuable to companies and organizations beyond the federal government, considering how high profile the subject of privacy has become of late. “Many folks are discovering how
vulnerable they are with respect to their personal information and may begin to demand some standard level of protection,” he said, “If such a demand occurs, the government will be looking for
clearly stated requirements for privacy, privacy safeguards, and a disciplined and structured process on how those controls could be applied. The timing of this publication could not be any better.”
Celebrates Global Adoption, Milestones of Success with 10th Anniversary NVIF®, the leading global standardization initiative for IP-based physical security products, is proud to celebrate its 10th anniversary, capping off a decade of growth and rising influence as a provider of interoperability standards to the physical security market. Beginning with a small group of competitive manufacturers who joined forces in 2008 and growing to 500 ONVIF member companies, ONVIF continues to refine and promote its specifications for interoperability between security technology devices and beyond. “We are so proud that what began as just a common mindset 10 years ago has transformed into everything ONVIF has become – a dynamic, member-driven organization dedicated to enabling interoperability and end user freedom of choice to select products from a variety of different security technology vendors,” said Per Björkdahl, Chairman, ONVIF Steering Committee, “Our official recognition and global adoption by the international standardization community, our crowning achievement, is a testament to the work of our volunteer leaders and supporting member companies, and a reflection of our prominence as the leading interoperability standard within physical security today.” ONVIF was founded as a technical alliance by Axis Communications, Sony and Bosch Security and Safety Systems,
O
and today has nearly 10,000 conformant products and a member base spanning six continents and 39 countries. ONVIF specifications have been adopted by such global standards bodies as the International Electrotechnical Commission (IEC) and Cenelec, and are becoming increasingly applicable in growing security and connectivity environments such as safe city initiatives, IoT applications and intelligent building automation. The alliance’s six Profiles cover the fundamental features in use in IP-based video surveillance and IP-based access control systems, as well as a growing list of more sophisticated functionalities in demand by the market. Profile S, for video streaming and configuration, as well as PTZ control, audio, multicasting and relay outputs for supporting conformant devices and clients, was the first ONVIF Profile released and remains the most widely used profile on the market today. In all, ONVIF has released six profiles, which include: ●● Profile S for video streaming, released in 2011. ●● Profile C for IP-based basic access control, released in 2013. ●● Profile G for edge storage and retrieval, released in 2014. ●● Profile Q for quick installation, released in 2016. ●● Profile A for broader access control SecurityLink India ■ June 2018
configuration, released in 2017. ●● Profile T (Release Candidate), for advanced video streaming, to be finalized July 2018. From its start in 2008, the ONVIF organization grew rapidly, attracting some 300 members and 1,000 conformant products by 2011. While the original focus was interoperability between components of an IP-based video surveillance system, the organization announced in 2010 it would expand its scope to IP-based physical access control. With a new breadth of product choice in place, the increased membership and conformant product levels showcased the expanding reach of ONVIF in the market. By 2015, ONVIF had grown to more than 5,000 conformant products, and between 2016-2017, the organization saw its largest increase in membership in a twoyear span. This year, ONVIF is preparing to exceed 10,000 products that conform to its Profiles. “The demand for connectivity between IP-based devices will continue to skyrocket, as industries begin to realize the efficiencies and actionable data produced by connecting IP devices within their organization,” according to Björkdahl, “This aligns well with the vision of ONVIF, that all security systems will one day share a single interface, and we are eager to help the industry realize this vision within our next decade.” 75
International Updates
Dahua Goes GDPR Compliant Achieves A Unique First in Global Video Surveillance Industry Certification demonstrates Dahua’s world class standard in information security & privacy protection
D
ahua Technology has become GDPR compliant and received the certification for its IP video products from TÜV Rheinland just a day before the General Data Protection Regulation (GDPR) comes into effect i.e., 25 May 2018. It means that its IP products are in full compliance with GDPR. Dahua is one of the first companies on the globe which has achieved this certificate. The General Data Protection Regulation (GDPR) is a set of new law by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union. It establishes strict, high-level, wide-scope protection standards for personal data.
Wherever a company is located, as long as it processes personal data of an EU citizen during the provision of products or services, it must comply with GDPR. TÜV Rheinland, an internationally renowned independent third-party testing, inspection and certification organization, held Cyber Risk Management Forum 2018 in Shanghai on 24 May 2018. The forum, started by Lutz Frankholz, Executive Director of TÜV Rheinland Greater China, is among the highest level that is themed on information risk in China and is joined by professionals from both business and academic circles. Dahua Technology participated in the forum together with many outstanding companies from multiple industries. They successfully applied for GDPR
Zhang Junchang Receives TÜV Rheinland Certification on behalf of Dahua Technology
76
SecurityLink India ■ June 2018
personal data protection standards and TUV Rheinland’s IoT security and privacy protection standard for products that are being shipped globally, including those that are shipped to countries and regions outside of EU. Zhang Junchang, Director of Cybersecurity Product Line of Dahua Technology, received certification towards IP video products on behalf of the company. This means the Dahua IP products are in compliance with the GDPR (EU, 2016/679) and meet the TÜV Rheinland 2PfG 2624/06.17 standard (covering IoT security and privacy protection requirements) which are world-class in information security and privacy protection. This allows Dahua Technology’s global users to enjoy surveillance products that have the same protection level as those in EU. This also means that customers who use Dahua Technology’s certified IP products are able to meet the GDPR standard. The certification procedure is closely related to the company’s whole management system. Its smooth carrying out showcased Dahua Technology’s emphasis on product quality and compliance. Dahua will relentlessly make use of its internal source as well as professional third-party partners like TÜV Rheinland to create more value to its customers and users. Dahua has also shared a white paper named ‘How Can Dahua Products Help Users Comply With GDPR.’
International Updates
2017 Annual Report Reveals
Free Safety-Design Package
Revenue Growth of 31.22%
For Faster Certification of STM32-based IEC 61508 Safety Critical Applications
S
TMicroelectronics is helping technology brands design safer applications, more quickly and cost-effectively, with new software for its successful STM32 microcontrollers. Created for designers of STM32-based devices in the field of industrial controls, robots, sensors, medical, or transportation, which must be certified up to Safety Integrity Level (SIL) 2 or 3 of the recognized safety standard IEC 61508, ST’s STM32 SIL Functional-Safety Design Package simplifies system development and certification. “To help our customers deliver safety-certified new products to market quickly and efficiently, we are making this high added-value, ST-designed comprehensive package including certified software available free of charge; an industry-first,” said Daniel Colonna, Microcontroller Division Marketing Director, STMicroelectronics, “Moreover, by providing this offer on our STM32 microcontroller portfolio, the SIL Functional Safety Design Package will give extra flexibility to our customers and help optimize their bill of materials.” The SIL Functional Safety Design Package, which comprises documentation and the X-CUBE-STL, a software Self-Test Library certified to IEC 61508 SIL3, is initially available for the STM32F0 series. ST will continue to introduce equivalent packages for all other series in the STM32 family throughout 2018 and 2019. There are currently more than 800 STM32 microcontroller variants that give product developers unique flexibility to optimize price, performance, and feature integration. TÜV Rheinland, a leading international certification institute for functional safety certification to relevant international standards, has positively assessed X-CUBE-STL-F0 according to the functional safety standard IEC 61508:2010. Swiss-based sensor manufacturer Contrinex is the first to use ST’s Functional Safety Design Package to certify safety products based on STM32F0 microcontrollers. “The proven robustness of ST microcontrollers, combined with the SIL functional-safety design package, is a comfortable choice for our safety product development,” said Nicolas Jouanne, Embedded Software Development Project Leader at Contrinex.
H
ikvision, the world’s leading supplier of innovative video surveillance products and solutions, has published its annual report for 2017. This shows a 31.22% growth in overall revenues, with sales revenue up from RMB 31.93 billion in 2016 to RMB 41.91 billion in 2017. Collectively, the figures demonstrate an increase in operating profits of 26.77%. Hikvision achieved these impressive financial results due to a number of factors which include optimized R&D systems and processes, development of solutions for vertical industry sectors, and customization of solutions in line with changing market needs. Improved product delivery capabilities and strengthened sales and service networks have also contributed to the company’s success in 2017.
Keen Yao, VP at Hikvision International Business Centre said, “Our investments in R&D, both in IoT technologies and video surveillance, enable us to continuously innovate our solutions and provide innovative, cutting-edge technology and products that are tailored to the needs of worldwide partners and customers.” In addition to major investments in R&D, Hikvision is setting up a three-layered service system, with a global customer service center, regional customer service departments in branch offices, and authorized Hikvision customer service stations. “Our new service model will enable us to better support customers around the world with multi-dimensional services including product delivery, project delivery, software deployment, system operation, maintenance and support, and more,” said Keen Yao.
SecurityLink India ■ June 2018
77
International Updates
Sales of PalmSecure Sensors Hit One Million Mark New milestone set for sales of the palm vein authentication sensor units
C
umulative sales of the Fujitsu biometric authentication PalmSecure palm vein authentication sensor series, manufactured and sold by Fujitsu Limited and Fujitsu Frontech Limited, has now broken through the one million unit mark. About 73 million people in approximately 60 countries around the world interact with this technology daily as a security measure for a broad range of personal authentication tasks, including for ATMs, PC logins, and room entry management. Palm vein authentication is a biometric verification method that can accurately and instantaneously confirm an individual’s identity by reading vein patterns in the palm of the hand without direct contact. This technology was first developed by Fujitsu Laboratories Ltd. in 2003, with Fujitsu and Fujitsu Frontech initiating sales in 2004. Since then, Fujitsu has refined the technology in a number of ways, improving the speed and accuracy of the sensor’s authentication and reducing the size of the sensor.
Fujitsu Group will continue to offer the palm vein authentication sensor, which simultaneously delivers advanced security and convenience, as well as various related solutions and services going forward.
Features Provides personal authentication that can be safely used with a high authentication rate
P
almSecure differentiates and authenticates individuals by their vein patterns, which differ for each individual. The technology takes advantage of a unique characteristic of hemoglobin (its absorption of infrared light and black appearance in infrared imaging) as it returns to the lungs through veins beneath the skin in the palm. Unlike other biometric authentication methods that use information on the outside of the body, this technology makes use of biometric data from inside the body, offering protection from falsification or spoofing. Fujitsu’s PalmSecure technology also delivers high authentication accuracy, with a less than 0.01% chance of rejection error (with one retry), and a less than 0.00001% chance of accepting the wrong person.
Works comfortably by just holding out your hand Major previous and current palm vein authentication sensors and equipment
78
A
uthentication of users takes an instant
SecurityLink India ■ June 2018
by merely holding their hand naturally over the sensor, making the technology easy to use. The sensor is also contactless, ensuring that the verification process not only remains sanitary, but also largely avoids the impact of external factors including abrasion or dirt on the skin of the hand, sweat, or dryness. PalmSecure makes verification and registration easy for users-vein patterns do not change after early childhood, meaning that users can continue to utilize this technology indefinitely once registered, eliminating the need for re-registration.
Future plans
G
oing forward, Fujitsu and Fujitsu Frontech will continue to enhance the accuracy of its PalmSecure palm vein authentication technology even further. By looking beyond the achievement of this most recent sales milestone, Fujitsu demonstrates its continued commitment to contributing to customer security measures, as well as to expanding the use of palm vein authentication technology around the world in a variety of contexts including in areas with increasingly high demand like cashless and cardless payments. As part of the Fujitsu Group, Fujitsu Frontech Limited ties people and ICT together through the development, manufacture and sales of front-end technologies such as ATMs, banking terminals, palm vein authentication system, RFID, totalizator terminals, and public display devices.
International Updates
Tackling Human Trafficking Focus of INTERPOL Training for Central Asia A
n INTERPOL training course targeting human trafficking and migrant smuggling across Central Asia has concluded in the Uzbek capital. The five-day (30 April – 4 May) event brought together law enforcement experts from 14 Central Asian countries to learn the latest investigative skills required to coordinate transnational responses to the region’s trafficking and smuggling challenge. With illegal migration into Central Asia becoming an increasingly serious security threat in the region, improving the exchange of police information and boosting the use of tailored INTERPOL capabilities was central to the training programme. The course also demonstrated how open source information and mobile fo-
rensics can help strengthen traditional investigation techniques.
A powerful network
A
s part of steps to boost regional police cooperation, the event also served to broaden ISON, INTERPOL’s Specialized Operational Network against People Smuggling which is made up of 145 experts from 111 source, transit, and destination countries. ISON includes experts, smuggling investigators, immigration services, specialized asylum seeker officers, border officials and customs officers.
Environmental scan
W
ith a view to producing countryspecific and regional reports on people smuggling and human trafficking
in Central Asia, INTERPOL is currently conducting an environmental scan in the region. As part of this scanning process, the training course helped improve working relationships with law enforcement in targeted countries and to establish stronger points of contact in each country.
Sustainability and outreach
M
anaged by INTERPOL’s Vulnerable Communities unit, the training was organized as part of the INTERPOL Foundation’s Vulnerable Communities Project aimed at boosting law enforcement capacity, delivering specialized training, nurturing interagency collaboration and organizing regional operational exercises.
Special Publication 800-202 NIST Publishes Guide on Mobile Test Devices for Digital Forensics
D
ata recovered from digital devices is often helpful in providing clues for incidents and potential criminal activity. For example, data found on a suspect’s computer, cell phone or tablet may prove to be crucial evidence in a legal case. Data extraction from mobile devices is tedious due to differences in data and formats from one device to the next. To address these issues, NIST has published a guide that describes procedures for documenting and populating test data on a mobile test device. NIST Special Publication (SP) 800-202, quick start guide for populating mobile test devices, is meant to be used with Federated Testing, which is an expansion of NIST’s computer forensics tools testing (CFTT) program. The CFTT tests computer forensic tools to ensure that they produce accurate and objective results. These tests can be implemented by anyone including the law enforcement community, utilizing the Federated Testing software. The goal of Federated Testing is to help digital forensics investigators to test the tools that they use in their labs and to enable sharing of test results within the digital forensics community. The goals of SP 800-202 are to provide guidance on how to document and populate test data on a mobile device for use in forensic tool testing, and provide guidance to select data elements for inclusion that ensure effective testing. SecurityLink India ■ June 2018
79
International Updates
Proposals at Global Robot Expo
Robotics and Intelligence for the Homes of today T
he most important multi-sectorial event on robotics and innovation, The Global Robot Expo was recently held in Madrid, Europe. Fermax, sponsoring the event, revealed the most human side of technology in the smart home space, the place reserved to show how smart homes are already within our reach, and that we can control them from our mobile phones. Considered the technology fair with the most promising future in the European market, Global Robot Expo has become an attractive meeting point, attended by top international lecturers and exhibitors from 30 countries belonging to an industry in full bloom. Drones and bionic prostheses, an android that does the shopping, submarine robots, 3D printers, industry 4.0, driverless cars and a lot of artificial intelligence were the protagonists. The event has become, in its third edition, a window through which to contemplate this future that is already here,
80
ready to transform everything – from the aerospace industry to education, not to mention our daily life at home. Housing had its own space designated Smart Home, a stand for all those innovations designed to make family day-to-day living more comfortable, safe and sustainable. There were the ergonomic sofas from FAMA, controllers for dependents from Asistae, smart mattresses by FLEX and the lawn-mowing or barbecue-cleaning robots manufactured by Smart Box. Not to mention the Dominium home automation systems from Fermax and the latest proposals from Hommax, which apply facial recognition technology to enhance security in its video surveillance systems. And, of
SecurityLink India ■ June 2018
course, Fermax also presented its latest touch monitors, interactive panels, home automation systems managed by voice recognition and its all-round access control systems and video surveillance cameras for the home. As experience is highly valued at this type of events, Fermax set up its stand with a permanent link-up to its facilities in Valencia. This way, it was possible to demonstrate to visitors directly how you can control a smart home remotely from a mobile app. “Raising blinds, changing the temperature, turning lights on and off or opening the door are some of the many functions that we can control from any mobile device,” explained Jesús Gutiérrez, in charge of Fermax Spain’s Prospection. The same expert commented that the brand has built up significant experience with facilities of this type rolled out in the powerhouse Asia-Pacific market and which are now becoming part for the course in Spain. With its presence in this special event, Fermax once again shows its ability to keep its philosophy alive – democratising the most innovative technology by placing it at the service of society as a whole.
International Updates
Vehicular GDPR Assurance Platform Service enables companies that use vehicular data to comply with EU regulation
T
rillium Secure, the leading global cybersecure automotive platforms, has recently announced enhanced privacy functionality to its SecureIoT platform that ensures compliance with the European Union’s General Data Privacy Regulation (GDPR). “GDPR focuses on those who control and process personal data of European citizens. Fleet owners that collect and store customer and vehicular data from connected vehicles are scrambling to comply or face significant penalties. Trillium’s SecureIoT platform provides the requisite data protection needed to ensure compliance with this pioneering legislation,” said Dr. Sachio Semmoto. GDPR mandates that people have the right to know about the data that has been collected about them and its purpose, and request its destruction. Individuals must be given the opportunity to opt out of having their personal information gathered and potentially shared. The legislation has especially severe impacts on the transportation domain where a data breach can have life threatening consequences. “Trillium is spearheading the movement toward protecting the human behind the technology. Our platform ensures that customer data gathered from connected vehicles is kept away from prying hacker eyes,” said Trillium Secure President and CEO, David Uze. Trillium Secure provides a multi-layered solution for hardening connected and autonomous vehicles against cyber-attacks. Trillium’s SecureIOT platform provides authenticated operational and threat management data from fleet vehicles that preserves privacy, confidentiality and anonymity of data while at rest and in motion. Valueadded service providers rely on secure and authentic data from Trillium for digital forensics, UBI, preventive maintenance, telematics, car sharing and other services. Trillium design centers and fleet security operation sites are located in Silicon Valley, Ann Arbor, Ho Chi Minh City and Tokyo.
New Acquisitions Pioneer Industries in US
A
SSA ABLOY has signed an agreement to acquire Pioneer Industries, a supplier of steel doors and frames for commercial applications in the US. “I am very pleased to welcome Pioneer Industries into the ASSA ABLOY Group. Pioneer Industries is a complementary addition to ASSA ABLOY. The company reinforces our strong position in North America and is an additional opportunity to provide a complete range of products for total door opening solutions,” says Nico Delvaux, President and CEO of ASSA ABLOY. “The addition of Pioneer allows us to fortify our steel door and frame offering in the US and in particular the Atlantic region,” says Lucas Boselli, Executive Vice President of ASSA ABLOY and Head of the Americas Division. Pioneer Industries founded in 1930, has approximately 100 employees. The head office and factory are located in Carlstadt, New Jersey. Sales for 2018 are expected to reach about USD 22 million (approx. SEK 180 million) with a good EBIT margin. The acquisition will be accretive to EPS from the start. The acquisition is conditional upon satisfaction of customary closing conditions and is expected to close during the second quarter of 2018.
Brüken in Mexico
A
SSA ABLOY has also acquired Brüken, a leading Mexican player in glass and aluminium hardware. “I am very pleased to welcome Brüken into the ASSA ABLOY Group. This constitutes an important next step in our strategy to grow market leadership in emerging markets,” says Nico Delvaux, President and CEO of ASSA ABLOY. “The addition of Brüken broadens our offering in the Mexican market and provides a source to enter the glass and aluminium hardware market in other geographies in the region,” says Lucas Boselli, Executive Vice President of ASSA ABLOY and Head of the Americas Division. Brüken was established in 2008 and has approximately 80 employees. The head office is located in Leon, Mexico. Sales for 2018 are expected to reach about MXN 570 million (approx. SEK 260 million) with a good EBIT margin and the acquisition will be accretive to EPS from start.
SecurityLink India ■ June 2018
81
International Updates
Thermal Camera Selected for
2017’s Top 10 Video Surveillance Products (by a&s) D
ahua TPC-BF2120 thermal mini hybrid bullet camera has been selected as 2017’s Top 10 Video Surveillance Products by a&s. The product ranked at second place.
Dahua Technology TPC-BF2120 Thermal Camera - TOP 10 Most Popular Video Surveillance Products in 2017
‘Top 10 popular Security Products’ of a&s, one of the most watched ranking in the global security industry based upon page views from asmag.com, was this year’s very first of this series. Ranking in the list required products to have adhered to a few guidelines. First, the products were uploaded to the asmag.com database between January and December of 2017. Second, the products were for professional security and no Wi-Fi cameras, cube cameras, DIY or cameras targeted at the smart home sector were included. Finally, only one product per company was chosen. After a comprehensive assessment, Dahua’s TPC-BF2120 thermal mini hybrid bullet camera stood out and ranked the second with 45% views coming from Asia. ●● Ranked second in the list of top 10 video surveillance products. ●● Product adhered to tough guidelines. ●● Honor a strong recognition of Dahua’s continuous effort on innovation. Dahua Technology’s TPC-BF2120 thermal camera uses thermal imaging technology, which is great for dark and small area monitoring applications. The series combines one thermal camera for monitoring in total darkness and one visible camera with smart IR for confirming details. It also supports behavior analysis, fire detection & alarm functionalities. 82
SecurityLink India ■ June 2018
GJD Takes Part in Endurance Go Karting To raise money for Down Syndrome Extra 21 charity
(Joined by Janus Technology & Coordinated Security)
T
he go karting race is the main fund raising event of the year for DSE21 that was recently held at Buckmore Park, Kent. This year GJD teamed up with Janus Technology and Coordinated Fire and Security Systems. Buckmore Park is an international European race circuit and is one of the most prestigious karting venues in the UK. Many current and past Formula One drivers learned their trade at Buckmore Park including Lewis Hamilton and Jenson Button. This year the charity race had some teams from high profile corporate companies including Briggs and Forrester building services specialist, Sir Robert McAlpine, a leading UK construction and Civil Engineering Company and Santander. In total there were 30 karts racing on the track at any one time. “The go karting race is a fantastic way to raise money for a very worthy charity. Everyone taking part always has a great time showing off their driving skills,” commented Greg Stuttle, Business Development Manager at GJD and one of the drivers, “We are delighted to be joined by Coordinated Security and Janus Technology. I am sure they will have fun, whilst at the same time helping to raise money for DSE21”. Money raised for the charity helps promote equal opportunities for people with Down syndrome and offer support to them and their families. It promotes public awareness of Down syndrome and encourages and helps local support groups.
feature
Distributed Cybercrime’s Growing Threat to Critical Infrastructure By Ron Davidson – CTO & Vice President, R&D, Skybox Security
R
ansomware is not new, but has been a growing tool of choice of the cybercrime community in the last few years, capturing headlines for the widespread and brazen way they are able to be installed and hold the victim’s data hostage. From WannaCry to NotPetya and BadRabbit, and recent attacks on US-based Boeing manufacturing plant and the City of Atlanta, ransomware is showing its full might. But little is being said about the business model behind these types of attacks. Ransomware and its larger family of distributed cybercrime has evolved, giving cyber-criminals a more organized, sophisticated way to wreak havoc and make money. This business model is a way in which cyber-criminals attack many victims in the same campaign. It is proving to be a costly, and a lethal nuisance in the right situation.
What is distributed cybercrime and why does it matter
T
his commercialization of cybercrime is due to the lower barrier of entry, you don’t need massive computational power for brute force attacks
or deep knowledge of cybersecurity or cryptography to be effective. Sample exploit code and easy-to-use tools are readily available on the dark web, and have the ability to generate a substantial revenue stream with little skill or effort. This has driven professional cyber-criminals to develop malware that runs on professional platforms, uses pre-packaged distribution services and leverages knowledge of infection experts to attack the world. They don’t know who their victims are – nor do they care. It’s the perfect, automated, money-making machine for criminals, creating an ease of use and ROI that is too good to pass up. 1. Attacks require less effort as they target ‘low-hanging fruit’ (i.e., individuals or organizations with subpar security). 2. Attack skill level is low compared to techniques such as spear-phishing – regular ol’ phishing is good enough for weak targets. 3. Highly coveted zero-day vulnerabilities are no longer required for profitable attacks – mainstream CVE vulnerabilities with known exploits and existing patches will do, as many victims don’t patch regularly. SecurityLink India ■ June 2018
4. A ny standard endpoint is a potential source of revenue, making complicated lateral movement toward the crown jewels irrelevant. 5. W hen you attack the world, the sky is the limit – the revenue potentials are endless. How exactly does would this type of cybercrime impact a manufacturing plant or other critical infrastructure? It doesn’t take much to dupe an unsuspecting victim and install the malware. A innocuous looking email or website visited by a staff member can be all it takes to compromise a facility in seconds. From consumers to manufacturers and critical operations like hospitals, transportation and other civil services – nobody seems immune from the ransomware threat.
Protecting against distributed cyber attacks
N
etworked systems are complex and attackers have all the time in the world to study and understand them; but plant management doesn’t. Don’t assume the state-of-the-art security system in place for IT networks has visibility into operational technology that none83
feature
theless is connected to it. To safeguard against distributed as well as targeted attack, you need to have visibility of your entire attack surface, including IT and operational technology (OT) networks, and know that baseline security standards are met throughout your organization. From that fundamental visibility, you can start to see your network like an attacker would, finding paths of least resistance so you can harden your defenses. Organizations with OT networks also need to ensure they can detect vulnerabilities in these environments. Active scanning is prohibited in OT, so passive solutions are required. Vulnerability occurrence data should be analyzed in the complete context of the attack surface – the IT and OT network, security controls, potential business impacts and threat activity in the wild. Only with this context can you accurately prioritize vulnerabilities for remediation in OT networks where patching is carried out only when it’s an absolute must. Understanding network and security control context also provides non-patching mitigation options to isolate vulnerable assets until a patch can be deployed. Visibility and intelligence are key to protecting against a commercialized threat landscape and threat actors who are increasingly turning their attention to critical infrastructure. But by addressing the underlying vulnerabilities and cyber hygiene issues on which these tools and attackers rely, you’ll have a strategic impact on your cyberattack readiness. 84
4 Ways to Proactively Protect Your Home T
he statistics don’t lie. Home burglary rates are high. According to a survey of 1,000 Australians, 1 in 5 people have had experienced a burglary or attempted burglary. When compared to the rest of the world, it’s clear we have a problem. The international average of home burglaries is 1.8%, and ours is 2.5%. This means that 1 in 40 Australian homes may be burglarized this year. These figures are startling, but you can take action to avoid becoming another statistic. Here are 4 easy ways to proactively protect your home. With these tips, you can safeguard your family, property, and home.
1. Install a home security system
O
nly 1 in 3 people from the above-study responded that they had a home security system. However, the presence of a home security device is a powerful deterrent for a would-be intruder. A study by the University of North Carolina found that 60% of burglars would be deterred by the presence of an alarm. Technological advances have now made it easy to install home security. As a leader in the DIY home security space for over 30 years, Swann is dedicated to helping keep your home safe around the clock with affordable solutions. Our wireless security cameras eliminate messy cabling and make installation easy. In addition, our high-definition security cameras can capture facial features, license plates, and see in the dark up to 30m. You can even check on your property remotely from anywhere in the world with your smartphone and a Swann app. Additionally, Swann has cameras with True Detect™ heat- and motion-detection
SecurityLink India ■ June 2018
feature
and the ability to generate push notifications and video recording when the camera detects activity. Using heat-sensor technology versus only motion detection means fewer false triggers and more reliable notifications. This combination can help prevent burglaries while also capturing and recording valuable video evidence most efficiently. How do I choose between wire-free cameras or wired system? First, decide how many cameras you need and where you need them, try analysing potential break-in points around your home. Take a look at your home from the road and consider all of the potential points of entry. Next, consider whether you want to install a system that connects to your home’s Wi-Fi network or not, including the distance from your router and how many devices will be connected. Do you want a system that is hardwired into your home, or totally wire-free cameras? Hard-wired security systems give you more recording features. For example, if you’re concerned about a specific area of your property, you can set parameters to include or exclude certain areas from your camera’s view. All of these features provide you with reliable, affordable, and userfriendly home security. Also, wired cameras can offer a more stable signal at times. Installing a home security system with cameras allows you to take proactive steps to protect your family, home, and valuables before anything happens. Not only does a visible security presence at your home mean that you may be less likely to be broken into, but it also gives you peace of mind.
it easy for them to enter your home by leaving a key for them. And, be aware of potential hiding spots on your property. You may not realise that you are creating the ideal blind spot outside of your home with poor lighting. Investing in simple outdoor lighting, including sensor lights, can sometimes be enough to help prevent a home break-in.
3. Work with your neighbours
Y
ou may not realise it, but you have strong allies in the fight against burglary – your neighbours. When you get to know the people who live near you, you can look out for their homes while they keep an eye on yours. Watchful eyes can be very helpful against home invasions and theft. After you get to know your neighbours, consider taking your safety efforts a step further by creating a neighbourhood watch program. Together, you and your neighbours can arrange for community meetings and nightly patrols.
2. Be vigilant
H
aving a home security system isn’t the only action you can take to protect your home and family from intruders. A few easy steps can potentially make your home less attractive to burglars. It’s difficult for a burglar to steal what they can’t see. Don’t tempt would-be burglars. It’s advisable to keep valuables hidden and your blinds closed when you leave your home. Or if you’re expecting a package, ask a neighbour to collect it for you to decrease the risk of theft and so it doesn’t look like you’re not home. While seemingly minor, these tips may help keep your property safe. Are you among the 35% of Australians who leaves a spare key outside their home? If so, it’s time to rethink the idea of hiding a key under a flower pot or somewhere outside your home. This is a common practice, so it’s often one of the first things that a potential intruder will look for. Don’t make
4. Discuss insurance coverage
Y
our best efforts sometimes aren’t enough to prevent a break-in. Home or renter’s insurance can make sure that you’re prepared if something does happen. Budget Direct Home Insurance offers a number of options that protect your home and belongings from burglaries, fire, storm damage, and more. The act of obtaining insurance is another great way to protect you from the unthinkable. By following these easy home security tips, you can feel confident that you have taken proactive steps to reduce your risk of being a victim of a home break-in. We recommend taking a proactive approach regardless of if you’re going on holiday, especially if everyone in your home is gone during the day. Nothing can compare to the peace of mind that you have when you know that you’ve protected your home, property, and family.
SecurityLink India ■ June 2018
85
product showcase
Enriching ePoE IP System
●● Ideal for long distance transmission. ●● Overcomes limitations of traditional Ethernet and PoE. ●● Eliminates need for Ethernet extension devices or additional network switches. ●● Offers simple, cost-effective and reliable solution.
Application scenarios
D
ahua Technology has extended ePoE technology to more products including full range of network cameras with wide selection of form factors, 16/32/64 channel network recorders and 4/8/16/24 port network switches. The newly enriched ePoE IP system enables Dahua customers and partners to reduce costs and embrace more business opportunities. Dahua successfully introduced its ePoE (extended Power over Ethernet) IP system in July 2017.
ePoE IP System
Product features
D
ahua ePoE IP system delivers up to 800 meters transmission between ePoE camera and ePoE network switch or ePoE NVR at 10Mbps and 13W, or 300m @ 100Mbps and 25.5W. It overcomes the limitation of traditional Ethernet and PoE (both restrict cable distances to 100 meters between network ports) and eliminates the need for Ethernet extension devices or additional network switches. Moreover, according to testing results, ePoE IP system won’t increase the transmission delay or package loss rate compared to the traditional IP system.
F
or surveillance of large spaces such as big warehouse, parks and outdoor parking, cameras are usually over 100 meters away from the control center. Conventional approaches such as adding repeater devices and fiber optic increase equipment and installation cost and also form too complicated a system. Dahua ePoE IP system, with 300-meter transmission at 100Mbit/s via network cable, and where only one cable is required to connect front-ends and back-ends, offers a simple, cost-effective and reliable solution. A proper solution to migrate analog surveillance system to IP needs to adapt the IP video signal and RJ45 connection to coaxial cable, and support the length of coaxial cable and transmit power over coaxial cable. Dahua ePoE IP system uses PoC Extender LR1002 to connect Ethernet port of IP camera or network switch on the one end and BNC connector of coaxial cable on the other, and supports up to 1,000-meter transmission over coaxial cable at 10Mbit/s, delivering PoE power to IP cameras. This is a simple and effective solution that significantly reduces the cost of analog to IP migration.
XProtect 2018 R1 Client-side hardware acceleration with NVIDIA; Enhancing Performance & Privacy Masking
M
ilestone Systems, the globally leading open platform company in networked video management software (VMS), has released XProtect 2018 R1. Milestone is responding to the market’s rising demands for cost-effective video business solutions with this first VMS update this year. 86
SecurityLink India ■ June 2018
product showcase
Accelerating the XProtect Smart Client and Smart Wall with hardware power
I
n this release, Milestone pioneers the use of multiple NVIDIA graphics cards on top of Intel GPU acceleration (graphics processing unit) to achieve ultra-high performance. The XProtect Smart Client 2018 R1 and Smart Wall now support hardware acceleration, where system performance can be boosted just by adding a supported graphics card to take over the heavy lifting in decoding video, leaving room for the system to handle other tasks. This means that the user can view more high definition or ultra HD streams just by adding one or more supported graphic cards to the computer running the XProtect Smart Client or Smart Wall.
camera positions while meeting privacy regulations. It also helps maintain a level of situational awareness that is not possible if sensitive areas are blacked out.
New features in Milestone XProtect 2018 R1
A
mong the many operational enhancements in this XProtect release is an optimized software installer with automatic detection of hardware devices. There is a new structure for Milestone Device Pack releases, with drivers managed so that customers can choose to download only recent device drivers. XProtect 2018 R1 also includes a Mobile SDK that enables Milestone partners to easily embed video feeds into apps for Android and iOS devices.
New Turbo HD 5.0 Security Solutions Latest innovations include deep learning for automated threat detection and crystalclear color video, even at night
Cost-saving and preventing incidents with TV displays
T
he support for DLNA (digital living network alliance) video sharing technology allows users to directly connect their VMS system to any DLNA-supported TV and display video captured from cameras without needing a Smart Client or even a computer for display. The DLNA support is highly valuable for retail stores, kiosks, gas stations and law enforcement facilities who want to display video from a certain area. This feature can have a preventive function – showing malicious persons that video surveillance is present. This can be a discouraging factor to deter incidents and prevent loss. The feature will give users the ability to create a carousel flow of all or selected cameras in their installation for a flexible, visual representation.
T
o bring HD clarity to analogue surveillance systems, Hikvision launched its first-generation Turbo HD DVRs and cameras in 2013. Since then, subsequent generations of Turbo HD products have delivered a wealth of innovations including ultra-low-light video recording and super-efficient bandwidth and storage usage – helping Hikvision customers enhance their security and perimeter protection. Building on these revolutionary security advances, Hikvision has now announced the Turbo HD 5.0 family of surveillance products, which includes AcuSense Turbo HD
Enhanced privacy masking
S
elective blurring of video image regions enables Milestone users to easily meet privacy requirements. The blurring can be permanently applied to the stored video or be liftable, depending on a user’s credentials. This gives Milestone customers free choice in optimal SecurityLink India ■ June 2018
87
product showcase
DVRs and ColorVu Turbo HD cameras. These technologies make it even easier for organizations and individuals to identify and react to security breaches, while also minimizing manual interventions and security costs.
AcuSense Turbo HD DVR
I
ncorporating eleven different DVR models, the AcuSense family uses the latest deep learning technologies to enhance object detection. Specifically, AcuSense Turbo HD DVR detects vehicles or humans, filters out false alarms triggered by animals, leaves and other insignificant objects, and minimizes costly, time-consuming manual checks. As an additional benefit, the AcuSense Quick Target Search feature identifies and extracts footage of humans and vehicles from vast video datasets automatically, saving staff from searching through massive datasets.
ColorVu Turbo HD camera
C
olorVu Turbo HD cameras provide bright color video images 24/7, even in the lowest light conditions. The camera’s round-the-clock color boosting capabilities are powered by a large iris and ED optical glass, an anti-glare diffusion lens, large sensing pixels, warm supplemental lighting, and a range of other innovative video technologies. With brighter and more colourful video images, Hikvision customers are protected against security breaches, even when they happen at night.
Turbo HD 5.0: Heightened security at a reduced cost
H
ikvision’s latest Turbo HD 5.0 takes the capabilities of traditional analogue and CCTV systems to new heights, helping organizations to maximize their security and lower surveillance costs. Frank Zhang, General Manager of International Product Marketing Department at Hikvision says, “With AcuSense Turbo HD DVR, we have integrated revolutionary deep learning technology to help our customers filter out false alarms, find video evidence faster, and react to real security threats as soon as they occur. At the same time, ColorVu Turbo HD cameras provide clear and bright color images even in complete darkness, alerting customers to security breaches immediately and providing excellent video evidence wherever needed.”
88
SE2 Series IP Cameras Delivering 1080p Video Resolution, Optimum Performance and Value Features including built-in IR, extra-wide FOV, hallway mode, and low bit rate ensure clear video capture in indoor and outdoor applications arch Networks®, a global provider of intelligent IP video solutions, introduces its SE2 series IP cameras. The new camera line delivers 1080p video and a comprehensive range of advanced features for indoor and outdoor applications. It also incorporates a smart low bit rate (LBR) setting that reduces bandwidth and storage consumption by 50% or more, making the SE2 series IP cameras a costeffective option for businesses with dozens or hundreds of surveillance cameras. Compatible with all March Networks video recording platforms including the 8000 series and 9000 series video recorders and command recording server (CRS) software, the cameras are also easily managed with powerful March Networks Command™ enterprise video management software. Command Enterprise enables customers to administer the complete video solution more effectively, and benefit from capabilities such as centralized video management, mass camera management and system health monitoring. The SE2 series cameras are also compatible with third-party video recording systems via the ONVIF Profile S standard. Organizations can choose from three distinct SE2 series models, each available with multiple mounts and accessories. These include: The SE2 Indoor NanoDome, a low-profile dome with an extra-wide, 134-degree field of view (FOV) that enables organizations to monitor an entire area with a single camera. In surface mount applications, all wires terminate inside the camera, eliminating the need for a
M
SecurityLink India ■ June 2018
product showcase
separate side cable access housing. Other key features include a 3-axis gimbal for simple positioning during installation, and a 90-degree hallway mode rotation to better capture vertically-oriented scenes. The SE2 Indoor IR Dome that ensures high-quality video capture in challenging lighting conditions – including bright sunlight and complete darkness – through a combination of high dynamic range (HDR) and integrated infrared (IR) LEDs. The camera also incorporates hallway mode and helps speed installations with features including remote zoom and focus, and a convenient EMT mount that attaches directly to an unthreaded pipe, ideal for high ceiling installations. The SE2 Outdoor IR Dome, a ruggedized dome protected by a weather-proof (IP66), vandal-resistant (IK10) enclosure to ensure optimum performance in all climates. The camera’s integrated HDR, IR and P-Iris deliver clear, focused video capture in varying lighting and regardless of an object’s distance within its FOV. Similar to the other SE2 models, the camera incorporates hallway mode. It also includes a 3-axis gimbal and remote zoom and focus. For ease-of-service, each SE2 series camera comes with a unique QR code that technicians can scan with their smartphone or tablet using March Networks’ free GURU smartphone application. The combined functionality enables technicians to access product serial numbers, warranty status, video tutorials and product manuals, run installation audits, submit an express RMA and more – saving them valuable time and cost. “We are thrilled to add these SE2 series IP cameras to our portfolio,” said Nathan Dinning, Edge Devices Product Manager, March Networks, “They expand the range of IP cameras our customers can choose from, and are a full-featured option for applications such as warehouses, grocery stores and big-box formats with many cameras and few ultra-high definition requirements. They are also our company’s lowest-cost camera offering to date, and
we expect the combination of high-performance and affordability will make them a popular choice in new and existing installations.”
Saros Next-Generation Outdoor Perimeter Security Camera Line for Commercial Businesses LIR Systems has recently announced the Saros™ line of security cameras, its next-generation outdoor security product line that combines multiple traditional perimeter protection technologies into a unified solution. This approach is designed to deliver accurate, actionable alerts and verified alarm data. The FLIR Saros camera line enables commercial businesses to implement stateof-the-art outdoor intrusion detection in a cost-effective manner. Traditional perimeter security systems can require substantial investment, both in infrastructure and in ongoing expenses stemming from false alarms. FLIR Saros not only greatly reduces the cost of initial deployment by minimizing the amount of equipment required, but also reduces false positives with built-in advanced analytics, expanding the outdoor perimeter protection market for security alarm monitoring companies. A single FLIR Saros unit combines numerous security technologies, including: ●● Multiple FLIR Lepton® thermal sensors: Provides the ability to deliver wide-area monitoring regardless of unfavorable lighting or weather conditions. ●● High-definition optical cameras: Option of 1080p or 4K resolution to realize accurate visual identification of intruders. ●● IR and visible LED illuminators: Ability to deter intruders with white light illumination. ●● Advanced onboard analytics: Accurate target detection
F
SecurityLink India ■ June 2018
89
product showcase
and classification, to help reduce false alarms. ●● 2-way audio and digital input/outputs: Enables realtime audio response. The FLIR Saros platform was designed and engineered with today’s cybersecurity risks in mind, with end-to-end encryption for setup, web, and video streams, and configuration lockdown after initial setup for increased tamper prevention. FLIR Saros also eliminates the need for port-forwarding, so devices are less exposed to remote security attacks. “FLIR Saros, equipped with multiple FLIR Leptons, represents a new security paradigm for wide-area commercial locations that face the threat of loss,” said James Cannon, President and CEO of FLIR, “FLIR Saros products open new business opportunities for both central monitoring stations and security integrators looking to distinguish themselves in the industry. The Saros family is an important addition to FLIR’s security portfolio and supports our goal of innovating technologies that increase perception and awareness to support professionals in decision-making that saves lives and livelihoods.”
Remote Connect Suite A Cloud-based Secure Remote Access Solution for Effortless Connection to Machines
T
o serve the needs of OEMs and machine builders who require remote connections to manage and maintain their machines at remote sites, Moxa has launched the Moxa Remote Connect Suite. The suite is a remote connection management platform that includes server and client software, and a hardware gateway to facilitate secure remote access. The Moxa Remote Connect Server is a connection management platform that is hosted on Amazon EC2. The Moxa Remote Connect Gateway connects Ethernet-based edge devices to the server portal securely. Last, the Moxa Remote Connect Client is a software tool that can connect an engineer’s laptop to the server portal. This solution provides OEMs and machine builders with an easy and secure way to connect to their remote machines and equipment to perform troubleshooting, maintenance, data acquisition and de90
vice management remotely, which enables faster and smarter maintenance support.
Easy deployment
T
he auto configuration function makes installation as simple as plug and play, and there is no need to configure VPNs or have extensive IT knowledge. In addition, there is no need to perform complex firewall settings or reconfigure IP addresses. The Moxa Remote Connect provides smart IP mapping to avoid IP conflicts, and is firewall friendly to comply with existing IT security policies, which allows companies that need secure remote access to minimize the amount of time and effort spent on deployment.
Enhanced security
I
n order to combat the numerous security risks when data is collected through the Internet, the Moxa Remote Connect is equipped with security features including end-to-end encryption to prevent man-in-the-middle attacks. The smart protection function includes an embedded firewall that allows remote access under whitelist control without disrupting local networks. In order to provide an on-demand maintenance service, access to machines is fully controlled by machine operators.
Flexible and scalable connectivity
T
he Moxa Remote Connect solution allows for greater flexibility by supporting a variety of connections including one-to-one, multiple-to-multiple, and site-to-site to satisfy different user scenarios. The Moxa Remote Connect solution also allows companies to remotely manage numerous machines and users at different locations, which makes it easier to manage when businesses expand.
SecurityLink India ■ June 2018
product showcase
“With its easy to use design, secure connections and flexible connectivity, the Moxa Remote Connect allows OEMs to access their remote machines effortlessly and streamline their maintenance efforts,” stated Li Peng, a Product Manager in Moxa’s Industrial Ethernet Infrastructure business unit.
New QM2 PCIe Cards Enhancing NAS Performance by Adding up to Four M.2 SSDs NAP® Systems, Inc. has extended the lineup of QM2 PCIe expansion cards with new models that support up to four M.2 SSDs slots on a single card. QM2 cards support either M.2 SATA SSDs or M.2 PCIe NVMe SSDs to enable SSD caching for boosted IOPS performance or to form an auto-tiering volume for optimal storage performance. QM2 cards also allow QNAP NAS users to maximize both storage
The innovative, well-designed QM2 cards now support additional QNAP NAS; the M.2 SSD thermal sensors allow real-time temperature monitoring, and a quiet cooling module (heatsink and smart fan) minimizes overheating risks and sustains constant high performance. QM2 models that support four M.2 SSDs allow for SSD caching with higher storage capacity to optimize IOPS-demanding applications, as well as supporting RAID 5/ RAID 6/ RAID 10 to provide redundancy against potential hardware failure. QM2 cards include advanced models featuring additional 10GbE 10GBASE-T connectivity (backwards compatible with 5GbE/ 2.5GbE/ 1GbE/ 100MbE). Combining M.2 SSD and 10GbE connectivity into one solution, the QM2 helps improve overall NAS performance while providing an affordable upgrade path for adopting 10GbE networks.
Q
Space Saving Compact H.265 Wisenet Dome Cameras
T
he five new dome cameras, which have been added to the award winning Wisenet X camera series, are designed for environments where there may be limited space such as in lifts, entrance lobbies, stair wells and small shops, whilst three of the new models are built to withstand vibrations which may occur in transport environments.
capacity and performance by installing M.2 SSDs without occupying any 3.5-inch drive bays. “When faced with a performance bottleneck, the random read/ write speed of the hard drives in a NAS is one of the decisive performance factors,” said Joan Hsieh, Product Manager of QNAP, “QM2 cards can greatly boost the performance of QNAP NAS with PCIe slots, while the flexible configuration of SSD caching and I/O-aware Qtier all helps multiply NAS performance.” SecurityLink India ■ June 2018
91
product showcase
These latest additions to the Wisenet X range, which are all vandal-resistant, are able to capture superb 2MP high definition images. They are supercharged by the most powerful DSP chipset ever incorporated into a full camera range and are equipped with the world’s best 150dB wide dynamic range (WDR) technology.
Technically advanced features
T
he new camera domes benefit from a long list of innovative features including an audio analysis function which recognises critical sounds such as gunshots, explosions, screams and broken glass, whilst additional features include detection for defocus, face, fog, virtual line, appear/ disappear, loitering and camera tampering. 24x digital PTZ, bi-directional audio, hallway view, motion detection and handover are also offered as standard, as is the ability to store up to 256GB of data via an SD/ SDHC/ SDXC memory slot to ensure video is automatically recorded in the event of network disruption. As is the case with other cameras in the open platform Wisenet X series, the new compact models utilise H.265 compression and WiseStream II, a complementary compression technology which dynamically controls encoding, balancing quality and compression according to movement in the image. Bandwidth efficiency is improved by up to 99% compared to current H.264 technology when WiseStream II is combined with H.265 compression.
Avigilon self-learning video analytics. The platform enables partners to remotely connect to, manage, and service more customer sites with fewer resources. For customers, Avigilon Blue provides easy and secure system access, smart notifications, system upgrades, and new features that will be pushed directly from the cloud. “With Avigilon Blue, we are launching both an exciting new technology platform and business model,” said James Henderson, Avigilon’s President and Chief Operating Officer, “To help grow their business, Avigilon Blue offers our partners a recurring monthly revenue model based on customer site subscriptions. As the platform expands, we will continue to add new services that our partners and their customers can deploy, bringing additional value, performance and scale to their systems.”
Avigilon launches Avigilon Blue, its new subscription-based integrator cloud service platform for security and surveillance
Blue Cloud Service Platform For Security and Surveillance
A
vigilon Corporation has recently announced that Avigilon Blue, its new integrator cloud service platform, is now available for order. Avigilon Blue is a powerful and advanced cloud service platform for security and surveillance that is purpose-built for Avigilon partners and their customers. The first release of Avigilon Blue provides managed services for video surveillance, powered by patented 92
The system integrates an on-premises Avigilon Blue Connect device that supports local storage as well as Avigilon and ONVIF compliant cameras, and sends critical events to the cloud for customers to view and verify from their web-connected device. Additionally, this helps keep incoming and outgoing network traffic to a minimum, saving valuable bandwidth. Powered by Microsoft Azure, Avigilon Blue leverages cloud services that are built, deployed and managed through a global network of trusted data-centers, providing customers with enterprise-grade security and global scale.
SecurityLink India ■ June 2018
product showcase
Ocularis VMS Amplified
for organizations operating multiple locations with small to midsized camera counts; Enterprise, built for a wide range of mid to large IT-centric organizations; and Ultimate, created for large organizations with extended command and control needs and recording server failover.
Performance and Security from End-to-End OnSSI combines best-in-breed technology with extreme value and support
O
nSSI latest VMS technology enables improved management and security of network video surveillance and security systems. The company’s flagship Ocularis v5.5 VMS sets new benchmarks in performance and control with new automation features that encompass system integration, operational workflow, security and system health, as well as improvements in image quality, bandwidth usage and storage requirements. “The technology innovations in Ocularis v5.5 deliver advanced functionality, added security and increased value, which improve the overall user experience,” said Ken LaMarca, VP of Sales & Marketing, OnSSI, “These same characteristics provide our reseller partners with competitive advantages relative to system implementation, maintenance and remote management, which deliver increased profitability.” Ocularis fortifies system security with new authentication requirements, change-password reminders and TLS 1.2 support. Security is further enhanced with automatic software update prompts that once initiated do not require additional input from the operator. A new camera health status feature in Ocularis Administrator allows operators to see the status of all cameras at-a-glance, across all recorders and branches. Additional smart camera drivers are now available for Dahua, Panasonic and TKH Security Solutions cameras, eliminating the need to wait for individual camera drivers or driver packs for these and other newly introduced cameras from these manufacturers. Support for H.265 compression provides exceptional image quality with less data, and a reduction of video bandwidth usage and storage requirements. Additional features of Ocularis v5.5 include new web video bookmarking that allow for faster access to important video for more efficient investigations; a new playback mode for alarm recordings that allows review for motion- or event-driven recordings in Ocularis Client; two-way audio support using push-to-talk functionality in Ocularis Client; and processing improvements that result in faster event notifications and video call-up times. Ocularis is offered in three models – Professional, designed
Unified Security Management with
S2 Magic Monitor Version 6 Release includes enhanced S2 NetBox access control system integration and new web widget
S
2 Security, the leading developer of complete enterprise security solutions, has recently announced the availability of S2 Magic Monitor Version 6. S2 Magic Monitor unifies access control, video surveillance, forensics, digital signage and live internet feeds in a single user interface. Version 6 introduces enhanced access control functionality and a new web widget, further unifying the security management experience. “Version 6 delivers on Magic Monitor’s promise to unify all of the user’s security needs within a single, intuitive interface,” said John L. Moss, CEO, S2 Security, “Security professionals will benefit from greater situational awareness and operational efficiency as Magic Monitor helps streamline their workflows.” In Version 6, comprehensive people management enables users to add, search for and manage person records directly from S2 Magic Monitor. The people search tool provides instant results, making it easy to find any records, which display information including credentials, access levels and recent activity. Simultaneous S2 NetBox access control system connections are supported, allowing users to manage multiple S2 NetBox servers at the same time. Users can also now view, prioritize and acknowledge S2 NetBox events directly from S2 Magic Monitor. In addition, the new web widget allows users to display any website page within an S2 Magic Monitor cell. This further expands the possibilities for content that can be shown across an enterprise, from news sources to the S2 NetBox web interface and other critical web-based systems.
SecurityLink India ■ June 2018
93
product showcase
ULISSE COMPACT with New DELUX Technology For day/ night vision with exceptional night brightness
V
ideotec is launching DELUX, the new imaging and encoding technology for outdoor surveillance that generates incredibly vivid and clear colour video images day or night. In particular, thanks to the camera’s increased light sensitivity, the DELUX technology can obtain bright images with well-defined colours in very low light conditions even typical night-time conditions to 0.006 lux (0.0006 lux in black and white). The technology offers significant advantages for video surveillance in sensitive outdoor areas where it is necessary to identify people, objects, moving vehicles and abnormal events with the highest levels of detail possible at all times, even at night. Developed end to end by Videotec’s R&D team, the new DELUX technology has now been integrated into the ULISSE COMPACT PTZ, the worldwide benchmark for the surveillance of urban and industrial areas, critical infrastructures, transportation, perimeters and borders. The ULISSE COMPACT is a day/ night, full HD 1080p camera with a 30x optical zoom and a frame rate of 60fps. It is capable of accurately pinpoint details in any scene even in dynamic, rapidly changing situations. In addition to improved light sensitivity, with outstanding colour rendering and greater noise reduction, the DE94
LUX technology has brought new advanced performances to the ULISSE COMPACT, namely in the proportional zoom control and management of privacy masking. ULISSE COMPACT’s robust mechanical construction guarantees unbeatable performance in all weather conditions, from -40°C to + 60°C with a rotation speed of up to 200°/s, highly accurate preset positioning, anti-fog capability, a wiper and an integrated LED illuminator. Thanks to the meticulous care taken in all of the DELUX technology design stages, significant reductions have been made to the costs of this new ULISSE COMPACT model. In addition to the improved performance, this has increased the model’s competitiveness thus responding to customer’s needs and an increasingly selective market.
WebConfig Intuitive, browser-based setup for simple and effective perimeter security
S
ightLogix has recently announced WebConfig, an intuitive, browser-based interface for configuring SightSensor smart thermal cameras. “SightLogix set-and-forget, never-tune analytics reduce the cost and complexity of outdoor security,” said John Romanowich, SightLogix president and CEO, “WebConfig enhances these key capabilities with an easy-to-use interface that reduces the time and effort to achieve unparalleled outdoor security.” The initial version of WebConfig supports SightSensor HD, the affordable thermal-visible detection camera announced last October. Future releases of WebConfig will support the entire SightLogix product line. WebConfig includes a range of innovations to streamline the setup process, allowing users to calibrate cameras, configure key parameters and create accurate video analytic detection rules quickly and easily. Key features include: Automatic size calibration ust enter your camera’s height off the ground and the SightSensor’s advanced processing automatically cal-
J
SecurityLink India ■ June 2018
product showcase
culates the actual size of all objects in the field of view. Knowing an object’s true size is foundational for video analytic detection accuracy. While SightSensors have supported map-based g e o r eg i s t r a t i o n since their inception, WebConfig’s no-map option reduces the setup time to seconds. Single-click detection setup ebConfig includes pre-built, comprehensive policies for detecting human-sized targets. With a single click, zones are superimposed on a snapshot of the camera’s thermal image, and the users can adjust a zone’s shape directly in the browser. He can add new zones to mask high traffic areas, or add policies that detect intruders based on size, speed or direction, among other powerful combinations.
W
Simplified VMS and Sureview setup ebConfig provides easy-to-use drop-down fields for connecting a VMS and SureView Systems’ Immix platform for remote guarding applications. SureView-specific features include pre and post-trigger video clips that are automatically sent to a monitoring center along with live video, providing critical details so operators can assess a situation in real time. WebConfig also provides a test button that simulates an alarm for troubleshooting system connectivity.
MS9390-HV New Multi-Sensor Panoramic Camera with Superior Image Quality
F
ollowing the success of previous 180° panoramic network cameras, VIVOTEK has launched a brand new and even more efficient multi-sensor camera. The MS9390-HV, with its dual 4-megapixel wide-angle lens design, is unlike most traditional multi-sensor panoramic cameras which rely on 4 sensors. This newly released multi-sensor dome camera is also equipped with SNV (supreme night visibility), WDR Pro technology, 180° IR illuminators effective up to 20 meters, and delivers full resolution imagery at 30fps (frames per second), making it the ideal camera to provide excellent panoramic image quality for both day and night surveillance.
W
Guided setup and embedded help pon initial login, WebConfig presents steps to configure the camera so you can start detecting. Additionally, every setting in WebConfig includes embedded mouse-over tooltips that explain each feature and their proper use. WebConfig also includes easy access to the SightLogix support portal with documentation, setup videos and troubleshooting tips.
U
VIVOTEK introduces the brand new MS9390-HV under the strategy of its ‘See More in Smarter Ways’ campaign. With its unique dual-sensor design, the camera is equipped with a video alignment feature, providing users both a detailed and yet seamless 180-degree panoramic view and a higher vertical field of view. This enables greater coverage not only on the horizontal, but also on the vertical plane, capturing an even greater field of view below the point of camera installation. Moreover, the internal tilt adjustment of the lenses of the MS9390-HV has been upgraded to 20°, allowing users to achieve the precise angle desired. Furthermore, the multi-sensor camera employs H.265 compression and Smart Stream III technology to create the most efficient system, and resulting in remarkable savings in storage and bandwidth consumption while at the same time providing complete video security.
SecurityLink India ■ June 2018
95
product showcase
The new MS9390HV is further armed with a robust IP66 and IK10rated housing, enabling it to withstand rain and dust, as well as to protect against vandalism or tampering in outdoor surveillance applications. In addition, its wall mounted design ensures simple and quick installation, with an included sunshield to eliminate interference caused by direct sunlight. The panoramic camera was given an early test at the 2018 Taiwan Lantern Festival, one of the great events in Taiwan, that attracted over 10 million visitors. The MS9390-HV provided clear and full coverage throughout the day and night to secure the safety of visitors to the festival.
logue connection and up to eight on IP connection. Additionally, the area allocation function allows the number of active detection areas to be defined with an independent alarm output. Detection areas can be set differently depending on the time of day, using the day/ night setting. Finally, the RLS3060L has the option to select the indoor/ outdoor loitering mode to send an alert if a person or object is remaining in the detection area for longer than the set time. The RLS-3060-SH has one major new feature – an extended detection area between 30 and 50m, ideal as a pre-warning zone. In horizontal mode, at 50m, the laser scanner will be able to detect large moving objects such as vehicles, and in vertical mode the RLS-3060Sh could detect a walking person.
IP Video Door Phones (IP-VDP) Open your doors confidently with Hi-Focus VDP
Redscan RLS-3060 Series with Version 8 More Features Unleashed
V
ersion 8 of Optex long-range LiDAR, the REDSCAN RLS-3060 series, and its configuration software Redscan Manager will soon be available. The new sensor firmware combined with the new configuration software provides new features for both models of the 180-degree laser sensors. Both models, the RLS-3060L and RLS-3060SH will offer more flexibility in managing dry contacts with the option to switch from normally open (N.O) to normally closed (N.C). The RLS-3060L model, has some key new features previously only available in the high-end model. The first is an increased number of independent detection zones, 4 on ana-
96
H
I-Focus’s IP video door phones or IP VDP solution is designed to offer optimal safety and security to any venue. The solution conscientiously introduces audio and video monitoring tools that function with a mature and a highly scalable processing technology for every doorstep. Hi-Focus comes with a deep knowledge in video surveillance and launches an access control system that is distinctive and unlike most traditional providers. HI-Focus’s IP-based video door phone systems support streaming from all entry spaces, and also allow two-way conversations through the in-built speaker and microphone. All appliances are equipped with LCD displays, touchscreen interfaces and keypads so that these can be mounted with any camera module along with hardware accelerators and accessories for video encoding. The device thus ensures real-time streaming at full frame rates from the entry space into the facility. Hi-Focus offers stylish IP-based video door phone systems that provide the ideal flexibility and control required for a property. Complex facility protection, visitor management, messaging service, elevator control and intercom can be easily handled by the systems. At the outset, the IP VDP systems provide the biggest advantage of real-time audio-visual monitoring to promote instant security decisions. While any
SecurityLink India ■ June 2018
product showcase
ers that not only record the crime scene evidence but even drive away threats before it actually happens - a great leap compared to conventional consumer surveillance products. Also, it is designed with advanced technologies in conjunction with the customer-oriented features, proving it to be the best choice for consumers.
Active deterrence with better accuracy networked PC can be used for monitoring the doors, gates and premises they can also be controlled remotely with a single handset that is connected to the desktop. HI-Focus’s collection of video door phones are meant to enhance response times. They are equipped with advanced sensor systems to pick up even the minutest movements with the help of the passive infrared light (PIR Sensor) that detects an object by heat emissions. Similarly, any types of sensors can be integrated with Hi-focus IP VDP for seamless integration for home solutions. There are products consisting of shutter sensors, which gives a relay output, when the shutter is opened or closed based on the configuration or installation method, and thereby it helps users get notified on VDP, when his garage’s shutter is opened or closed. Outdoor units are waterproof and ideal for outdoor installation since they are not susceptible to damage. The highdefinition camera ensures night vision too and monitoring outdoors is extremely easy since the shades on the camera can avoid direct sunlight. Vision clarity is well-maintained by the devices even if they are integrated to external CCTV devices. Hi-Focus understands the diversity of the Indian environment and the stringent compatibility that comes along with it. That is why they have created systems that are specifically designed to suit this volatile yet rich market.
S
upported by high-quality PIR sensor with the sensitivity up to 10m, LOOC enables long-distance detection in detail and effectively reduce the false alert. Also, built-in motion activated spotlight and up to 110dB security siren help scare away unwelcomed visitors, proactively repulsing home threats.
Clear vision & communication
A
side from providing 2MP resolution live monitoring, LOOC supports H.265 compression, enabling crystal clear video quality while also minimizing storage space and bandwidth by up to 50%. Dual internal antennas improve Lechange’s Active Deterrence 2.4GHz Wi-Fi, supporting Wi-Fi Camera LOOC smooth transmission. Besides, specially designed built-in speaker and MIC enable remote communication with people in front of the camera.
7x24 all-round protection
L
OOC provides protection by alerting the users with a notification to him or his family’s smartphone, with live video available wherever there is Internet. Even at night, automatically-switched night vision mode and advanced IR algorithms help offer clear pictures in complete darkness.
Diversified storage
L Active Deterrence Wi-Fi Camera LOOC
D
ahua Technology’s brand for consumer products, Lechange has recently launched LOOC, its new active deterrence Wi-Fi camera. With advanced PIR detector, builtin spotlight and 110dB security siren, LOOC is not only able to provide proactive warning with accuracy, but also help create a safer environment for households and business places. LOOC aims to take preventive measures for its custom-
OOC is open to diversified video storage such as SD card (up to 128GB), NVR or cloud storage, making it easier to access and use the footages. It also provides flexibility for consumers in different application scenarios.
More customer oriented features
W
ith IP65 weatherproof design, multiple bracket options and different color of durable silicon rubber skins, LOOC can easily handle outdoor surveillance and blend into various environment. With all these features, LOOC is no doubt an ideal choice for those who desire advanced video surveillance solutions with individual styles. With true values delivered to families and SMBs, Lechange is perfecting daily life.
SecurityLink India ■ June 2018
97
National Roundup
Annual Subscription: 2000/- for 12 Issues (Courier/ Postage charges extra)
“Security Link India” payable at New Delhi dated__________
* Please subscribe through admin@securitylinkindia.com
WE ARE UPDATING OUR DATABASE For free listing in Database:
For
Advertisement Contact: editor@securitylinkindia.com
* Send your detail to admin@securitylinkindia.com
Security Link India, H-187/5 (1st Floor), Jeevan Nagar Market, Kilokri, Opp. Govt. Boys Sr. Secondary School, Near Maharani Bagh, New Delhi-110 014, INDIA • Tel: +91 11 26342237 • Telefax: +91 11 42828080 • Website: www.securitylinkindia.com 100
SecurityLink India ■ June 2018