search.noResults

search.searching

note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
really new in security


Cloud-based Video Monitoring Brings Benefits to Cities


R


ecent developments in security video management software frameworks are


facilitating public-private collaboration to improve urban safety by taking advantage of cloud-based video monitoring services. Business owners can view live and recorded video footage from their laptop, tablet or smartphone 24/7. They can also selectively share camera feeds with law enforcement agencies, allowing officers to monitor video in real time during an incident. The live video feed then provides timely information to responding officers and simplifies ensuing investigations.


This new, collaborative solution addresses key issues such as tight budgets, tensions between police and citizens, and economic development.


Using this solution enables cities to become more connected, “smart cities” without raising taxes. This works especially well for local authorities looking to reduce costs and increase the efficiency of services, whilst also actively maintaining or increasing levels of public safety.


Collaborative security and community policing also improve the dialogue between officers and the local community, which is especially important in the fragile social climate that exists in certain cities around the world today. Rather than responding to crime after it occurs, community policing encourages agencies to proactively develop solutions to the immediate underlying conditions contributing to public safety. As well as this, concerns regarding police misconduct have led to the adoption of new technologies (such as body-worn cameras) and techniques in public safety that focus on transparency.


Finally, a centralised, collaborative security network resulting in a higher level of public safety results in the growth of small independent businesses, meaning that there is growth in the local economy.


A collaborative cloud-based video monitoring network is efficient, enhancing services to citizens without affecting budget; inclusive, fostering collaboration and community policing to rebuilt trust and transparency; and finally, creates safe and livable areas within a city which results in the growth of local businesses and thriving communities.


Pota Kanavaros Product Marketing Manager, Genetec


© CI TY S ECURI TY MAGAZ INE – SUMME R 2017 www. c i t y s e cur i t yma g a z i ne . c om


Initially known to many for their military use, drones are used today to drop food packages to starving villagers whilst also providing a low-cost option to deploy and activate small arms and explosive devices.


But drones also pose a problem: some are fully capable of monitoring Wi-Fi and manipulating our phones and other technology, and in some cases, they are able to intercept mobile phones. Accounts of drones in aircraft near misses and contraband drops within the perimeter of prisons have become a regular occurrence.


Drones, the future of privacy O


nce the stuff of sci-fi movies and futuristic dreams, drones are set to become a part


of our daily lives. They are now widely available to purchase online and vary enormously from the inexpensive, pocket sized drone – controlled by a mobile phone and able to receive live video images – to the heavyweight octocopter drones which carry over 20kg. And as the technology to build them becomes more sophisticated, so too does the capability to put them to use.


The online retail giant Amazon is an example of this advancement, with the development of a pioneering drone delivery service, Prime Air. This proposed drone delivery service is currently testing the capabilities of automatous drones with machines carrying a payload of up to 25kg for a range of 10 miles and lighter payloads reaching a maximum speed of 50mph.


Counter drone technology has been slow responding to this threat. A search on Google will throw up several “solutions”, including attack eagles specially trained in the Netherlands, laser jammers and air pressure guns which fire a large net into the path of the drone. Unfortunately, none can be relied upon against fast moving drone threat, nor can a drone differentiate between a legitimate delivery or, for example, one carrying medical supplies.


Specially designed targeted RF Jammers seem to be effective, but due to the re-classification of drones by the CAA – under the umbrella of aircraft – their use has been restricted by OFCOM.


The challenge is to develop a solution that counters these significant threats to our data, privacy and information and uses a very targeted RF approach that does not interfere with GSM, Wi-Fi or any other commercially used frequencies. This countermeasure needs to create an exclusion zone with a signal that denies the operator control, video and telemetry downlink capability: in effect, to create an electronic no fly zone over strategic areas such as government establishments, power stations, large public stadiums and airports etc.


Additionally, any such countermeasure would need to be deployed rapidly, so a lightweight, handheld, battery operated solution is crucial. In this way, you could create an invisible electronic shield impenetrable by commercial drones quickly and flexibly.


The good news is that specialist technology providers are taking up this challenge with some products in the final stages of research development and testing.


Whilst bringing multiple benefits, drones can be dangerous as well as compromising the security of our information and privacy. Fortunately, with a strategic approach to this threat supported by a technical countermeasures plan, there are solutions available to deter, intercept and divert malcontent.


Emma Shaw Managing Director Esoteric Ltd.


CONTINUED NEXT PAGE > 17


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39