Through the eyes of a safety professional, the bucolic scene on a college campus is a complex set of issues that need to be addressed in an emergency. That’s why Loyola University Chicago started to look into employing an electronic pre-plan for its entire campus.
When entering an airport, travelers can’t help but reflect back on the events of Sept. 11, and how things have changed since then.
In recent years, travelers have gained the ability to check in for their flight online, change their seat and download an electronic boarding pass to a PDA. It’s also possible to check the flight status from a PDA before leaving for the airport. The rapid advancements in technology have enabled passengers to be more efficient and informed. But has airport security changed or evolved?
Every month, more products pour into security magazines and catalogs. We see a torrent of innovation and evolution continually adding features and reducing costs along the way. We need to step back from the tsunami of progress and ask, “So what?” What is the purpose of all this effort? Is there some technical nirvana we can bask in when we finally reach 100 megapixels, or ultimate peace when mesh networks consume our geography? Or is it all simply a pointless game of live fast and die? It is time to step back and consider the true goal.
A bewildering variety of technologies is available in the security market, and determining which will meet both future regulatory requirements and your budget can be difficult. The first step is to review your facility and define the various areas that require security. Examples are perimeter security, gate security, access control, visitor and contractor management, building security, live monitoring and an audit trail. There are many products designed to address one or more of these requirements.
G4S Secure Solutions USA is the relatively new name for a well-known company many know as Wackenhut, a successful provider of manned security services. Along with the new name comes a broader focus for the growing company, to include not only manned security services but also the element of technology, which continues to change the practice of security. We spoke to Drew Levine, president of G4S Secure Solutions, about how the company is broadening its approach, which includes acquisitions and internal product development.
More than 20,000 professionals from all vertical industries and government sectors -- from Fortune 100 companies to the Department of Homeland Security -- will gather in Dallas Oct. 12 to 15, for the ASIS International 56th annual seminar and exhibits. For thousands of security management professionals from around the world, and hundreds of product manufacturers and service providers, ASIS 2010 is the best place to meet peers face-to-face, share information and best practices, and discover how others are solving security challenges in today’s complex environment.
For the first time in history, the World Equestrian Games leaves Europe and comes to the United States, where, also for the first time, all eight disciplines will be held at one location: the Kentucky Horse Park in Lexington, Ky., a 1,200-acre working horse farm, theme park and equine competition center. This year, the World Equestrian Games has a title sponsor, Alltech, an animal health and nutrition group.
“We are required to have a system of checks and balances in place that would provide an account of the handling of all controlled substances on medical calls,” said Jeff Reagor, Clark County Fire Department EMS supervisor. “It’s imperative we provide accountability for the drugs we use. Clark County F.D. needed a system that would allow them to know when their narcotic safes were being accessed and by whom.” After researching available products, they found that CyberLock offered the best solution.
The Port of Wilmington, which opened in 1923, is the busiest port on the Delaware River and the leading North American importation site for fresh fruit, bananas and juice concentrate. It also was the first seaport to use the TWIC card, beginning with the TWIC Technology Phase pilot program in October 2003. TWIC is designed to add a layer of security at ports by ensuring that workers in secure areas have received a background check and do not pose a national security threat.
South Carolina’s Myrtle Beach International Airport serves more than 1.5 million travelers each year to and from one of the most popular golfing destinations in the United States. The airport is host to six major U.S. airlines. To accommodate the growth the area has experienced, the airport replaced its legacy security system, which was no longer servicing its needs, with intelligent field hardware and smart-card readers with bidirectional encryption.
Airport officials reviewed five security management systems in detail prior to making a selection for their new system. Based on scalability, ease of use and operation, along with the lower cost of maintaining the system, they chose AMAG’s Symmetry SMS. Airport officials highlighted how secure the system was from end to end and the enhanced video integration that the new system offered. They replaced their old analog video system with a digital system that is seamlessly integrated. The IP solution is one of the first all-digital security systems in the southeastern United States.
Multi-campus users want a new model for security and safety that offers customization today while providing easy migration or upgrades in the future. They want their next security system to be flexible, adaptable and scalable. The solution must provide the right products for their specific applications now and in the future. Users look forward to eventually incorporating emergency lockdown, Wi-Fi, network on a card, mesh networks, video analytics and other new technologies without complications.
With the transition from analog to digital video surveillance marching forward, there remains a crucial requirement for reliable transmission of the video signal -- especially during today’s period of coexistence. With many legacy installations, coaxial cable is used to transmit images from a camera for monitoring or recording, or both. Coax has its limitations, including restricted transmission distance, signal degradation over long cable runs and interference.
As the saying goes, everything’s bigger in Texas. That’s why Dallas is the perfect home for ASIS 2010, one of the industry’s largest and most important tradeshows. The 56th annual seminar will be held Oct. 12-15 at the Dallas Convention Center. Dallas is a lively, forward- thinking city in the middle of the fourth-largest metropolitan area in the United States -- and home to Security Products magazine.
With ASIS right around the corner, this month’s Industry Insight column is presented in a question-and-answer format, in which network video surveillance expert Fredrik Nilsson and editor-in-chief Ralph C. Jensen discuss surveillance industry trends, as well as what to expect at the show.
Hard as one may try, our bodies do not lie. In addition to the polygraph and fMRI brain scans that measure physiological responses when someone is lying, researchers at the University of Utah have created ocular motor deception detection technology, which employs eye-tracking technology to measure cognitive responses, specifically pupil dilation, to determine when someone is lying.