Safe and Sound

As complexity of government security grows, industry needs to keep up with changes

GOVERNMENT security has been the subject of unprecedented focus since 9/11. Before the attacks, advanced physical security was considered a necessary expenditure only for military facilities and key government installations in high-target areas around the world. Before 9/11, people were comfortable with security and confident terrorism would never touch the country directly on home soil.

Few believed that security was necessary to protect national buildings, prized civic possessions and treasured American institutions. But the face of the security market is changing—the public is less willing to tolerate risk—and the potential for threat is growing. Technical advances in surveillance and security are increasing exponentially while the cost of that technology is decreasing. As a direct result of evolving economic and risk-tolerance dynamics, regulatory requirements for security in government facilities also are changing.

Regulatory Reaction
Due to growing system standardization and increased scrutiny on government and critical infrastructure security, more technology is being used at the sites. It also is likely Congress will authorize agencies such as DHS, FAA, FDA, the Securities and Exchange Commission, the North American Electric Reliability Corp. and others to promulgate and enforce more demanding security regulations. One recent and high-profile example is HSPD-12 and FIPS-201, which mandate common credential technology for more than 40 million federal employees and contractors. The government has launched an evaluation program aimed at vetting suppliers for compliance with the specifications and is paving the way for federal agencies and departments to deploy FIPS-201 solutions.

In answer to FAA mandates, various forms of electronic access control have been used in America’s airports for many years. But with the increased emphasis on individual safety measures and protection of infrastructure, airports are upgrading security mechanisms with modern systems and incorporating comprehensive video surveillance technology. DHS has been granting airports millions of dollars to upgrade their security infrastructure and is funding pilot programs to install the latest technology. More money has been spent on metal detectors, luggage scanners and additional personnel. Everyone has witnessed agents from TSA requiring passengers to remove shoes and belts, and confiscating fingernail clippers and water bottles. Yet today’s airport security extends far beyond the hands-on measures, incorporating some intriguing cutting-edge technologies.

Last year, the Houston Airport System received a $3.5 million grant from DHS to improve security measures at its three airports. The largest of the three, George Bush Intercontinental Airport, installed a state-of-the-art perimeter intrusion detection solution consisting of radar video surveillance (RVS) and advanced video processing systems (AVPS). RVS, a software system originally developed by Honeywell Aerospace to protect ports and track missiles, was adapted for ground use and is being used to monitor the airport’s perimeter. AVPS monitors and analyzes certain behaviors captured by video and is then deployed in areas where ground-based radar may be obstructed by buildings or towers. At the time the systems were installed, the two combined technologies provided the airport with the most advanced surveillance capabilities available at any airport in the country.

In late 2006, Congress inserted language into the DHS Appropriations Bill that requires the nation’s most hazardous and potentially vulnerable chemical plants to install more advanced physical security systems. Penalties for non-compliance can be very stiff for plant owners and operators, not to mention the loss of goodwill with the communities in which the plants operate. In the next few years, major initiatives from chemical producers and storage owners to comply with these new regulations will likely be seen.

But the expanding influence and broadening purview of DHS does not stop with airports and chemical plants. In light of an estimated DHS budget of $35 billion for 2007, literally billions of dollars will be allocated to and spent by local, state and municipal authorities. Similarly, a focus on security in the private sector has become increasingly intense with many local, regional and global players installing and upgrading security systems.

Grants from DHS and funding from local municipalities have resulted in the installation of security systems in more ports and harbors. All major ports have Coast Guard patrols and most have expanded controlled access to the waterfront area. Similarly, some advanced ports have installed radar and long-range imaging technology to extend security beyond the perimeter of the facility miles out to sea, up or down river, while others have recently upgraded technology to include smart card access control technology.

On the East Coast, the Port of Wilmington in Delaware was selected as the first port facility in the country to test the TWIC smart card. TWIC integration is aimed at providing 100-percent assurance the person holding a credential is indeed the correct person. Upon presenting the card to a reader, the transportation worker’s picture pops up for the gate operator to verify against a live video feed. If the operator does not get a match, they can override the gate’s automatic response and deny admittance to the person. The initiative helps the port protect personal privacy of workers, enhance commerce and help meet federal goals for improved security.

Exceptional Solutions
High-profile government facilities such as embassies, city centers, federal buildings and many other government facilities are some of the most sensitive and heavily guarded in the world. These sites have spared no expense with regard to physical security, so while only concrete planters and metal detectors may be visible, more complicated security measures are usually at work behind the scenes. High-resolution cameras, complex perimeter intrusion equipment, sensitive exterior and interior intrusion sensors and sophisticated biometric access control products guard these facilities—all tightly integrated, allowing operators to quickly assess security threats and dispatch appropriate resources.

With a wide variety of stakeholders and political interests involved, government security solutions tend to widely vary among locations and facilities. For example, courthouses in two separate jurisdictions may have different security solutions. While both may use metal detectors and armed guards to screen entrants, one also may have hidden cameras with facial recognition capabilities looking for known suspects who have been flagged in a database. Or both sites could have hidden cameras while one might also have its camera system networked with a city-wide surveillance system that facilitates computer-aided dispatch and optimizes deployment of law enforcement resources.

Similarly, differences exist among the U.S. military and selection and certification security solutions. For instance, the Air Force has an arduous testing process and well-documented specifications that determine what suppliers and solutions are suitable. Unless a product has received approval from the appropriate Air Force testing group, it is difficult for that product to be specified. The Army approach differs in that officials tend to vet suppliers and solutions on a program-by-program basis. Once selected as a potential supplier for a large Army program, a provider may still need to compete for each individual project.

One key challenge with many high-security and government installations is communication. Security data often travels large distances over diverse communications networks to get to and from one or more central command and control centers. Using technology originally developed for the military, Honeywell’s Vindicator® technology and products are being adapted to solve communications challenges in energy production and storage sites, nuclear power generation plants and correctional facilities around the world. The products provide encrypted, redundant transmission of information gathered from a number of sensors to command and control operators, as well as advanced intrusion detection, access control and integrated CCTV capabilities. Because the products are able to communicate effectively over LAN/WAN, RS485, fiber-optic or RF, users benefit from extreme flexibility while achieving surveillance and security solutions that meet or exceed the strictest military testing and certification requirements.

With an increase in urban population and the rising threat of terrorism, public security in urban areas has become even more critical. Citizens are relying more on technology to not only protect their property, but also to keep them safe. Numerous cities have deployed centralized surveillance systems. For example, the Beijing Traffic Management Bureau has adopted a video surveillance system to centrally monitor traffic around the city. The system captures traffic information in several command centers, allowing operators to dispatch appropriate resources in a timely manner. When an integrated approach is adopted by cities, security systems work more efficiently and reliably in the entire urban area. By improving response capacity and expanding the ability to handle emergencies in a methodical way, public emergency management systems allow city managers to address potential risks to citizens and property, and handle natural disasters more efficiently.

As a result of the recent bombings in London and Madrid, city surveillance applications have become more important and visible. Cities throughout the United States and around the world are investing in systems that detect, track and help apprehend criminals in and around valuable landmarks. Chicago, Baltimore, New York City and Beijing have made headlines by building security infrastructures that allow law enforcement officials to anticipate and deter potential incidents, while also providing them with expanded forensic capability, giving their citizens peace of mind. These systems have advanced far beyond the ubiquitous concrete barriers and cement planters in front of government buildings and corporate headquarters. Many of the solutions will incorporate technology similar to that used by the Houston Airport System, as well as technology that is protecting numerous military installations.

Moving Forward
Security professionals expect to see large investments in technology from chemical plants, refineries, border patrol agencies, electrical utilities and other critical infrastructure operators (dams, water processing plants, bridges and tunnels) aimed at providing advance warning of unauthorized intrusion. These advanced perimeter intrusion detection systems employ smart radar, long-range and thermal imaging, fiber-optic and coaxial sensors with data that can be combined with other security sub-systems such as advanced digital surveillance, electronic access control and commercial intrusion technology. The data can be compiled and transmitted to remote locations over encrypted, redundant communication links. Then dispatch operators are able to take immediate and informed action, deploying resources where most needed.

The natural transition to replace analog cameras and traditional VCRs with all IP video products and smart cameras is bringing network-based systems to the forefront of the security arena. Smart cameras, digital video recorders and video analytics are further expanding and fine-tuning the ability of systems to capture only the information operators need to take action. Similarly, single sign-on applications, enterprise identity management components and broad adoption of smart card technology continues to blur the lines between security and information technology. Eventually, one single solution will be implemented to manage a comprehensive security policy for an entire organization, and it will be aimed simply at reducing overall risk. Additionally, the central monitoring stations of the past will migrate to complex data-fusion centers, where information from multiple systems will be combined and complex algorithms will help predict where threatening events may occur.

Government security needs continue to grow in magnitude and complexity. As the scope of security projects expands, contracts are becoming more specialized and suppliers are expected to deliver on more exacting requirements and rigorous demands. Today, more than ever before, it is crucial that government facilities, federal employees and contractors be protected by an effective security solution. As the magnitude and complexity of the task grows, it is imperative suppliers and integrators keep pace with technology and be up to the task of designing, delivering and servicing a wider variety of solutions over time.

About the Author

John Waldron is a marketing manager for Honeywell Security.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2024: Post-Show Recap

    ISC West 2024 is complete. And from start to finish, the entire conference was a huge success with almost 30,000 people in attendance. Read Now

    • Industry Events
    • ISC West
  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3