Locked Down: Municipal Public Safety Departments See Benefits in Kinetic Mesh Wireless Networks

Kinetic Mesh’s secure, mobile network can aid law enforcement, surveillance efforts

Modern municipalities tackle many obstacles, ranging from small, like keeping pigeons off a statue of the town founder, to large, like maintaining and upgrading infrastructure – all within budgets that get tighter every year. According to Rand, “Many state and local governments are facing significant fiscal challenges, forcing policymakers to confront difficult trade-offs as they consider how to allocate scarce resources across numerous worthy initiatives.”

Public safety should not be one of those trade-offs, and finding affordable technologies that help keep citizens safe is a goal for local governments across the country. As public safety and security technologies continue to advance, some municipalities are turning to a wireless network called Kinetic Mesh.

Kinetic Mesh has been implemented in such rugged environments as mining, military, and oil and gas operations. Many wireless networks use static infrastructure like access points, towers or wireless routers, while the people and vehicles on the network are always on the go; in Kinetic Mesh, everything is constantly moving – including the infrastructure – and can come and go as needed, allowing use in dynamic environments.

At any given time, there can be thousands of possible routes through a Kinetic Mesh network with even just a handful of wireless nodes. In a Kinetic Mesh network environment, each node is connected to many nodes. Kinetic Mesh maintains huge numbers of simultaneous links to adjacent peers and the nodes constantly reevaluate what routes are the best paths for any given packet of information. If one route becomes unavailable for any reason – interference, loss of power, congestion – the next packet takes a faster route around the problem. Every node can make a fully independent decision, and it is not uncommon for a node to have several hundred peer connections, giving it the ability to use any link at any time.

Kinetic Mesh, Security and Privacy

In addition to being highly mobile and reliable, Kinetic Mesh allows a secure, private backbone to transmit whatever type of traffic – video, data, voice – a user requires, while also detecting tampering and supporting encryption of data security.

When people think about wireless security, they often think about authentication and encryption between a client device (like a laptop or phone) and the access point or router the device talks to. That type of encryption secures the link between the device and access point, but then, away from the access point, information is decrypted and sent on its way.

Kinetic Mesh offers the same type of encryption that wireless clients require for Wi-Fi as well as end-to-end encryption. When encrypted information flows through the mesh and comes out another node, it stays encrypted all the way through, and is not decrypted until it is delivered to its final destination, ensuring privacy.

At each hop in the network, Kinetic Mesh provides a per-hop authentication for each packet, as well as secure authentication of message. This detects if data is tampered with while ensuring a packet of information received by a node came from a trusted peer. This protects from a type of cyber-attack called packet injection, when attackers try to “throw” packets into the network to disrupt traffic.

Metadata encryption is another feature of Kinetic Mesh, and was implemented at the request of the military. Kinetic Mesh encrypts data so that as it flows through the network, an attacker cannot analyze the traffic and see which nodes are communicating with which other devices.

Kinetic Mesh’s security features can benefit public safety and law enforcement in a municipality, especially in the realms of emergency operations and the capturing and processing of video.

Emergency Operations Facilitation

 

A Kinetic Mesh network’s mobility means that nodes can be placed in police, fire and emergency vehicles as well as in static locations, and the network travels with the vehicles. For example, three vehicles driving down a road with nodes in them are all connected to each other as well as to any nodes on poles, drones flying overhead, etc., and all work in concert. If another vehicle with a node joins, the network adjusts immediately and that vehicle is then connected.

 

During emergency operations, any vehicle with a node in it can be the first on the scene and act as the first broadcast point for all other emergency personnel and vehicles arriving; a wireless network that runs point to point would require getting the vehicle with the access point to the scene first. This mobility also allows a faster response time as well as proactive intervention. In the case of a flood or widespread fire, even if multiple utility poles with nodes attached go down, the network reroutes and stays up.

 

Security Video Applications

Many municipalities are eager to improve the quality and quantity of their security video, but budgetary constraints cripple efforts to upgrade control rooms and add infrastructure such as cameras.

 

Kinetic Mesh facilitates distributed video processing by supporting HD video processing at the network edge. Surveillance cameras plug into a node that has powerful computer processing power as well as a terabyte of solid state memory. High-definition video from the camera is stored in the wireless node on the utility pole and can be accessed directly from a Web browser without additional processing, enabling control room functionality from anywhere. Nodes can also be added to police cars with dashboard cameras and as the cars move around town, that video joins the data stream.

 

Cities do not necessarily need to have a lot of money in the budget to start implementation; they can start with just a few assets, being strategic about where they place them, and add more over time – and Kinetic Mesh’s scalability means that any number of cameras can be added at any time, improving the network without any reconfiguration. This is helpful to city planners, who often need to think years into the future when retrofitting or adding new infrastructure.

 

There is also a public service element to having cameras on a Kinetic Mesh network, as the cameras can be used for functions like detecting empty parking spaces in real time.

 

Having the cameras on the Kinetic Mesh network also can assist in legal proceedings. After an incident, occasionally a police officer takes the security video off a camera on a pole and stores it in a hard drive or on a desktop computer. This can interfere with the chain of evidence in a court case, as it could be argued that the video was tampered with at some point between coming off the pole and arriving in court.

 

Video on a Kinetic Mesh network comes with cryptographic assurance that data flowing through the network has not been tampered with, which can help court cases by proving the video is accurate.

 

The wireless nodes have the technical capacity to allow implementation of ancillary public safety features such as license plate or facial recognition software. The software could be embedded into the wireless node itself and run on the network. The terabyte of storage in each node would allow for these applications as well as 30 days of high-definition video storage.

 

Case in Point: Media, Pa.

Media, Pa., installed a six-camera network running on Rajant’s Kinetic Mesh wireless network in October 2014. Media has budget challenges like many small towns, and the scalability of the Kinetic Mesh network and wireless nodes meant it could strategically implement video assets in a few key areas.

The six-camera installation allows video surveillance and also acts as a police force multiplier for the borough; police officers cannot be everywhere at once, so placing high-definition cameras in important areas is like having extra boots on the ground.

The town’s businesses also leveraged the Kinetic Mesh network by allowing their own security cameras to tie into the common network, creating an open architecture that can help in the event of a crime.

One clear example of how the small town saw the investment pay off came after a crime committed in February 2015, in which a man assaulted a woman and fled the scene. The incident was captured on a CacheCrumb, a high-definition edge video processor node located on a nearby utility pole camera.,  The video could not have been altered or tampered with in any way due to the innate security of the Kinetic Mesh network, and was able to be used as evidence in the court case.

Many municipalities and cities face the same budget and staff constraints as Media. Implementing a scalable, mobile solution that is highly secure and allows access to the latest data can help local governments make more informed decisions, provide better emergency operations and ensure safety for its citizens.

Featured

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.