security shield

How to Enhance Public Safety With Emerging Technologies

Security leaders are investing in advanced technologies like artificial intelligence, biometric solutions and advanced communication networks.

When an unforeseen act of violence, theft or cyber attack takes place, it catches us off-guard and shatters our sense of well-being. It can take form in an active shooter situation, a robbery, terror attack, or any other threat taking place that puts the general public and commercial sector in danger. To shift to greater prevention and more real-time response and mitigation, the use of emerging new technologies is creating the opportunity for organizations to be better prepared and to prevent or diminish the impact.

 

To prevent threat situations from happening, and to be prepared to react swiftly when there is danger, governments, businesses and schools alike can effectively deploy emerging technologies – like converged cyber-physical security monitoring, alert and detection sensors, biometric technology for access control, and advanced communication networks and analytics that enable predictive modeling and much faster response times – in order to eliminate or reduce the amount of potential loss, injuries/casualties and damage.

 

Below are some ways that emerging technologies are changing how organizations think about and enhance security and public safety today.

 

Converged Security

 

Organizations across the globe have a responsibility to keep their employees, visitors and assets safe and secure. To do this, it’s important to embrace the ability to map one’s security systems across physical security, IT/cyber security and operational technology platforms – to avoid and eliminate gaps and risk. Across the spectrum of “PS, OT, IT” technology integration, it will also stimulate greater collaboration between cross-functional teams and departments.

 

This is extremely important for a wide range of organizations – from those open to the general public day-in and day-out, such as malls, schools, amusement parks, museums, and sports venues, to large manufacturing and industrial environments with a high value of physical and data assets, and to government and critical infrastructure facilities and systems.

 

To integrate converged security solutions, business and government leaders are investing in advanced technologies like artificial intelligence, that connects to smart cameras to alert them of suspicious activity, equipping security guards with wearable technology to notify them of any known dangers, deploying ground robots and drones to enhance human security teams, building technology sensors into perimeter security, and advanced monitoring systems to connect the private and public sector and law enforcement.  

 

With these solutions, organizations are able to build a stronger, more secure environment by integrating both the technology and teams.   

 

Detection and Biometric Technology

 

A key part of improving public safety today is with the use of advanced technology that can detect threats, such as gunshot detection systems, facial recognition cameras and sophisticated AI-based surveillance systems – which are extremely beneficial to law enforcement, emergency response personnel, as well as private organizations.

 

For example, the Department of Homeland Security (DHS) Science and Technology (S&T) have adapted gunshot detection systems – first used by the military – to help law enforcement identify gunshots over a large area to an accuracy of within a few feet. With access to this type of advanced technology, police officers are able to accurately and immediately respond when there’s an active shooter in a crowded, public area to reduce the amount of potential carnage and collect data from the scene for evidence later on.

 

Advanced cameras that responsibly use facial recognition are growing in popularity and an effective way to protect everyday citizens from people with malicious intent. Law enforcement agencies, including the DHS, have already begun implementing this type of technology in airports to verify the identity of people entering or exiting the United States. Additionally, other law-enforcement agencies, such as regional police departments, are using the technology to help identify suspects or missing people.

 

As these systems continue to develop via government use-cases and development labs, they’re also gaining traction for businesses and consumers by using facial, fingerprint and or/retina biometrics as an added security measure on public and personal devices and for access control in buildings.

 

Advanced Communication Networks

 

Finally, to connect all of these technologies and ensure emergency personnel and the general public are able to communicate in the case of an emergency, advanced communication networks like 5G and first responder-dedicated networks have been developed and are being used to better protect the public when disaster strikes.

 

While 5G is currently in its early stages of deployment, the technology promises to revolutionize connectivity for everyone by delivering new levels of performance and efficiency to elevate mobile communication and the Internet of Things (IoT). The technology will power smart cities, offer real-time communication for law enforcement and emergency medical response, to interconnect and control machines, and much more – all of which will contribute to improving public safety.

 

Similarly, public safety-dedicated networks like AT&T’s FirstNet, Verizon’s Responder Private Core and more, have already began to vastly improve public safety by giving emergency personnel a way to safely and accurately communicate with one another at all times – even when public cell networks are extremely congested or lines are down during a natural disaster. For example, at a sporting event that might congest cell networks for the general public, police officers would be able to communicate seamlessly on a dedicated network to speak with other emergency responders and have them dispatched in real-time in case there’s a threat to public safety that requires immediate attention.

 

Implementing Technology and Strategies Within Your Organization

 

As a security professional, no matter what type of organization you’re involved with – there is a great responsibility for the safety and wellbeing of your employees, customers or citizens  – whether at a school, restaurant, stadium, commercial building, airport or wide open public spaces.

 

Embrace pilot projects for emerging technology, align and motivate your cross-functional teams to collaborate, aim to build it into the standard procurement process, and get executive leadership buy-in and commitment for both funding and long term organizational change. Today’s innovation can be tomorrow’s proven best practice, charting the course for a safer and secure future.   

 

For additional security and public safety industry resources that can be of value to you during this challenging economic and COVID-19 timeframe, refer to ISC resources and Security Industry Association resources as follows: ISC West, ISC News and Security Industry Association.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3