Homeland Security


Mexican State Uses IP Video Technology For Multi-City Surveillance

Chihuahua State in Northern Mexico has deployed a wide-area distributed surveillance system based on IndigoVision’s IP video technology.

FBI Report: Violent Crimes Drop For Third Consecutive Year In 2009

According to the figures released recently by the FBI, the estimated number of violent crimes in the nation declined in 2009 for the third consecutive year. Property crimes also declined in 2009, marking the seventh straight year that the collective estimates for these offenses dropped below the previous year’s total.

TSA Announces Award To Rochester International Airport

The Transportation Security Administration (TSA) today announced an award of $938,000 to Rochester International Airport (RST) for the construction of new in-line baggage handling systems designed to enhance TSA's efforts to strengthen security at airports.

NIST Releases Initial Set Of Smart Grid Cyber Security Guidelines

The National Institute of Standards and Technology (NIST) issued recently its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors and other threats.

Research: Hostage-Taking Incident At Discovery Communications Meets Criteria Of Terrorist Act

A new report by terrorism researchers at the University of Maryland concludes that the deadly hostage-taking incident at the Discovery Communications headquarters in suburban Washington, D.C. meets the criteria of a terrorist act -- a rare one for media organizations and the nation's capital region. Hostage-taking, though, is a familiar pattern in capital-region terror, the researchers add.

Compliance Director Says DHS To Quicken Pace Of Site Inspections

The agency has reviewed more than 38,000 Top Screens and 6,000 Security Vulnerability Assessments and is planning on conducting between 30 and 40 preliminary authorization inspections per month.

Smiths Detection Wins Contract To Provide Chemical Threat Detection, Video Management System For Washington, D.C. Metro

Smiths Detection recently announced the award of an additional five-year contract by the Washington Area Metropolitan Transit Authority (WMATA) to upgrade and maintain the company’s PROTECT and FirstView anti-terrorism detection and software systems.

New Product Of The Year Award Winners Announced

Security Products magazine, the only integrated product magazine reaching the entire security market, announced the winners of its 2010 New Product of the Year Award at the publication’s premiere Virtual Event today.



On Approach

South Carolina’s Myrtle Beach International Airport serves more than 1.5 million travelers each year to and from one of the most popular golfing destinations in the United States. The airport is host to six major U.S. airlines. To accommodate the growth the area has experienced, the airport replaced its legacy security system, which was no longer servicing its needs, with intelligent field hardware and smart-card readers with bidirectional encryption. Airport officials reviewed five security management systems in detail prior to making a selection for their new system. Based on scalability, ease of use and operation, along with the lower cost of maintaining the system, they chose AMAG’s Symmetry SMS. Airport officials highlighted how secure the system was from end to end and the enhanced video integration that the new system offered. They replaced their old analog video system with a digital system that is seamlessly integrated. The IP solution is one of the first all-digital security systems in the southeastern United States.

Total Site Security

A bewildering variety of technologies is available in the security market, and determining which will meet both future regulatory requirements and your budget can be difficult. The first step is to review your facility and define the various areas that require security. Examples are perimeter security, gate security, access control, visitor and contractor management, building security, live monitoring and an audit trail. There are many products designed to address one or more of these requirements.

New Threats, New Arsenal

When entering an airport, travelers can’t help but reflect back on the events of Sept. 11, and how things have changed since then. In recent years, travelers have gained the ability to check in for their flight online, change their seat and download an electronic boarding pass to a PDA. It’s also possible to check the flight status from a PDA before leaving for the airport. The rapid advancements in technology have enabled passengers to be more efficient and informed. But has airport security changed or evolved?

Getting a Handle on TWIC

The Port of Wilmington, which opened in 1923, is the busiest port on the Delaware River and the leading North American importation site for fresh fruit, bananas and juice concentrate. It also was the first seaport to use the TWIC card, beginning with the TWIC Technology Phase pilot program in October 2003. TWIC is designed to add a layer of security at ports by ensuring that workers in secure areas have received a background check and do not pose a national security threat.

Axis Cameras Part Of Security Solution Protecting Little League World Series

Axis Communications recently announced that, as part of a comprehensive and discreet security solution put together by partner Lenel Systems International, it has contributed more than two dozen thermal, fixed dome and PTZ network cameras to this year’s Little League World Series being held in South Williamsport, Penn.

A screen capture of the FirstView chemical threat video management system being installed at the Port of Providence, R.I.

Providence Port to Receive Chemical Threat Warning Installation

"By integrating live video, data management and immediate warning capabilities with fixed sensors in critical areas, FirstView and Athena will help protect against intentional or accidental chemical incidents,” said Smiths Detection Vice President Jamie Edgar.

FLIR To Acquire ICx Technologies

ICx Technologies Inc., a developer of advanced sensor technologies for homeland security, force protection and commercial applications, has entered into a definitive merger agreement with FLIR Systems Inc. pursuant to which ICx would be acquired through a cash tender offer, followed by a merger with a subsidiary of FLIR, for a price of $7.55 per share in cash.

TSA Announces 100 Percent Of Domestic Air Cargo On Passenger Aircraft Now Screened

The Transportation Security Administration recently announced the airline industry has met a key requirement of the 9/11 Act by screening 100 percent of air cargo on domestic passenger aircraft.

What's In Your Future?

The typical access control system in use today, in all too many cases, is installed in stages. As a result, it is comprised of different brands and disparate products, many of which do not integrate into the same system or talk with each other.

Lurking in the Shadows

Mal-intended people operate under the cover of night, knowing that darkness makes it hard for them to be detected and identified. While it is difficult for humans to see in darkness, our eyes compensate by opening the iris. But a wide-open iris is easily blinded by sudden, direct illumination. Video cameras work in a similar way.

Tipping the Scales

The southern border typically receives more media attention and employs stricter security measures than the northern border. However, the United States and Canada share more than 5,000 miles of border, while the United States and Mexico share 1,900 miles. The Canadian border is a prime throughway for people and drugs.

Inside and Out

While airports worldwide struggle to maintain security and regulate access to restricted areas, some facilities have found a solution by implementing the most advanced and accurate identification technology available: biometrics.

Featured

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.