How home security is transitioning from a traditional passive model to an interactive paradigm

The professional security market is a mature and stable industry with a proven business model that has successfully worked for decades. In recent years, however, there has been an unprecedented technological revolution that included several factors, such as the advent of smartphones and IoT and the proliferation of cloud-based services all of which has brought improvements in connectivity and new forms of interactivity. This has led the industry towards some major changes.

These changes have caused the traditional security market to shift into more interactive security, providing a combination of professional monitoring services together with interactive capabilities for the end user. According to Strategy Analytics, by 2020 there will be more households with interactive security than traditional security. It is easy to understand why: consumers prefer the capabilities that interactive systems provide. One example is the ability to verify an intrusion with their smartphone after receiving an alert that someone entered the house. While with traditional security, users were passive, and did little more than turn on their alarm when they left the house, with interactive security they have become actively in control of their home s features. Full control But it s not just about security. Interactivity also enables home security solutions to work with other connected living devices, such as smart thermostats or connected light bulbs. This brings together all the benefits of traditional home security with modern, connected, home automation, placing full control of the house into the homeowner s hands. In the words of William Ablondi from Strategy Analytics: Consumers want their security systems to not only protect their families and their homes, they increasingly see them as the foundation of total home control.

Perhaps the path to interactivity started with SMS alerts that warned of a potential burglary every time an alarm went off. But it was the smartphone that turned everything upside-down and set the up-to-now predictable and stable security industry into a furious race towards interactivity. Interactive security has forever changed the traditional business model, and blurred the lines between professionally monitored and DIY security Despite fierce competition, security service providers can now offer the best of two worlds: they get to provide professional monitoring and other traditional services together with new interactive capabilities that make solutions better and more convenient for consumers, allowing them to gain full control over their home, with which they can interact from anywhere in the world. Besides, while the market scope for traditional security was narrowed to homeowners aged over 45 and in the higher-income side of the spectrum, IoT-enabled security has broadened that scope. It has democratised home security, which is now available to all types of users, across all budgets and housing situations, from younger millennials to renters, who can take the system with them as they move to a new house. Also, interactive security solutions can provide service providers with data about user s activity, which could be analysed and used in order to improve user experience and prevent customer churn. Interactive security has forever changed the traditional business model, and blurred the lines between professionally monitored and DIY security, creating several hybrids and flexible, in-between solutions that adapt to the needs of every type of customer, even as those needs change and evolve over time. Although traditional security systems are still in the majority, the exponential growth of interactive solutions shows that interactivity is here to stay and that it will soon surpass the traditional model, fuelled by consumer preferences and the latest technological trends. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals.

Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Click here to Download now

Aviation laptop ban the threat is real and requires new response

Aviation Security The proposed ban on all electronic items larger than smartphones is required because the threat is real . That s the view of Ian Hutcheson OBE, security advisor at airport security giant L3. Hutcheson said these complex IEDs which can be disguised as such devices require more advanced technology than is currently available, also revealing that L3 is currently working on new computed tomography machines to tackle the threats.

However, he also claimed that simply detecting threats is not enough for the role of technology. He said: It is much easier to measure detection capability than deterrents, but mitigating future risks will require technologies that both deter and detect. Despite this technology can produce real deterrent value such as PWM scanners at Heathrow. Many people discarded drugs and other contraband because they didn t understand the capabilities of the scanner. Hutcheson also noted the potentially negative impact that increased response to threats could have to the global aviation industry s core business getting passengers from origin to destination. How do we improve security while keeping business moving? That is it we need to find out. Visit Europe s leading security event in June 2017 Visit IFSEC International for exclusive access to every security product on the market, live product demonstrations and networking with thousands of security professionals. From access control and video surveillance to smart buildings, cyber, border control and so much more.

It is the perfect way to keep up to date, protect your business and enhance your career in the security industry.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

Government "must be more vigorous" in approach to cyber security

Government “must be more vigorous” in approach to cyber security The UK Defence Committee’s report, published today, notes that cyber threats can evolve with almost unimaginable speed and serious consequences for the nation s security. Chairman of the Defence Committee is Rt Hon James Arbuthnot MP, who said: “There’s a consensus that cyberspace is a complex and rapidly changing environment. It was therefore important for us to consider the implications for UK defence and security.

It’s our view that cyber security is a sufficiently urgent, significant and complex activity to warrant increased ministerial attention. The Government needs to put in place as it has not yet done mechanisms, people, education, skills, thinking and policies which take into account both the opportunities and the vulnerabilities which cyberspace presents.” Evidence received by the Committee suggested that, in the event of a sustained cyber attack, the ability of the Armed Forces to operate effectively could be fatally compromised due to their dependence on information and communication technology. The Committee probed MoD witnesses about its back-up systems in these circumstances.

Arbuthnot commented: “We have asked the Government to set out details of the contingency plans it has in place should such an attack occur. If it has none, it should say so and urgently create some.” The Committee was impressed by aspects of the co-operation and joint working between the MoD and private sector contractors. It welcomed the Government s commitment to foster a vibrant and innovative cyber security sector in the UK, including a distinct role for the MoD to deliver military capabilities both to confront high-end threats and to provide a potential offensive capability. “The opportunity created by cyber tools and techniques to enhance the military capabilities of our Armed Forces is clear,” asserted Arbuthnot. “We want to see the MoD explore this thoroughly.

For this reason, we support the use of National Cyber Security Programme funding to develop these capabilities, but also wish to be assured that the MoD will maintain its investment in existing defence intelligence services which provide a vital UK cross-Government capability.” Response from IT security specialists Wieland Alge, vice-president and general manager for EMEA at Barracuda Networks, has responded to this morning’s report. The danger of a cyber attack on the nation is and always will be a threat, and the problem is not restricted to the military,” he said. “Take large hospitals, our banking systems and transport infrastructures such as airports and railways, for example all are relied upon to carry on with our day-to-day lives and all have core IT processes that rely on the ability to keep data flowing securely. Firewalls and related security systems are responsible for protecting these crucial technology infrastructures, and the Government should regularly review its security plans across its whole organisation.

Malicious attacks, data loss and network downtime is something that the military and all other Government sectors cannot afford to ignore or take lightly. Also responding to the report, Stephen Midgley – vice-president responsible for global marketing at Absolute Software has commented on UK business’ role in ensuring the nation benefits from greater education, and in turn is able to deflect the very cyber threats the report heralds as major risks to UK infrastructure and security: “While it’s imperative that Government invests in building cyber knowledge, skills and defence systems, the responsibility of the citizen and of business cannot be underestimated. The sheer amount of data shared, and breadth of device types now inherent in our personal and working lives is staggering.

There are now numerous open gateways through which the unscrupulous, or even dangerous may exploit weaknesses at cost to both the individual and, in severe cases, national security and infrastructure.” Midgley added: “UK business must accept its part in leading the way in shutting these open doors. Our recent research showed over a third of UK businesses have no policies in place to manage and secure mobile devices in the workplace. With the rise of bring-your-own-device there is a growing ‘free-for-all’ when it comes to the individual being able to access and share data on insecure, easily compromised, easily lost or stolen devices.” As far as Midgley’s concerned, while it may seem improbable that the average citizen could inadvertently be the conduit to a major national cyber attack, it’s not impossible.

He concluded: “What businesses should be taking from this report is the need to lead from the front, change attitudes to ‘cyber culture’ in the Boardroom and educate employees of the importance of safe, secure Internet and data usage.

Where business leads, Government will have no choice but to follow.”

Winnie-the-Pooh tactics to trap cyber criminals

Winnie-the-Pooh tactics to trap cyber criminals The European Network and Information Security Agency (ENISA) is launching an in-depth study of 30 digital honeypots designed to proactively detect cyber attacks. The EU s cyber security agency believe that the increasing number of complex cyber attacks require better early warning detection capabilities. Honeypots are traps designed with the sole task of luring in attackers by mimicking a real computer server or application.

Any identity that connects to a honeypot is immediately deemed suspicious and all activity by the identity is monitored to detect a malicious attack. ENISA recently recognised in a report Proactive Detection of Network Security Incidents that honeypots were not widely used, despite a recognition that they are extremely effective at detecting malicious behaviour from hackers. ENISA has said that the difficulty of usage, poor documentation, lack of software stability and developer support and little standardisation were among the reasons why honeypots were not more widely used by computer emergency response teams (CERTs).

ENISA executive director, Professor Udo Helmbrecht, said: Honeypots offer a powerful tool for CERTs to gather threat intelligence without any impact on the production infrastructure. Correctly deployed, honeypots offer considerable benefits for CERTs; malicious activity in a CERT s constituency can be tracked to provide early warning of malware infections, new exploits, vulnerabilities and malware behaviour, as well as give an opportunity to learn about attacker tactics. Therefore, if the CERTs in Europe recognise honeypots better as a tasty option, they could better defend their constituencies assets.

ENISA has published a full breakdown of the 30 honeypot systems they tested rating them in a variety of areas including: Detection scope Quality of collected data Scalability and performance Reliability Cost The full breakdown of the results can be seen in ENISA s report: Proactive Detection of Security Incidents Honeypots.

Following the TSA's lead, the NTSB drops Blackberry for iPhone …

According to a report in the Wall Street Journal1, the National Transportation Safety Board, or NTSB, may join the growing number of government agencies that plan to ditch the BlackBerry in favor of the iPhone.

A notice2 posted on the Federal Business Opportunities website3 announces that the NTSB is working with Verizon Wireless to supply iPhone 54 handsets to the agency.

In a PDF justification for the “sole source” declaration regarding Verizon and the iPhone 55, the NTSB says that the agency “requires effective, reliable and stable communication capabilities to carry out its primary investigative mission and to ensure employee safety in remote locations.” The agency pointed out that BlackBerry handsets “have been failing both at inopportune times and at an unacceptable rate.”

The NTSB noted that iPhones are the best solution going forward as they are compatible with the agency’s fleet of iPads and can be supported by the existing IT and messaging infrastructure in place there.

The NTSB is getting a substantial discount on the iPhone 5 handsets in consideration of the expenditures already incurred to buy BlackBerry units from the carrier.

This isn’t the first government group to drop the BlackBerry.

Earlier this year, the Defense Department announced it was accepting proposals for an iOS or Android-based software security system for mobile devices.

This contract could eventually support up to 8 million devices, says a report in USA Today6.

The Immigration and Customs Enforcement confirmed in September that it would switch its 17,676 mobile users to the iPhone because the BlackBerry could “no longer meet the mobile technology needs of the agency”; the Bureau of Alcohol, Tobacco and Firearms made a similar move earlier in 2012.

The Transportation Security Administration also announced in May that it would drop both BlackBerry and Windows mobile devices and replace them with Apple products in a deal worth $3 million.

Despite these setbacks, beleaguered RIM says it still has “1 million government customers in North America alone who depend on BlackBerry, and more than 400,000 government customers worldwide upgraded their devices in the past year.”

Via WSJ and USA Today8]



  1. ^ the Wall Street Journal (
  2. ^ notice (
  3. ^ Federal Business Opportunities website (
  4. ^ iPhone 5 (
  5. ^ PDF justification for the “sole source” declaration regarding Verizon and the iPhone 5 (
  6. ^ a report in USA Today (
  7. ^ WSJ (
  8. ^ USA Today (
  9. ^ Following the TSA’s lead, the NTSB drops Blackberry for iPhone (

More Rock Bottom Offers

RIM intros BlackBerry Mobile Fusion with enterprise management …

RIM intros BlackBerry Mobile Fusion with enterprise management ...

Research In Motion announced BlackBerry Mobile Fusion on Tuesday, its latest enterprise solution that will allow corporate IT departments to manage devices running both RIM s own BlackBerry OS as well as tablets and smartphones running Android and iOS. BlackBerry Mobile Fusion brings together our industry-leading BlackBerry Enterprise Server technology for BlackBerry devices with mobile device management capabilities for iOS and Android devices, all managed from one web-based console, RIM VP of enterprise product management and marketing Alan Panezic explained. It provides the necessary management capabilities to allow IT departments to confidently oversee the use of both company-owned and employee-owned mobile devices within their organizations.

Read on for more.

The software supports connectivity management, asset management, configuration management, security and policy definition and management and more across each platform.

It also includes BlackBerry Enterprise Server (version 5.0.3) for BlackBerry smartphones and new management features for the BlackBerry PlayBook.

BlackBerry Mobile Fusion is in early beta testing for now but RIM expects another closed beta program to begin in January.

The software should be generally available some time in March.

RIM s full press release follows below.

RIM Announces BlackBerry Mobile Fusion The Next Generation Enterprise Mobility Solution for BlackBerry, Android and iOS Smartphones and TabletsSimplifies Management of Smartphones and Tablets for Business and Government

Waterloo, ON Research In Motion (RIM) (NASDAQ: RIMM; TSX: RIM) today introduced BlackBerry Mobile Fusion the Company s next-generation enterprise mobility solution and RIM s entry into the multi-platform Mobile Device Management (MDM) marketplace.

Building on years of leading enterprise mobility management solutions from RIM, BlackBerry Mobile Fusion will simplify the management of smartphones and tablets running BlackBerry , Google Android and Apple iOS operating systems.

We are pleased to introduce BlackBerry Mobile Fusion RIM s next generation enterprise mobility solution to make it easier for our business and government customers to manage the diversity of devices in their operations today, said Alan Panezic, Vice President, Enterprise Product Management and Marketing at Research In Motion.

BlackBerry Mobile Fusion brings together our industry-leading BlackBerry Enterprise Server technology for BlackBerry devices with mobile device management capabilities for iOS and Android devices, all managed from one web-based console.

It provides the necessary management capabilities to allow IT departments to confidently oversee the use of both company-owned and employee-owned mobile devices within their organizations.

RIM is the leading provider of enterprise mobility solutions with over 90 percent of the Fortune 500 provisioning BlackBerry devices today. The enterprise market for smartphones and tablets continues to grow in both the company-provisioned and employee-owned (Bring Your Own Device or BYOD) categories. BYOD in particular has led to an increase in the diversity of mobile devices in use in the enterprise and new challenges for CIOs and IT departments as they struggle to manage and control wireless access to confidential company information on the corporate network.

This has resulted in increased demand for mobile device management solutions.

BlackBerry Mobile Fusion brings together the market-leading BlackBerry Enterprise Server (version 5.0.3) for BlackBerry smartphones; new management capabilities for BlackBerry PlayBook tablets built on BlackBerry Enterprise Server technology; and mobile device management for smartphones and tablets running Android and iOS operating systems.

BlackBerry Mobile Fusion will provide the following mobile device management capabilities for all supported mobile devices*:

Asset management Configuration management Security and policy definition and management Secure and protect lost or stolen devices (remote lock, wipe) User- and group-based administration Multiple device per user capable Application and software management Connectivity management (Wi-Fi , VPN, certificate) Centralized console High scalability

BlackBerry smartphones will continue to benefit from the many advantages of the end-to-end BlackBerry solution including the same advanced IT management, security and control available with BlackBerry Enterprise Server 5.0.3, which is part of BlackBerry Mobile Fusion.

These advanced features include BlackBerry Balance technology supporting the use of a single device for both work and personal purposes without compromising the organization s need to secure, manage and control confidential information; over 500 IT policies; over-the-air app and software installation and management; high availability; and much more.

BlackBerry Mobile Fusion will also introduce new self-service functionality for employees to secure lost or stolen BlackBerry smartphones and BlackBerry PlayBook tablets.

BlackBerry Mobile Fusion is currently in early beta testing with select enterprise customers.

RIM is now accepting customer nominations for the closed beta program which will start in January, and general availability is expected in late March.

For more information, visit

More Cheap Accessories

MITIE awarded five-year integrated FM contract at Sky

MITIE awarded five-year integrated FM contract at Sky MITIE has secured a contract to provide integrated FM for the British Sky Broadcasting Group (Sky), the UK s largest entertainment and home communications company. The contract, which boasts a total value in excess of 100 million over a five-year period, will see MITIE deliver services across Sky s estate in the UK and Ireland from January 2013. As well as its two main campuses in London and Scotland, MITIE will work at 12 regional offices, two data centres and dozens of ‘POP’ (Internet exchange points) sites.

MITIE will have responsibility for delivering a range of services including security, fabric maintenance, engineering maintenance, energy management, catering, cleaning, mail room and courier, Helpdesk, switchboard, shuttle buses, grounds maintenance and internal landscaping. MITIE also recently completed a project to build an on-site wind turbine at Sky s new broadcast facility Sky Studios (based in Osterley, West London). At what is the most sustainable broadcast facility of its type in Europe, the turbine will provide over 133 MWh of clean energy to the studios every year.

MITIE was awarded the contract based on “innovative ideas, self-delivery capabilities and its cultural approach”.

Ruby McGregor-Smith CBE, CEO of MITIE Group PLC, said: We’re delighted to be working with Sky and look forward to creating what will be a truly collaborative partnership.

Sky is a dynamic company and MITIE will ensure the FM strategy brings the highest quality services, value and innovation to its business.

DHS to test spy drones for 'public safety' applications | Pakalert Press

The Department of Homeland Security1 has announced in a solicitation to drone manufacturers that it will begin testing Robotic Aircraft for Public Safety at Fort Sill, Oklahoma, indicating that small spy drones will be used to keep tabs on Americans in the near future.

As Infowars reported back in July, DHS Secretary Janet Napolitano2 told a House Committee on Homeland Security3 that the federal agency was looking at drones that could be utilized to give us situational awareness in a large public safety matter or disaster.

This represented an about-face of sorts for the agency, which had previously been reticent about the idea of using surveillance drones to spy on the public.

However, a recent solicitation posted on the FedBizOpps website confirms that the DHS is launching its Robotic Aircraft for Public Safety (RAPS) project and is asking small unmanned aerial systems (SUAS) vendors to take part.

The drones are set to be used for applications such as law enforcement4 operations, search and rescue, and fire and hazardous material spill response and will fly for 30 minutes to two hours at a time, weighing around 25 pounds so they can be launched by hand.

DHS second thoughts on drones may not be so surprising, reports Wired News. In recent years, DHS has gotten interested in vastly expanding its surveillance capabilities, exploring cameras reminiscent of military ones that can spy on four square miles at once.

As we reported earlier this year, the DHS is already using another type of airborne drone surveillance, also utilized to track insurgents in Afghanistan and Iraq, for the purposes of emergency and non-emergency incidents within the United States.

A bill passed by Congress in February paves the way for the use of surveillance drones in U.S. skies on a widespread basis. The FAA predicts that by 2020 there could be up to 30,000 drones in operation nationwide.

U.S. law enforcement5 bodies are already using drone technology6 to spy on Americans. In December last year, a Predator B drone was called in to conduct surveillance over a family farm in North Dakota as part of a SWAT raid on the Brossart family, who were suspects in the egregious crime of stealing six missing cows. Local police in this one area have already used the drone on two dozen occasions since June last year.

Police departments are also attempting to get approval to use surveillance blimps that sit over cities and watch for suspicious activity.

The U.S. Army recently tested a football field-sized blimp over the city of New Jersey. The blimp can fly for a period of 21 hours and is equipped with high-tech sensors that can monitor insurgents from above. Prison Planet


More than a third of Americans worry their privacy will suffer if drones become the latest police tool for tracking suspected criminals at home, according to an Associated Press-National Constitution Center poll. AP

Congress has directed the Federal Aviation Administration7 to come up with safety regulations that will clear the way for routine domestic use of unmanned aircraft within the next three years. AP

The U.S. government8 has announced that 30,000 drones would be spying on Americans domestically. CBS

The CIA and the U.S. military have used unmanned aerial vehicles known as drones to target and kill those Washington calls suspected militants in Pakistan, Afghanistan, Iraq, Yemen, Somalia and Libya.

The United States was identified in June 2010 as the world s No. 1 user of targeted killings largely as a result of its dependence on unmanned drone attacks. CNN

In Pakistan alone, U.S. drone have killed at least 2,800 civilians have since 2004.



  1. ^ Department of Homeland Security (
  2. ^ Janet Napolitano (
  3. ^ Homeland Security (
  4. ^ law enforcement (
  5. ^ law enforcement (
  6. ^ drone technology (
  7. ^ Federal Aviation Administration (
  8. ^ U.S. government (
  9. ^ Source (

Supreme Court Urged to Grant Standing in Surveillance Challenge …

In its new term that began yesterday, the U.S. Supreme Court will hear arguments over whether to affirm the right of journalists and human rights organizations to challenge the constitutionality of the Foreign Intelligence Surveillance Act (FISA) Amendments Act, or FAA.

The FISA Amendments Act authorizes the collection of a broad swath of public communications without a warrant (though not the intentional targeting of the communications of any particular U.S. person). As such, critics say, it jeopardizes freedom of communication with individuals abroad.

At issue is whether the plaintiffs, represented by the American Civil Liberties Union, have the standing to bring the case. A lower court said they did not, but an appeals court said they did. It will be up to the Supreme Court to decide the case, which is captioned Amnesty et al v. Clapper1.

The Electronic Privacy Information Center2 filed an amicus brief3 (which I co-signed) urging the Court to affirm standing on grounds that the plaintiffs have established a reasonable concern about the security of their communications, and that existing oversight mechanisms are inadequate.

This threat to privacy is especially acute given the capabilities of the National Security Agency and the absence of meaningful oversight. Where enormous surveillance capabilities and blanket secrecy coexist, the public may reasonably fear the interception and collection of private communications, the EPIC brief4 stated.

Furthermore, the current structure lacks significant public oversight and accountability.

The public, the judiciary (but for the FISC Foreign Intelligence Surveillance Court) and almost all Members of Congress are kept in the dark as to the most extensive electronic surveillance program undertaken by the US government. While the DNI and Attorney General provide internal reporting requirements, none of this information is made available to the whole Congress or the public broadly, and thus no meaningful public oversight can occur.

When the law gives new authority to conduct electronic surveillance, there should also be new means of oversight and accountability. The FISA Amendments Act fails this test, the brief5 said.

This entry was posted on Tuesday, October 2nd, 2012 at 11:11 am by Steven Aftergood and is filed under Secrecy6. You can follow any responses to this entry through the RSS 2.07 feed. You can skip to the end and leave a response. Pinging is currently not allowed.


  1. ^ Amnesty et al v. Clapper (
  2. ^ Electronic Privacy Information Center (
  3. ^ amicus brief (
  4. ^ brief (
  5. ^ brief (
  6. ^ View all posts in Secrecy (
  7. ^ RSS 2.0 (

Oncam Grandeye’s Evolution cameras at Security Essen

Oncam Grandeye’s Evolution cameras at Security Essen Oncam Grandeye is launching the Evolution range of 360-degree cameras and the “world’s first smartphone and tablet 360-degree device app for the security sector”. The Oncam Grandeye Evolution range is the first major product release since Oncam acquired Grandeye in July this year. Evolution “provides a more powerful platform” that “takes the company’s position as leader in 360-degree imaging to a new level”.

Over the next 12 months, Oncam Grandeye will be launching a further two 360-cameras in the Evolution range with better imaging and a capability of up to 12 megapixels with full analytics and onboard storage. The first release in the Evolution range consists of a five megapixel camera and includes exciting enhancements, among them wide dynamic range, high frame rate, H.264, onboard SD card, POE support, digital input and output and audio capabilities. As part of a multi-phased roll-out, more than 250 of the cameras have already been shipped and many trials are taking place with customers around the world.

Evolution will also come with a range of accessories including pole, pendant and wall mount. This is a new approach for 360-degree cameras: one that will greatly enhance the ease and speed of installation and not limit the 360 to wall or ceiling mounts. Innovative modular design and mobile device app with de-warping at client-side A differentiating strength of the new Evolution range is its innovative modular design.

These cameras can be mounted on a range of available housings to allow for indoor, outdoor, surface mount and concealed applications. Rich Pineau, CTO at Oncam Grandeye, said: “Our customers are the driving force behind this new camera range. We have gone to great lengths to design a camera that not only incorporates the world’s finest 360-degree technology, but also its design, simplicity and modular approach means that installation is simple while the cameras are useful in a variety of environments and applications.” Pineau added: “The Evolution range will also be supported by the world’s first mobile device app with de-warping at the client-side, which really pushes the boundaries of remote viewing of 360.” According to Pineau, reaction to the app from those customers who have used or seen it has been “incredible”, and he stated: “We see this as a very exciting development for Oncam Grandeye and the 360 market.” Cameras in the Evolution range are both PSIA and ONVIF supported.

Evolution is already being backed by a number of Oncam’s NVR partners (including Honeywell, SeeTec, NICE and Milestone). *The new cameras will be demonstrated at Security Essen, which runs from 25-28 September