How network video can support suicide prevention on the rail network

It describes some current suicide counter-measures and details the size of the challenge which the rail industry faces. This paper explains how IP network video can support existing measures in order to provide an effective overall suicide prevention solution. This paper does not attempt to find broader resolution to the questions around suicide and refrains from exploring the personal and tragic circumstances surrounding many of the individuals who find themselves attempting or committing this act.

Lucas Young Business development manager, transportation Axis Communications [email protected] Connect with me on LinkedIn

Axis Communications launches discreet indoor FA series and expands P13 series

product launch Axis Communications has introduced new and improved camera products in response to demand from some customers for discreet multi-view surveillance and detailed surveillance of large areas. The AXIS FA series is designed with modular cameras for highly discreet video surveillance that is also cost-effective, because one camera system provides coverage of several areas. The company has also expanded its P13 series with three new additions that offer 4K resolution in full frame rate.

The cameras can cover large areas and reproduce images in high quality detail. Axis will demonstrate the new cameras at ISC West 2017 in Las Vegas in April. The AXIS FA series and the additions to the P13 series will be available through distributors from May. Verticals/sectors City and public transportation surveillance Retail security Building surveillance and access control Home security AXIS FA series features AXIS FA series enables discreet, multi-view indoor surveillance of four closely situated areas using a single camera system. The main unit can stream at full frame rate HDTV 1080p videos from four connected sensor units at the same time, using one IP address. The AXIS FA series is modular, made up of the following separately sold units: AXIS FA54 main unit AXIS FA1105 sensor unit with a standard lens AXIS FA1125 sensor unit with a pinhole lens AXIS FA4115 dome sensor unit with a varifocal lens. AXIS FA captures video with forensic wide dynamic range (WDR) even in low light and in motion. The AXIS FA54 also has the capacity to support advanced video analytics, and has an HDMI output for connection to a surveillance or public view monitor, ideal for retail applications. The sensor units can be hidden in surfaces, structures or devices.

Installed at eye level the can provide video monitoring at building entrances without drawing attention. The sensor units come with an 8-m (26 ft.) cable for connection to an AXIS FA54. Axis Communications says By separating the sensor unit from the camera body, the sensor units can fit into tight spaces and blend in with the environment for unobtrusive surveillance. The pinhole sensor unit is especially useful at entrances for capturing people s faces at eye level, says Erik M rtensson, global product manager for modular cameras at Axis Communications. AXIS P13 series features The indoor AXIS P1367 and outdoor AXIS P1367-E and AXIS P1368-E network cameras are additions to the highly-respected AXIS P13 fixed-box series. With improved light sensitivity, better image quality and higher frame rate, these cameras can provide up to 4K resolution images in large open areas with challenging light conditions, such as arrival halls at train stations, crowded city areas or car parks. The system comprises: AXIS P1367/-E support CS and i-CS lenses 4K AXIS P1368-E is delivered with i-CS lens as standard AXIS P1367-E and AXIS P1368-E have specifically been designed for outdoor use, deploying a mechanical platform that allows for easier access to connectors and cabling and free up space for optional lenses Built-in camera rails increase the flexibility of the camera, allowing larger zoom lenses to be installed, delivering greater detail as required Axis Communications says The lightweight AXIS P1367-E and AXIS P1368-E are examples of real outdoor cameras. It s not just a camera put inside a housing, but for the first time we have developed an outdoor-ready CS-mount camera from scratch. This has enabled a highly flexible camera system that can use zoom lenses or even Axis Corridor Format when customers want to view a vertical image and not waste precious screen real estate and bandwidth, explains Andres Vigren, global product manager for fixed box cameras at Axis Communications.

Check out the latest solutions from Axis Communications at IFSEC International, 20-22 June 2017, London ExCeL. You can find Axis Communications on stand E1000. Get your free badge now. Join other high-end security professionals at the launch of Borders & Infrastructure Expo In conjunction with Europe s most renowned security event , IFSEC International, B&I is addressing your critical needs for large scale security projects affecting national security, integrated systems, border protection and much more. You will have access to test the latest security innovations in; Physical & perimeter, Barriers & bollards, Command & control, Emergency response, Cyber solutions, Drones & UAVs, Transport security and much more.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

82% of small businesses with CCTV have plans to upgrade systems

82% Of Small Businesses With CCTV Have Plans To Upgrade Systems

Procurement More than four in five (82%) small businesses with CCTV systems plan to upgrade or replace existing systems, according to research by Axis Communications. The survey of 500 UK-based small-business owners also found that more than a third (39%) are considering doing so with in the next two years. Asked what their motivations for upgrading were, respondents most frequently cited theft and loss prevention motives.

Some 38% of small businesses have suffered a break in or theft at their premises. More than half of small businesses 62% already have a video surveillance system installed. With 78% stated that a break in or theft within the business is a major concern now and in the future, there seems to be scope for that figure to rise. Two thirds of respondents believe that video surveillance enhances their ability to protect premises, people and assets and gives peace of mind to them and their staff. Wider trend James Lowman, chief executive of the Association of Convenience Stores (ACS), said: Axis survey into the challenges facing small businesses and the increasing demand for video surveillance is representative of a wider trend. Convenience stores in the UK lost over 120m last year as a result of crimes committed against their organisations, with shop theft alone costing over 43m. Network cameras are a valuable tool for retailers, not just for reporting crimes when they happen but also to use as a preventative measure that discourages potential criminals. Our Local Shop Report shows that 78% of convenience stores have surveillance cameras in their business, and we also expect this to grow over the next year as more stores invest in effective crime prevention measures. Axis has targeted the small business end of the market with more affordable solutions in recent years, notably the Companion range.

embedded content Said Atul Rajput, regional director of northern Europe at Axis Communications: Installers should expect to see an increase in demand for high-quality video surveillance solutions in the small business sector as owners seek confidence that their premises are secure from theft and loss. From our research we are seeing that features such as remote access technology are becoming increasingly sought after. Video surveillance technology is continuously evolving and small business owners are becoming notably more aware that in order to ensure a high-level of security, up-to-date and systems that deliver excellence quality are an essential purchase. Find out more by downloading the report here. Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

BSIA issues guide to metal theft prevention

BSIA issues guide to metal theft prevention The BSIA has produced a guide to help security professionals and property owners combat the growing spate of metal thefts across the UK. Metal theft is an ongoing problem in the UK and realises a significant loss to the economy, with the Association of Chief Police Officers (ACPO) estimating it to cost the UK’s finances no less than 770 million every year. In light of this growing spate of criminality, the British Security Industry Association (BSIA) has published a guide to help property owners of varying types tackle the problem.

Metal thieves have a wide range of targets including rail and communications infrastructure, public utilities, metal piping and lead roofing on churches and schools (and even bronze plaques from war memorials). Stealing the metals for their extrinsic value, these opportunists are regularly finding new ways to source valuable materials and sell them on illegally. The BSIA s new guide serves to highlight just how much of an impact this crime is having across the UK and provides a variety of security solutions that could successfully discourage or catch these thieves.

Featuring real life success stories provided by member companies of the BSIA, the solutions outlined in the guide include physical security equipment, asset and property marking, CCTV, intruder alarm systems and access control. The guide includes a wide range of Case Studies showing how these different security solutions have helped protect properties or trace culprits ranging from protecting vacant properties to safeguarding drain covers and securing businesses and homes. Unacceptable criminality with significant consequences Metal theft is an unacceptable crime with significant consequences, and it’s important that we respond forcefully and in a timely manner to this serious threat, explained Geoff Knupfer, chairman of the BSIA s Asset and Property Marking Section.

Marking your property with a forensic coding solution can act as a successful deterrent to thieves and, if your property is stolen, the traceable nature of the solution can help return materials to their rightful owners and provide conclusive evidence in support of criminal prosecution. In 2011 the Government acknowledged the severity of this issue when the Home Office decided to establish a task force led by the British Transport Police with the help of a 5 million boost from the Treasury. However, it’s still extremely important that property owners implement their own security measures in order to affect positive change.

Metal theft can be detrimental to all types of infrastructures, and dealing with the repercussions can be costly and time consuming, warned David Frampton, chairman of the BSIA s Physical Security Equipment Section. Effective security measures, such as physical security, can offer peace of mind to the general public with property owners safe in the knowledge that their equipment is protected when left unattended. Download your copy of the guide Download the free BSIA guide to find out some of the most effective ways to safeguard your property.

BSIA members offer a reputable service and are inspected to high quality standards.

To locate a supplier near you visit the BSIA’s online company finder

CSL DualCom takes part in M2M webinar

CSL DualCom takes part in M2M webinar ‘Security on the Move’, smartphone technology and integration were the ‘hot topics’ of an M2M-focused webinar hosted by Vodafone and Marketforce just prior to Christmas. Hosted at the London Stock Exchange studios, professional experts from some of the UK s leading security providers were invited by Vodafone and Marketforce to take part in a live webinar discussing some of the most prominent challenges facing the M2M (Machine-to-Machine) security sector. The event was chaired by Lindley Gooden, former television presenter with Sky, ITV and BBC.

His participating guests included Peter Manolescue (M2M business development manager at Vodafone Global), Simon Banks (group managing director of CSL DualCom Holdings), Peter Houlis (managing director at 2020 Vision Systems) and Alan Blake, the marketing and sales director for SECOM UK. The panel discussed a range of topics based around the role of M2M within the security industry such as the arrival of IP products and Cloud technology to the CCTV sector and their suitability for other security applications. The integration and impact of smartphone technology and the ways in which it has influenced the demands of end users was another recurring theme, so too the concept of intelligent buildings .

The panel also faced a series of live questions which included their thoughts on improving communications between the industry and its customer base.

Register to watch an on-demand version of the webinar

Senate Reauthorizes Surveillance Law for Five More Years Without …

Jump to Link in Article

Sen. Ron Wyden giving floor statement on FISA reauthorization

The United States Senate reauthorized a surveillance law that grants the government expanded authority to collec communications of foreign persons outside the US. It also is believed to permit the government to engage in dragnet surveillance of Americans communications.

The program under the FISA Amendments Act is shrouded in immense secrecy, with there being very little information on whether safeguards against eavesdropping on citizens communications are being followed by intelligence agencies like the National Security Agency (NSA).

Sen. Ron Wyden of Oregon was one of a few senators1 who took to the floor yesterday and this morning to urge amendments be passed to the law. He highlighted how the Office of the Director of National Intelligence (ODNI) would not give him a rough estimate of the number of phone calls and emails swept up in the interception of communications under this law.

He pointed out how it was impossible to know if any wholly domestic communications had been collected under the law because the ODNI declined to answer. He also recounted how NSA director Keith Alexander had exaggerated how the agency safeguards Americans privacy while conducting surveillance when he spoke at a major tech conference in July of this year.

Even more significant, Wyden warned against the fact that rulings by the FISA court, which reviews and approves of government requests to engage in surveillance, are completely secret.

The public has absolutely no idea what the court is actually saying, Wyden said. What it means is the country is in fact developing a secret body of law so Americans have no way of finding out how their laws and Constitution are being interpreted.


Jeff Merkley of Oregon sponsored an amendment that would have required the rulings by the FISA court to be made public in some form. The Senate rejected the amendment yesterday evening.

Sen. Patrick Leahy of Vermont tried to advance an amendment that would change the sunset provision of the law from five years to three years, decreasing the amount of time inbetween reauthorizations.

This might have increased oversight for a law that most senators know very little about. Leahy s amendment was rejected by the Senate too.

Leading the charge for reauthorization without any reforms was Democratic Senator Dianne Feinstein of California. In the tradition of Vice President Dick Cheney and other Bush neoconservatives, she blustered about how America remained under threat of a terrorist attack.

She read a list of terrorists, as if the law had helped lead to their arrests but never stated clearly that was what happened. She mentioned Najibullah Zazi, who attempted to blow up the subway in New York City. It was all aimed at disingenuously suggesting that adding these amendments would put America at risk of attacks.

Feinstein manufactured this idea that Wyden and others were trying to make public the names of people being subjected to NSA surveillance.

She suggested that what the senators trying to reform the law wanted to do is really destroy the program so that it would no longer be an intelligence tool available. Of course, there would be no reason to fear the collapse of the program if details on it were divulged if nothing abusive, illegal, or improper was being done under the guise of the law.

As The Guardian s Glenn Greenwald summarized2:

It s hard to put into words just how extreme was Feinstein s day-long fear-mongering tirade. I ve never seen a Congressional member argue so strongly against Executive Branch oversight as.

Sen Feinstein did today re the FISA law, said Micah Zenko3 of the Council on Foreign Relations. Referring to Feinstein s alternating denials and justifications for warrantless eavesdropping on Americans, the ACLU s Jameel Jaffer observed4: This FISA debate reminds of the torture debate circa 2004: We don t torture! And anyway, we have to torture, we don t have any choice.

On top of that, she was more than willing to shower praise on her colleague, Republican Sen.

Saxby Chambliss of Georgia, someone who had worked tirelessly with her over the past years to ensure the intelligence communities were able to engage in domestic surveillance on the people of the world in whatever manner they deemed necessary.

The debate which the leadership of the Senate reluctantly squeezed in for senators like Wyden again showed how much bipartisan consensus on national security matters exists among the political class and how languid and nonchalant they are when anyone warns about risks about civil liberties. In their mind, the FISA Amendments Act, passed in 2008, was proposed to provide safeguards and oversight and halt warrantless wiretapping that took place under the Bush administration and so there was no reason to go to the trouble of adding additional oversight now.


In a hearing on secret law in April 2008, then-Senator Russ Feingold of Wisconsin condemned5 this development in government:

The notion of secret law has been described in court opinions and law treatises as repugnant and an abomination. It is a basic tenet of democracy that the people have a right to know the law.

In keeping with this principle, the laws passed by Congress and the case law of our courts have historically been matters of public record. And when it became apparent in the middle of the 20th century that federal agencies were increasingly creating a body of non-public administrative law, Congress passed several statutes requiring this law to be made public, for the express purpose of preventing a regime of secret law.

He took particular issue with secret law being created by the FISA court because the court s interpretations of FISA law governs the government s ability in intelligence investigations to conduct wiretaps and search the homes of people in the United States. So, national security state lackeys like Feinstein or Chambliss are fully aware of the development of secret law in America and either do not want to believe it exists or pretend it does not exist to serve intelligence agencies.

Finally, to make it even more clear how divorced from the tradition of upholding and safeguarding civil liberties senators like Feinstein or Chambliss happen to be, it is worth revisiting Justice Louis D.

Brandeis dissenting opinion6 in the case of Olmstead v. United States, where Brandeis sought to define privacy rights under the Fourth and Fifth Amendments.

Written in 1928, it touched upon the evolution of technology and how phone calls deserved just as much protection from warrantless eavesdropping as mail deserved protection from warrantless intrusions. It also outlined the very human reasons why government should endeavor to protect people s privacy:

The makers of our Constitution undertook to secure conditions favorable to the pursuit of happiness.

They recognized the significance of man s spiritual nature, of his feelings, and of his intellect. They knew that only a part of the pain, pleasure and satisfactions of life are to be found in material things. They sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations.

They conferred, as against the Government, the right to be let alone the most comprehensive of rights and the right most valued by civilized men. To protect that right, every unjustifiable intrusion by the Government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment. And the use, as evidence in a criminal proceeding, of facts ascertained by such intrusion must be deemed a violation of the Fifth

Were Brandeis alive today and to talk of privacy with such candor, he would be smeared disingenuously by senators as wanting intelligence agencies to be hampered so the country might be attacked by terrorists again.

All that the senators urged the Senate to support were very modest reforms.

They required very little of the intelligence agencies, and in fact, each senator supporting amendments displayed great deference to national security matters.

Yet in the War on Terrorism, there can be no room for suggesting that intelligence agencies might be engaged in wholesale violations of Americans civil liberties.

So, in the same way that Republican senators have come to the aid of the Obama administration7 to ensure that the military s power to indefinitely detain and hold citizens suspected of providing substantial support for terrorism without charge or trial survives a lawsuit, Feinstein and GOP senators were all too willing to lead the charge and vigorously defend government surveillance powers no matter what the cost may be to civil liberties.


  1. ^ one of a few senators (
  2. ^ summarized (
  3. ^ said Micah Zenko (
  4. ^ observed (
  5. ^ condemned (
  6. ^ dissenting opinion (
  7. ^ come to the aid of the Obama administration (

DPP launches consultation on prosecutions involving social media communications

DPP launches consultation on prosecutions involving social media communications The Director of Public Prosecutions, Keir Starmer QC, has today published interim guidelines setting out the approach prosecutors should take in cases involving comms sent via social media. The guidelines are designed to give clear advice to prosecutors and ensure a consistency of approach across the Crown Prosecution Service (CPS) to these types of cases. Keir Starmer said: “These interim guidelines are intended to strike the right balance between freedom of expression and the need to uphold the criminal law. “They make a clear distinction between communications which amount to credible threats of violence, a targeted campaign of harassment against an individual or which breach court orders on the one hand, and other communications sent by social media, eg those that are grossly offensive, on the other. “The first group will be prosecuted robustly whereas the second group will only be prosecuted if they cross a high threshold.

A prosecution is unlikely to be in the public interest if the communication is swiftly removed, blocked, not intended for a wide audience or not obviously beyond what could conceivably be tolerable or acceptable in a diverse society which upholds and respects freedom of expression. “The interim guidelines thus protect the individual from threats or targeted harassment while protecting the expression of unpopular or unfashionable opinion about serious or trivial matters, or banter or humour, even if distasteful to some and painful to those subjected to it.” Response from ACPO and Victim Support ACPO’s lead on communications, chief constable Andy Trotter, commented: “This interim guidance sets out clear advice to police forces in England and Wales on handling complaints from the public relating to social media. It takes a common sense approach and will help support consistency from prosecutors and police. We welcome the opportunity for early consultation to take place between the CPS and the police before any action is taken in these cases.” The CEO of Victim Support, Javed Khan, explained: “Victims tell us that sustained and vindictive targeting on social media can leave long-lasting emotional and psychological scars, so we warmly welcome clarification on how prosecutors will deal with online threats or harassment.

The distinction between communications which constitute a credible threat and those which may merely cause offence is sorely needed. In particular, we welcome the guideline which makes a prosecution more likely if a victim is specifically targeted and this has a significant impact on them.” Khan concluded: “We will watch how the interim guidelines are used with interest and will respond to them in detail during the consultation period.” The interim guidelines do not change the law, but rather set out the approach prosecutors should follow when considering cases relating to communications sent via social media. The guidelines come into immediate effect, and are subject to a three-month public consultation which starts today.

Keir Starmer added: “We want the interim guidelines to be as fully informed as possible, which is why we held a series of roundtable discussions and meetings with Twitter, Facebook, Liberty and other stakeholders, police and regulators, victim groups, academics, journalists and bloggers, lawyers and sports organisations ahead of drafting them. I would now encourage everyone with an interest in this matter to give us their views by responding to the public consultation.” Initial assessment in focus As part of their initial assessment, prosecutors are now required to distinguish between: Communications which may constitute credible threats of violence Communications which may constitute harassment or stalking Communications which may amount to a breach of a court order Communications which do not fall into any of the above categories and fall to be considered separately (ie those which may be considered grossly offensive, indecent, obscene or false) Those offences falling within the first three categories should, in general, be prosecuted robustly under the relevant legislation, for example the Protection from Harassment Act (1997), where the test set out in the Code for Crown Prosecutors is satisfied. Cases which fall within the final category will be subject to a high threshold and, in many cases, a prosecution is unlikely to be in the public interest.

The high threshold Section 1 of the Malicious Communications Act 1988 and Section 127 of the Communications Act 2003 engage Article 10 of the European Convention of Human Rights. Therefore prosecutors are reminded that they must be interpreted consistently with the free speech principles in Article 10. Prosecutors are also reminded that what is prohibited under Section 1 of the Malicious Communications Act 1988 and Section 127 of the Communications Act 2003 is the sending of a communication that is grossly offensive.

They should only proceed with cases involving such an offence where they are satisfied that the communication in question is more than offensive, shocking or disturbing or satirical, iconoclastic or rude comment or the expression of unpopular or unfashionable opinion about serious or trivial matters, or banter or humour, even if distasteful to some or painful to those subjected to it. The public interest In line with the free speech principles in Article 10, no prosecution should be brought unless it can be shown on its own facts and merits to be both necessary and proportionate. A prosecution is unlikely to be both necessary and proportionate where: the suspect has swiftly taken action to remove the communication or expressed genuine remorse swift and effective action has been taken by others, for example service providers, to remove the communication in question or otherwise block access to it the communication was not intended for a wide audience, nor was that the obvious consequence of sending the communication (particularly where the intended audience did not include the victim or target of the communication in question) the content of the communication did not obviously go beyond what could conceivably be tolerable or acceptable in an open and diverse society which upholds and respects freedom of expression.

The age and maturity of suspect should be given significant weight, particularly if they are under the age of 18.

Children may not appreciate the potential harm and seriousness of their communications and, as such, prosecutions of children are rarely likely to be in the public interest.

BlackBerry NFC plans: Meet your new work security pass | Electricpig

Jump to Link in Article

Say what you will about RIM, but its BlackBerry NFC1 plans aren t lacking for ambition. In an interview with Electricpig this week, Research In Motion s UK managing director Stephen Bates revealed its four prong plan for the contact free communication tech and alongside mobile payments, it s planning to change the way you touch in to work.

NFC (Near field communications) is all the talk of the mobile world right now: it s popping up in more Android and Symbian phones, but surprisingly, it s RIM who s ahead in this field right now, with no fewer than seven NFC enabled handsets launched this year, including this week s newly announced BlackBerry Curve 93802 and Bold 97903 models.

Contact free payments for small items are one of the most obvious uses for a BlackBerry NFC phone: last month, RIM received certification so that its NFC phones could be used with Mastercard s touch-free PayPass system. But the company also has a more novel use for it: as your security pass.

There are three or four areas that we think NFC is important, Stephen Bates said.

One is mobile payments, one is pairing, Bluetooth pairing with accessories, another one is reading smart posters and the other one is integrating security pass, so building pass access so the concept that instead of having a pass for your office you can touch and go.

As well as being one less thing you d have to carry, it d be a blessing for your company s IT and security admins, as Bates points out.

You can from an IT perspective profile yourself into parts of the building or other parts of the building, or if you travel to another office globally you can get access to that office just over the air as an update to your profile.

Bates says a trial of this BlackBerry NFC security pass system is already in place at the company s head office, but stressed that this is something other businesses may be able to take advantage of very soon. We re trying to get executions of those coming out next year, he said.

RIM isn t alone in this: in September, security giant HID Global revealed that it too was working on a new app for BlackBerry NFC phones that could act as a security pass, with the same cryptography as commonly used iClass cards.

Would you use a BlackBerry NFC phone as your work pass? Is it enough to make you jump ship?

Let s hear your thoughts in the comments.


  1. ^ BlackBerry NFC (
  2. ^ BlackBerry Curve 9380 (
  3. ^ Bold 9790 (


More Cheap Bargains


Over-C and Sonim provide NFC solution for Met at London 2012

Over-C and Sonim provide NFC solution for Met at London 2012 Sonim Technologies and Over-C partnered to deploy XP3300 NFC rugged mobile phones for the Metropolitan Police’s Marine Division duirng the Olympic and Paralympic Games. The Metropolitan Police Service is famed around the world and has a unique place in the history of policing. It’s by far the largest of the police services that operate in greater London (the others including the City of London Police and the British Transport Police).

As part of its law enforcement activites, the Metropolitan Police Service operates alongside the Kent and Essex Police Marine Units to patrol and secure the 96-mile (154 km) length of the River Thames. On occasion, it has been found that radio-based marine tracking technologies can sometimes struggle to deliver accurate positioning for the fleet of 18 vessels on the river. In turn, this allowed Sonim to provide real-time, ultra-rugged, portable and fully-waterproof devices running bespoke GPS and Near Field Communications (NFC) tracking and reporting software from Over-C in time to help secure the London Olympic and Paralympic Games.

The project was headed up by UK Trade & Investment (UKTI) and the Security Innovation & Technology Consortium (SITC), and was aimed at providing a number of trials in order to showcase new technologies in the security sector alongside the 2012 Olympics. Sonim devices provided a GPS position for the vessels and scanning of embarking/disembarking police staff. The encrypted information was sent in real-time over the mobile network to secure servers accessed only by the London 2012 Marine Command and Control Centre.

NFC applications in the security guarding sector Sonim works closely with industry-leading application partner Over-C, the specialist in NFC applications for the security guarding, cleaning and transportation verticals. The Sonim XP3300 Force with XPand NFC slimline modular expansion pack provides the world’s first ultra-rugged NFC mobile phone with a camera and GPS. Designed for workforces in the police, private security, commercial cleaning, transportation and logistics, field equipment maintenance and home visit healthcare industries, the XP3300 Force with XPand NFC combines indoor tracking by scanning contactless NFC tags placed around the worksite with outdoor tracking using enterprise class GPS.

The XP3300 Forceis also the Guinness World Record holder for the toughest phone and has the longest talk time 20 to 24 hours of any mobile phone, or 800 hours of standby time. The XPand NFC module is equally robust and power-efficient with the industry’s longest battery life for NFC operations. Beyond MIL-SPEC toughness, the combined unit can be dropped from two metres onto concrete and its IP68 specification means it can be submerged in two metres of water for up to 60 minutes.

It operates in temperatures from -20 to +55 degrees Celsius and features an impact-resistant and puncture-proof Corning Gorilla glass screen.

About-face on e-mail surveillance bill | Business Tech – CNET News

Leahy scuttles his warrantless e-mail surveillance bill -- Tuesday, Nov 20, 2012

Sen. Patrick Leahy.

week in review After public criticism of a proposal that would let government agencies warrantlessly access Americans’ e-mail, a prominent senator says he will “not support” such an idea. Sen.

Patrick Leahy has abandoned his controversial proposal1 that would grant government agencies more surveillance power2 — including warrantless access to Americans’ e-mail accounts — than they possess under current law. The Vermont Democrat said on Twitter that he would “not support such an exception” for warrantless access, a few hours after a CNET article disclosed the existence of the measure. Leahy’s about-face comes in response to a deluge of criticism, including the American Civil Liberties Union saying that warrants should be required, and the conservative group FreedomWorks launching a petition to Congress — with more than 2,300 messages sent so far — titled: “Tell Congress: Stay Out of My Email!”

Leahy’s proposal would have allowed over 22 agencies — including the Securities and Exchange Commission and the Federal Communications Commission — to access Americans’ e-mail, Google Docs files, Facebook wall posts, and Twitter direct messages without a search warrant. It also would have given the FBI and Homeland Security more authority, in some circumstances, to gain full access to Internet accounts without notifying either the owner or a judge. Senate bill rewrite lets feds read your e-mail without warrants3 More headlines

Judge: Samsung gets to view Apple-HTC settlement details 4

Samsung’s lawyers will be able to see the full settlement agreement made between Apple and HTC earlier this month. Samsung claims iPad Mini, latest iPod violate its patents ITC to give its pro-Apple decision a second look for Samsung

Anonymous escalates its ‘cyberwar’ against Israel7

The hacking collective’s latest campaign against Israel escalates, with defacements of Microsoft Israel Web sites and the publication of alleged donors to a pro-Israel group. Israel government Web sites hit by hacker blitz

Nokia’s Here Maps finds its way to Apple’s App Store9

The mobile application offers free voice navigation, traffic reports, and a host of location-based features. New app gives Google Maps some competition Google Maps brings indoor layouts to the desktop

Intel CEO Paul Otellini will retire in May12

After an almost 40-year career with the chip giant, Otellini will step down as president and CEO in the second quarter of next year. Intel CEO startled board chairman with decision to retire Otellini’s legacy at Intel: Plentiful profits, mobile misfires


The United States denies it was involved in any attack on the French government, calling it a top ally.

NASA’s not sharing a ‘historic’ find on Mars…

yet 16

Data from a sample of Martian dirt could be earth-shattering, but the space agency is taking time to check its work.

Facebook tests new features, expands ad tracking program 17

The social network tests two new features for a user’s news feed and deploys a new way to track ads. Irish regulators seek ‘urgent’ clarity on Facebook data changes Facebook to users: Please vote to abolish your right to vote

Google may dodge FTC’s antitrust bullet, report says20

Federal regulators scrutinizing Google may not have a strong enough case to file a lawsuit targeting the company’s search service, Bloomberg reports. Google after antitrust: The good, the bad, and the ugly

Xbox set-top device reportedly coming next year 22

According to The Verge, Microsoft is poised to release an always-on box centered around casual gaming and streaming video. The device is part of Microsoft’s two Xbox strategy. Xbox 720 to offer Kinect 2.0 and Blu-ray drive, says Xbox World

Also of note Feds aim to kill .Army, other military domains25 Obama may have talked Kim DotCom with New Zealand PM26 World’s oldest working computer gets fired up27



  1. ^ Leahy scuttles his warrantless e-mail surveillance bill — Tuesday, Nov 20, 2012 (
  2. ^ Senate bill rewrite lets feds read your e-mail without warrants — Tuesday, Nov 20, 2012 (
  3. ^ Senate bill rewrite lets feds read your e-mail without warrants — Tuesday, Nov 20, 2012 (
  4. ^ Judge: Samsung gets to view Apple-HTC settlement details — Wednesday, Nov 21, 2012 (
  5. ^ Samsung claims iPad Mini, latest iPod violate its patents — Thursday, Nov 22, 2012 (
  6. ^ ITC to give its pro-Apple decision a second look for Samsung — Monday, Nov 19, 2012 (
  7. ^ Anonymous escalates its ‘cyberwar’ against Israel — Monday, Nov 19, 2012 (
  8. ^ Israel government Web sites hit by hacker blitz — Sunday, Nov 18, 2012 (
  9. ^ Nokia’s Here Maps finds its way to Apple’s App Store — Tuesday, Nov 20, 2012 (
  10. ^ New app gives Google Maps some competition — Wednesday, Nov 21, 2012 (
  11. ^ Google Maps brings indoor layouts to the desktop — Wednesday, Nov 21, 2012 (
  12. ^ Intel CEO Paul Otellini will retire in May — Monday, Nov 19, 2012 (
  13. ^ Intel CEO startled board chairman with decision to retire — Tuesday, Nov 20, 2012 (
  14. ^ Otellini’s legacy at Intel: Plentiful profits, mobile misfires — Monday, Nov 19, 2012 (
  15. ^ U.S.

    accused of cyberattack on French government — Wednesday, Nov 21, 2012 (

  16. ^ ^ Facebook tests new features, expands ad tracking program — Wednesday, Nov 21, 2012 (
  17. ^ Irish regulators seek ‘urgent’ clarity on Facebook data changes — Thursday, Nov 22, 2012 (
  18. ^ Facebook to users: Please vote to abolish your right to vote — Wednesday, Nov 21, 2012 (
  19. ^ Google may dodge FTC’s antitrust bullet, report says — Wednesday, Nov 21, 2012 (
  20. ^ Google after antitrust: The good, the bad, and the ugly — Monday, Nov 19, 2012 (
  21. ^ Xbox set-top device reportedly coming next year — Wednesday, Nov 21, 2012 (
  22. ^ Xbox (
  23. ^ Xbox 720 to offer Kinect 2.0 and Blu-ray drive, says Xbox World — Monday, Nov 19, 2012 (
  24. ^ Feds aim to kill .Army, other military domains — Wednesday, Nov 21, 2012 (
  25. ^ Obama may have talked Kim DotCom with New Zealand PM — Tuesday, Nov 20, 2012 (
  26. ^ World’s oldest working computer gets fired up — Tuesday, Nov 20, 2012 (