digital

ThruVis thermal camera screened up to 50 people every three minutes at Hyde Park music event

Digital Barriers Fifty people were screened for weapons every three minutes during the recent British Summer Time event in Hyde Park thanks to a pioneering thermal-based camera. Digital Barriers, which specialises in military-grade technology, also provided its ThruVis thermal screening cameras for the One Love Manchester concert, which took place at the Emirates Old Trafford Cricket Ground on 4 June in the wake of the Manchester MEN bombings. ThruVis protected 50,000 visitors as well as staff and artists including Liam Gallagher, Coldplay and Katy Perry.

Deployed at both events by G4S, ThruVis can detect non-metallic threats like explosives and ceramic knives as well as guns at distances exceeding 5 metres. As a thermal camera, it doesn t require people to remove clothing or pass through the kind of doorway seen with conventional airport scanners. Deployed throughout British Summer Time (3-9 July) both at VIP entrances and public gates, ThruVis screened up to 1,000 people per hour equating to 50 every three minutes and 50,000 in total. The event was headlined by Kings of Leon, The Killers and Tom Petty and the Heartbreakers. Digital Barriers reports a 98% satisfaction rating from visitors screened at Hyde Park. We used Digital Barriers ThruVis passive screening solution, to support our security arrangements at the event, said G4S Director of Events Eric Alexander. We recognise that new security innovations play an important role in strengthening our capability and increase the public s confidence in the measures we use to keep them safe. Said Colin Evans, Chief Operating Officer at Digital Barriers: The public expects enhanced security around high profile public events and would prefer this to be provided with minimal further inconvenience. We are confident ThruVis is the only security technology available today that meets this need and we are delighted to be working with G4S to make this important new capability widely available.

Free Download: Securing UK borders: An examination of the implications of leaving the EU for UK border management. Recent tragic events in Manchester and London have, among other things, underscored the importance to national security of getting Brexit right. This report considers the implications of leaving the EU for the management of the UK s borders and making it as easy as possible for international business to thrive and legitimate movement to occur in a post-Brexit UK.

Click here to download now

Video-surveillance-as-a-service solution emerges from Digital Barriers-Morphean collaboration

VSaaS Digital Barriers government-accredited video analytics and facial recognition solutions will now be available as part of a video surveillance as a service (VSaaS) solution across Morphean s video surveillance platform. The collaboration will see Morphean a Swiss leader in video monitoring and surveillance platforms become the first European-based business intelligence and video management platform provider to offer the SmartVis video analytics suite as a VSaaS solution. By employing Digital Barriers SmartVis analytics, Morphean can rapidly augment safety and security capabilities across our clients assets, leveraging the latest in AI analytics, no matter how large the enterprise or how challenging the environment, said Rodrigue Zbinden, CEO of Morphean.

Said Manuel Magalhaes, vice president of global alliances at Digital Barriers: This collaboration with Morphean underscores the significant technical lead that SmartVis has over its competition. Morphean s surveillance and business intelligence platform across large-scale retail unlocks a brand new market for Digital Barriers, one that complements our engagements with defence and law enforcement customers around the world. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals.

Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Click here to Download now

How to follow up sales leads following IFSEC and FIREX International

exhibitor advice Less than 70% of exhibitors have any kind of formalised plan or process in place for following up leads following a trade show or other live event. That s a pretty alarming oversight given the time, effort and resource committed to such endeavours and the enormous rewards if they re exploited to the fullest. Of course, trade shows benefit your brand in multiple other albeit more difficult to measure ways.

Those who stopped by your stand or listened to a presentation delivered by one of your representatives will leave the show knowing a bit more about what you do and (hopefully) be impressed with your products and/or expertise. They may have even been introduced to your brand for the very first time. And that s great. But it s not enough especially given the digital tools now available that can yield more concrete, quantifiable returns on your investment. The hard work doesn t end on 5pm of the final day of the show. Indeed: what, when and how you communicate to prospects that you met at the show in the following days, weeks and months can really make the difference. Here are some tips to make the most of your time at IFSEC International, FIREX International or other trade shows. Time is of the essence Get your follow-up strategy and campaign materials as ready as possible in advance of the event. You ve a greater chance of impressing and securing the custom of prospects if you follow up days or weeks faster than your competitors.

Prioritise your leads Grade your leads ranging from the hottest prospects, where someone requested a follow up and seemed keen on working with you, down to those who merely submitted their email address as part of a raffle you held on your stand. Then prioritise your responses accordingly. This means not only contacting high priority leads more urgently but also tailoring your communications more extensively. Lower priority prospects might be sent a standard email en masse, while the hottest leads will warrant a tailored email or depending on the preference expressed a phone call. Customise your call to action Your first follow up needn t be a hard sell. It all depends where the lead is in the sales funnel. You could instead send them a piece of content like a video, case study, white paper or blog post. And make your call to action descriptive of the benefit the prospect will actually get by clicking. So do say: Download white paper , request a personal demo , or join us for a free networking lunch ; don t say: Find out more or click here for more information .

A single call to action is often said to be best marketing practice. However, don t be afraid to offer 2-3 alternatives if your target data is sufficiently diverse in its preferences and stage of the buying journey to warrant it. For instance, you could offer the following options: request a demo , watch our video or sign up to our newsletter . Jog the prospect s memory Remind the prospect of the product launches, integrations, partnerships and other announcements you made during the show. There s so much going on at IFSEC, it s perfectly possible that they won t recall all relevant details. Include visuals in your emails A photo of your IFSEC stand busy with lots of people, ideally! is usually a strong image, though you may instead use a picture of a product they declared an interest in. Personalise each email People like to know they re dealing with an individual not a company, so sign off with the relevant salesperson s name and, crucially, their phone number and personal email. Don t rely on Microsoft Excel spreadsheets Microsoft Excel is useful for financial accounts but a chaotic nightmare and terrible for collaboration when applied to customer relationship management (CRM).

Automated lead nurturing tools make building on your conversations at the trade show easier, less time-consuming and, on average, more fruitful. There are countless platforms out there, some of which are free, with others charging a monthly subscription. Just to give three examples, Communigator, tray.io and run by SalesForce, the most popular CRM by far Pardot are all highly effective lead nurturing tools. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals. Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Click here to Download now

Digital Barriers launches first live facial recognition system for body-worn cameras

law enforcement Digital Barriers has launched the world s first live facial recognition system for body-worn law enforcement cameras. SmartVis Identifier, which brings together Digital Barriers video-streaming platform EdgeVis and analytics solution SmartVis, is targeted at the defence, security and law enforcement markets. It provides real-time facial recognition against multiple watch lists and databases.

Already available for standard smartphones, SmartVis has been adapted to run live on Digital Barriers body-worn cameras that are designed for frontline law enforcement. SmartVis facial recognition has been designed to do the job that traditional facial recognition systems cannot: to work in the real world, in real time, says Zak Doffman, CEO of Digital Barriers. Never before has frontline policing been offered live facial recognition on the type of everyday body worn cameras now being widely deployed. Customers at the forefront of security and defence have already deployed this technology and describe it as a game-changer . embedded content Able only to record, not live stream, footage, most body-worn devices are effective for evidence management after the fact, but cannot aid in the protection of officers if they are put in harms way as incidents unfold. EdgeVis delivers low latency and low bandwidth streaming, including over-the-air access to device recordings and GPS locational data. SmartVis Identifier supports, when required, every interaction, every stop and search, every arrest with real-time facial recognition. Digital Barriers says the solution removes human error and plugs resourcing gaps, thereby broadening the scope of facial recognition deployments. SmartVis Identifier will be available alongside EdgeVis on Digital Barriers body-worn devices and for selected service providers and camera/device manufacturers under licence.

Digital Barriers provides zero-latency streaming and analysis of secure video and related intelligence over wireless networks. To reduce bandwidth consumption the company harnesses a mixture of cellular, satellite, IP mesh and cloud networks. Founded in 2009, the company has its origins in military applications but now sells fixed and mobile solutions for covert, remote and wide-area deployments to law enforcement and the commercial security industry too. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals. Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Click here to Download now

We treat biometrics as plug and play

biometrics IFSEC media partner SecuritySolutionsWatch.com spoke to Jim Miller, chairman and CEO of ImageWare Systems Inc, a developer of identity management solutions. An excerpt of the interview is below click at the bottom to read the full conversation. SecuritySolutionsWatch.com: Thank you for joining us again today Jim at this momentous time in the history of ImageWare.

Congratulations on all the positive developments during the past few months. Before discussing all the new deals and the fast-growing mainstream acceptance of biometrics, perhaps we can begin with an overview of the ImageWare Product Portfolio as it stands now. Jim Miller: We live in a world where our digital identity is the bridge to our human identity. The Internet of things (IoT) is essentially a giant network of connected things a concept that not only has the potential to impact how we work, but also how we live. We can connect our devices to all manner of devices and people. This raises a huge concern with privacy and security in this connected world. Anything connected to your network is now a potential breach point; it makes data security more complex, information governance more complicated, and your corporate and customer data more vulnerable. The same concerns apply to BYOD, or as we sometimes say at ImageWare, Bring Your Own Disaster every connection point is a data breach potential and a majority of folks use their personal devices at work where they access valuable corporate information.. We have seen too many times how this story ends a single tablet or smartphone contains credentials to the entire corporate network and this simple thing can end up costing employers millions.

There is only one thing that can verify the actual person biometrics, one s unique human characteristics. A person who knows the password or has the token is not verifying the actual person, because passwords can be discovered and tokens stolen. The user s unique physical traits, that s where ImageWare delivers value by allowing our users to replace or augment password or PIN security with easy to use biometrics.

Just like your readers, I can t wait until I can stop using passwords for everything and just use my face, voice, eyes, or some other biometric more secure and nothing to remember each time I log in!

Read the full interview on SecuritySolutionsWatch.com

ENTR: the award-winning digital lock that turns your front door into a smart door

Why do we lock our doors with a technology used by the ancient Egyptians? For centuries, the answer was pretty simple: because nobody invented anything better. No longer.

Smart home technologies are changing how we interact with our domestic environment, including the front door. Smart locks like the ENTR provide an affordable, sustainable 21 st -century solution, with easy installation to put homeowners in total control of door security. The front door is the gateway to the smart home, so any home automation ecosystem needs a smart lock to make it complete, says Thomas Schulz, EMEA Marketing and Communications Director, Digital Access Solutions, at ASSA ABLOY. Market penetration of smart technologies is growing fast. Our keyless, connected locks are very much part to this. What s so smart about a smart lock? It comes down to convenience and security. Replace an existing lock cylinder with an ENTR lock and you can open your home or office using a smartphone app, keypad PIN, remote control or even fingerprint. With ENTR , there s no longer any need to cut spare keys for kids, cleaners, carers or temporary workers.

It takes a couple of swipes on a phone or tablet screen to share digital keys with family or anyone who needs to access your home or office and to revoke the keys instantly whenever you want. ENTR also locks itself automatically when you exit, so worrying whether you remembered to lock the door becomes a thing of the past. embedded content Quick to install, cost-effective to run, secure to its core Like all the cleverest technologies, ENTR is easy to install. It takes a few minutes for a skilled DIYer or professional to retrofit an ENTR lock. There s no wiring or drilling, and no need for cabling. You simply replace the existing cylinder with the new ENTR digital lock. ENTR is also cost-effective to run. It s powered by rechargeable batteries that only need 16 hours charging per year over their 5-year lifespan. And it has a kind environmental footprint.

Packaging and battery are both recyclable, as is 90% of the lock materials. This is a sustainable lock of the future. To see more security benefits, you need to look inside the ENTR . Unlike other smart locks, ENTR mechanics are based on patented technologies from some of Europe s most trusted home security brands. It offers a class-leading combination of physical and electronic security. The mechanical hardware behind the digital layer already meets stringent standards, because it s tried and tested in millions of homes and offices worldwide. This helps explain why the ENTR won a product innovation award from global smart home publication, SMAhome. SMAhome awards are judged anonymously by a jury of industry insiders, including system integrators and established service providers. ENTR was selected from among 28 smart home product finalists to receive the overall Popularity Award for 2017.

The jury cited affordability, convenience, sustainability and easy integration with leading smart home ecosystems. A door is more than just a door Home automation technology has progressed way beyond smart thermostats and connected kettles. In fact, consumer surveys regularly pinpoint home security as its most important application. ENTR works perfectly as an affordable, stand-alone smart door lock, which you unlock with an app and an encrypted Bluetooth connection. But it is also built using standard protocols, and so integrates seamlessly with several leading European smart home and home automation ecosystems. Fit an ENTR , make the connection, and you can control your front door lock from the same interface that operates the thermostat, lighting, smoke alarms, CCTV and other domestic smart devices. We built ENTR with consumer demands in mind to give them more control, more security and more convenience, adds Schulz. Part of the job involves integrating our long-standing expertise in all aspects of door security with other technologies. That s why we are partnering with smart-home and security specialists, utilities, telecoms companies and other domestic service providers to offer customers the latest smart security technology.

We invite everyone to try ENTR and ensure their smart home starts with a smart door. Why ENTR ? Backed up by tried-and-tested locking technology from some of Europe s most trusted home security brands, including Yale, Mul-T-Lock, KESO, Vachette and FAB Open the front door via app, PIN code, remote control or fingerprint reader Easy installation: one screw is all it takes Works as standalone lock or integrated into a smart home system Share digital keys with your kids, cleaners, a carer or a temporary worker and revoke them whenever you want The ENTR smart lock is the easiest way to bring your front door into the digital age About ASSA ABLOY ASSA ABLOY is the global leader in door opening solutions, dedicated to satisfying end-user needs for security, safety and convenience.

Since its formation in 1994, ASSA ABLOY has grown from a regional company into an international group with about 47,000 employees, operations in more than 70 countries and sales close to SEK 71 billion. In the fast-growing electromechanical security segment, the Group has a leading position in areas such as access control, identification technology, entrance automation and hotel security. Visit Europe s only large-scale security event in 2017 IFSEC International is taking place at Excel London, 20 22 June 2017, here are 5 reasons you should attend: Exclusive hands-on access to over 10,000 brand new security solutions Network with over 27,000 security professionals Discounts of up to 30% exclusively for IFSEC 150 hours of seminars, workshops and keynote speeches A 1-2-1 meetings service to pre-book face to face meetings.

Time is running out, register now to avoid missing out

Exclusive: Facewatch founder urges government to protect facial recognition as crime-fighting tool

GDPR Photo courtesy of Wavestore The Minister for Digital and Culture has offered reassurances over the impact of a data protection law coming into force next year on the use of facial recognition technology for crime-fighting purposes. The General Data Protection Regulation (GDPR), which is designed to give citizens more control over their personal data, comes into force from 25 May 2018. Simon Gordon, founder of ground-breaking CCTV image sharing platform Facewatch, wrote a letter to Philip Davies MP, expressing concern that the new law could potentially prevent the legitimate use of facial recognition to prevent criminals/suspected criminals and terrorists from being flagged up as well as missing children being found.

He also pointed out that up to one third of most major retailers profits are swallowed up by shop theft thus adding around 1.2 to 1.5% to prices. Facial recognition is already in use or being trialled across the UK in retail outlets, shopping centres, casinos and public buildings and its use to reduce the need for security guards is set to explode. Philip Davies, MP for Shipley near Bradford, passed the letter on to the Minister for Digital and Culture, Matt Hancock. Responding to Gordon s letter, Hancock wrote: The Government understands the important role that facial recognition can play in the prevention of crime and wider protection of individuals safety. Accordingly, during the implementation phase of the GDPR the Government will be reviewing the elements of existing data protection laws to ensure that they are sufficiently broad enough to encompass these additional categories where necessary. We will continue to look at all possibilities to maintain high levels of protection for citizens both when implementing the GDPR and once we leave the EU. The law, which emanates from the EU but will still apply regardless of Brexit negotiations, will introduce stiffer penalties for breaches of data protection regulations. Below is the full letter from Simon Gordon, who also owns a wine bar in central London, followed by the response from Hancock, the MP for West Suffolk. Dear Philip I had a very useful meeting with the ICO last week and they flagged a potential problem coming in from Europe around the use of facial recognition for crime prevention.

The issue that is causing a potential problem is that the General Data Protection Regulations (GDPR) which are due to come into force in the UK in May 2018 and which include the following restrictions in Article 9 (which can be found at: http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679&from=EN): Processing of . biometric data for the purpose of uniquely identifying a natural person .. shall be prohibited. Paragraph 1 shall not apply if one of the following applies: . (g) processing is necessary for reasons of substantial public interest, on the basis of Union or Member State law which shall be proportionate to the aim pursued, respect the essence of the right to data protection and provide for suitable and specific measures to safeguard the fundamental rights and the interests of the data subject; The problem with this Article is that it will potentially prevent the legitimate use of facial recognition (which might be caught under the term biometric data ) to prevent criminals/ suspected criminals and terrorists from being flagged up as well as missing children being found. This is an area where the UK leads the way and is going to become a hugely important technology for keeping the country safe and reducing crime. As an example of how important it is to reduce crime, up to 1/3 of most major retailers profits are swallowed up by shop theft thus adding around 1.2 to 1.5% to prices. Facial recognition is already in use or being trialled across the UK in retail outlets, shopping centres, Casinos and public buildings and it s use to reduce the need for security guards is set to explode. It is vital that the UK Government introduces a derogation to enable facial recognition to be used for the prevention of crime otherwise they will be cutting off one of the most transformational crime prevention technologies of modern times. We believe the responsibility for reviewing the GDPR falls under the Departure of Culture Media and Sport (Karen Bradley) and would request that this is tabled with them so that appropriate action can be taken to ensure we do not get caught by this in the UK.

Yours Simon Gordon Dear Philip, Thank you for your letter of 16 January on behalf of, Mr Simon Gordon, Chairman of Facewatch, 13-14 Buckingham Street, London, WC2N 6DF, who has raised concerns about the General Data Protection Regulation (GDPR) and its impact on matters relating to facial recognition and biometric data for the purposes of crime prevention. As Mr Gordon mentioned, the GDPR will apply in the UK from 25 May 2018. The GDPR will give citizens more control over their personal data, including strengthened rules around the right to erasure and the right to restrict processing. The GDPR sets out the circumstances in which the processing of sensitive personal data which is otherwise prohibited, may take place. It also introduces two new categories of sensitive personal data which include genetic data and biometric data for the purpose of uniquely identifying a person. However, the regulation also enables member states to maintain or impose further conditions (including limitations) in respect of biometric, genetic or health data. The Government understands the important role that facial recognition can play in the prevention of crime and wider protection of individuals safety. Accordingly, during the implementation phase of the GDPR the Government will be reviewing the elements of existing data protection laws to ensure that they are sufficiently broad enough to encompass these additional categories where necessary. We will continue to look at all possibilities to maintain high levels of protection for citizens both when implementing the GDPR and once we leave the EU.

I hope that this reply is helpful. Yours ever The Rt Hon Matt Hancock MP Minister of State for Digital and Culture Visit Europe s leading security event in June 2017 Visit IFSEC International for exclusive access to every security product on the market, live product demonstrations and networking with thousands of security professionals. From access control and video surveillance to smart buildings, cyber, border control and so much more. It is the perfect way to keep up to date, protect your business and enhance your career in the security industry. Click here to register your place now to join us at London Excel on 20 22 June 2017.

Extreme vetting: Britons may have to hand over personal data to enter United States

The extreme vetting measures being considered by the Trump administration could see visitors from the UK having to hand over passwords to devices, social media accounts and other sensitive information. The measures, which also apply to visitors from other US allies in Europe, including Germany and France, will force tourists and other visitors to reveal personal data, as well as disclose financial information and face detailed ideological questioning, according to Trump administration officials quoted in an article by the Wall Street Journal, which has been picked up by several global media outlets since its publication. US citizens have established rights against unlawful searches at the border, but the extent to which foreign travellers can resist requests to hand over personal information is unclear.

In an article published in the Guardian US customs and border patrol said: All international travellers arriving to the US are subject to US Customs and Border Protection (CBP) inspection. This inspection may include electronic devices such as computers, disks, drives, tapes, mobile phones and other communication devices, cameras, music and other media players and any other electronic or digital devices. The agency s justification for picking through personal information belonging to British tourists is part of efforts to keep America safe and enforcement of its laws in an increasingly digital world depends on the CBP s ability to lawfully examine all materials entering the US. The UK Foreign Office has declined to provide any advice to British travellers, referring to its general foreign travel advice page for the US, which contains no information on digital privacy at the border. The Electronic Frontier Foundation, a US non-profit that campaigns for digital civil rights, publishes a digital privacy guide, which states: If a foreign visitor refuses a border agent s demand to unlock their digital device, provide the device password, or provide social media information, and the agent responds by denying entry, the foreign visitor may have little legal recourse. For US citizens, the burden of proof is on the government as US citizens have an absolute right to enter and where permanent residents are concerned, the government has to prove they have become inadmissible for entry. However for visa holders, the burden of proof is on the traveller to show that they are admissible to the US. That means if someone is asked for a device and refuses, the agent may deem that refusal a failure to meet that burden of proof. Practical measures, such as leaving behind non-essential devices, may help limit the exposure of individual travellers as well as deleting sensitive information before travelling, and shifting some data to cloud services.

Changing any passwords after they have been handed over, and securely resetting devices after they have been accessed and potentially compromised by CBP, can also prevent long-term data insecurity. More complex mitigation efforts have similarly been proposed by information security experts. However, there is a risk that border agents may see any such mitigation attempts as suspicious actions in themselves, that may be cited as a reason to delay or deny entry. Travellers can also fill in a US Citizenship and Immigration Services form G-28, which allows a traveller to nominate an attorney to represent them if they are detained. Without the form, it can be difficult for travellers to access legal representation while held at the border. Join other high-end security professionals at the launch of Borders & Infrastructure Expo In conjunction with Europe s most renowned security event , IFSEC International, B&I is addressing your critical needs for large scale security projects affecting national security, integrated systems, border protection and much more. You will have access to test the latest security innovations in; Physical & perimeter, Barriers & bollards, Command & control, Emergency response, Cyber solutions, Drones & UAVs, Transport security and much more.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

Hikvision profile: the biggest video surveillance brand by global sales

Hikvision Profile: The Biggest Video Surveillance Brand By Global Sales

Founded in 2001 Hikvision grew from a minor regional player to the biggest video surveillance brand in the world in a staggeringly short space of time. This is a profile of the Chinese CCTV giant, retracing its history, detailing its increasingly muscular approach to acquisitions and its latest products in network video. History/background Chinese video surveillance firm Hangzhou Hikvision Digital Technology Company Limited (Hikvision) was founded in 2001 and was first listed on the Shenzhen Stock Exchange in 2010.

Part-owned by the Chinese government, the Forbes 2000 company now has offices in 20 locations around the world including the USA and Canada, South Africa, Brazil, Australia, Singapore, Korea, India and five European countries. Hikvision has grown substantially in recent years, with revenue for the 12 months ending 31 st December 2015 recorded as US$3.9bn (25% of which came from outside China), up 47% on FY14 and more than double the US$1.76bn posted in FY13. That increased turnover and global reach has been achieved partly through acquisition and partly organic growth. Hikvision bought rival Chinese video surveillance product and service supplier Dahua Technology in 2015 for example (estimated at the time to have had the second largest market share of any video surveillance provider) and purchased UK-based intrusion alarm security firm Pyronix in May 2016 for an undisclosed sum. Hikvision recently opened a new UK office, showroom and training suite in West London Market position and strategy Hikvision s market share has accelerated in parallel with its revenue. Research company IHS calculated it held 19.5% of the global CCTV and video surveillance equipment market in 2015, up from 16.3% in 2014. Much of the company s strength lies in its willingness and ability to reach new customers through an extensive network of technology and distribution partners, ranging from global giants like ADI right down to local players in individual countries such as WDC Networks in Brazil. Recent examples of technology partnerships include a deal with Swedish video surveillance company Observit AB; a joint project with Eagle Eye Networks to provide cloud based security and business intelligence video management for the Lawrence Police Department in the US; and a software tie-up with ECMS on monitored surveillance system checking services. That flexibility around joint sales and marketing initiatives is backed up by Hikvision s embedded open platform (HEOP) program which was designed to ensure that third party analyst, detection and recognition applications can be downloaded and installed to run on its network cameras.

That approach gives customers and security integrators a choice around which application, service or system management components they use alongside Hikvision hardware, and supports independent evaluation, application development, compatibility testing and software development kit (SDK) delivery. It also allows systems integrators the option to feed footage from Hikvision cameras back to their own web pages without the manufacturer s assistance and therefore create their own revenue streams for ongoing service provision. While it is actively targeting customers in the retail, transportation, construction, finance and pharmaceutical industries, Hikvision traditionally has a strong presence in education selling surveillance and access systems to schools, colleges and universities across the world. embedded content Latest technologies Hikvision maintains large technology portfolio that centres on IP network, analog and HD CCTV cameras; digital and network video recorders (DVR/NVRs); video encoders/decoders; video management software; and access control and alarm systems. Hikvision attributes much of its success to the speed and scale of its product innovation, asserting that around 8% of its annual turnover is ploughed back into research and development each year, with a third of its global staff (roughly 5,000 engineers) being directly involved. The company was fast to incorporate H.264, video content analysis, cloud computing and big data into its product lines and its latest Dome and Smart Box and Smart Bullet cameras support 4K video recording for example. These offer 3840 2160 pixel resolutions that support more sophisticated video analytics applications like face or car number plate recognition and can cover a much wider area with a single camera than is possible with multiple HD models. embedded content Whilst Hikvision s early success was built on undercutting established rivals (particularly in the US and Europe) with comparatively inexpensive cameras, it has since used its broad product portfolio to reach every corner of the video surveillance market and offer security solutions at a much wider range of price points. Rather than smaller sites requiring 10 or 20 cameras and associated infrastructure and management tools, the company now sees customers needing hundreds or thousands of cameras as its sweet spot.

It is also applying significant resources to identify gaps in video security and analytics provision within key vertical industries, developing new applications able to exploit the latest camera functionality to provide customers with some measure of operational advantage. Examples of innovation here include intercom systems equipped with biometric readers that scan faces and fingerprints for accurate authentication and door entry, and heat mapping technology that use cameras to help retailers monitor traffic flow in shops and malls in response to marketing and promotion campaigns. Elsewhere a mobile in-vehicle solution that deploys camera with magnetic stick-on base, embedded WiFi and 3G/4G connectivity, long life batteries and integrated high capacity data storage options on the inside of buses and trains was developed for transport companies, with an all-in-one security terminal that combines video recording capabilities, storage and a display in one compact, movable unit having multiple uses.

Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

Pervasive Internet Surveillance

It has become clear in the past year that pervasive surveillance is a threat to all users of the Internet everywhere. A little over a year ago, a series of revelations began to emerge about widespread surveillance by government national security agencies that sent shockwaves across the Internet ecosystem. The world got an initial glimpse of the scope and scale of these programs on 5 June 2013 with the first leaks from Edward Snowden. The fact that governments use surveillance tools was not a surprise. It was the scope and scale of these online surveillance programs that has been a wake-up call for the international community.

Early on, the Internet Society expressed deep concerns about online surveillance, noting:

This kind of collection of user information is at odds with the commitments that governments around the world have made with respect to protection of personal data and other human rights.

Further, we highlighted the need for an open global dialogue on online privacy and security1. Also, last year, the Internet Society Board of Trustees endorsed the International Principles on the Application of Human Rights to Communications Surveillance2 from the civil society-led Necessary and Proportionate3 initiative and emphasized the importance of proportionality, due process, legality, and transparent judicial oversight. At its Vancouver meeting in November 2013, the Internet Engineering Task Force (IETF) declared that pervasive monitoring represents an attack on the Internet. This was followed by the adoption of RFC 72584: Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.”

In this blog post, we identify some of the responses in the policy landscape. In a companion piece, on our Internet Technology Matters blog5, we examine some of the responses from the technical community.

Policy responses and new challenges

We see a range of responses emerging, including:

  • Statements of principles
  • Data localization policies
  • Traffic re-routing policies
  • Legal proceedings
  • Assertion of jurisdiction
  • Diplomatic pressure

All over the world and across stakeholder groups, Internet users, political figures and even industry leaders have proactively voiced their deep concerns, calling for pervasive surveillance to stop. Notably, in December 2013, the UN General Assembly adopted a resolution: The right to privacy in the digital age6, following an impassioned speech at the UN General Assembly in September by Brazilian President Dilma Rousseff where she expressed outrage at the mass surveillance and set out key principles for the Internet7. The UN resolution, among other things, requests the UN High Commissioner for Human Rights to present a report on the protection and promotion of the right to privacy in the context of domestic and extraterritorial surveillance and/or interception of digital communications and collection of personal data, including on a mass scale . In Europe, during the past 12 months there has been a wave of activity in response to online surveillance. For instance, groups within the European community issued statements of principles (e.g. the Council of Europe Declaration of Ministers on Risks to Fundamental Rights stemming from Digital Tracking and other Surveillance Technologies8), and commenced proceedings in the European Court of Human Rights that received the rare priority designation by the Court. Further, the European Parliament9 called for the end of the US-EU Safe Harbor agreement and there was talk of establishing a European communications network ( a Schengen-Net ).

Significantly, in this context, the European Court of Justice recently ruled10 that the EU Data Retention Directive is invalid. In the Asia-Pacific region, Thailand, Indonesia and Malaysia have reportedly condemned the U.S. surveillance programs, with the latter two calling for ASEAN countries to unite against spying. In some parts of the world, notably the Caribbean region, countries that were already considering increasing their capacity to exchange regional traffic via the establishment of IXPs, have hastened their work in light of the revelations that their international traffic may be subject to external surveillance. While we see a range of positive policy actions to counter online surveillance activities and to protect citizens, such as through strong statements of principle, we also see instances worldwide where governments appear emboldened by the revelations to engage in online monitoring and invest heavily in major cyber defense technologies.

Data localization proposals combined with calls for intergovernmental action to ensure national cybersecurity have also raised concerns across the Internet that this global network-of-networks could be carved up along national boundaries11. There was strong resonance in Latin America on the issue of Internet surveillance. The Presidents of Argentina, Bolivia, Brazil, Uruguay and Venezuela have signed a joint Mercosur Declaration12 condemning the surveillance episode. Moreover, Brazil, under President Rousseff s leadership, convened a Global Multistakeholder Meeting on the Future of Internet Governance, (NETmundial), 23-24 April 2014. The meeting adopted the Netmundial Multistakeholder Declaration13, a non-binding document that served as an exercise of achieving common ground among all stakeholders regarding Internet Governance.

It also clearly mentions the right to privacy, including:

Not being subject to arbitrary or unlawful surveillance, collection, treatment and use of personal data. The right to the protection of the law against such interference should be ensured.

Procedures, practices and legislation regarding the surveillance of communications, their interception and collection of personal data, including mass surveillance, interception and collection, should be reviewed, with a view to upholding the right to privacy by ensuring the full and effective implementation of all obligations under international human rights law.”

The Internet Society, for its part, is working with the policy community to tease out good and bad policy responses to this pervasive monitoring environment (e.g. by engaging in policy debates, and convening multistakeholder dialogue on data localization and traffic re-routing proposals1). We are also involved in the OECD s work on implementation of the Revised Privacy Guidelines, in the Council of Europe s modernization of the data protection convention (Convention 108) and in APEC, on the implementation of the Cross Border Privacy Rules system. These three frameworks prescribe principles for transborder flows of personal data, an essential foundation for a trusted global interoperable Internet. Further, in our contribution to the Office of the High Commissioner for Human Rights for its consultation in light of the UN Resolution, and in other fora, we are advocating for an ethical approach to data collection and handling, especially in the context of national security.

What s next?

Despite the extraordinary growth of the Internet, revelations regarding surveillance within the past 12 months underscore the importance of remaining watchful in our support of an open, global and trusted Internet – we must not take it for granted. The Internet has flourished and expanded because it is open, resilient, interconnected, and interdependent.

It’s an ecosystem based on collaboration and shared responsibility from all stakeholders, including governments, technical community, civil society, private sector, and academia, among others. Important progress is already being made within and across stakeholder communities on a variety of technical and policy initiatives that share the common goals of:

  • Striving to protect Internet users communications from unwarranted monitoring and interception; and
  • Restoring trust in the Internet, its technologies, applications, and services.

And yet, there is no absolute answer to prevent massive surveillance. The only way to make the Internet more secure, more resilient, more robust, and with more privacy is through all of us working collaboratively to make it that way.

It’s time for us all to do our part to make the Internet stronger.

1 RightsCon 2014; Freedom Online Coalition; IGF 2014141516

References

  1. ^ online privacy and security (www.internetsociety.org)
  2. ^ International Principles on the Application of Human Rights to Communications Surveillance (en.necessaryandproportionate.org)
  3. ^ Necessary and Proportionate (en.necessaryandproportionate.org)
  4. ^ RFC 7258 (tools.ietf.org)
  5. ^ Internet Technology Matters blog (www.internetsociety.org)
  6. ^ The right to privacy in the digital age (www.un.org)
  7. ^ principles for the Internet (gadebate.un.org)
  8. ^ Declaration of Ministers on Risks to Fundamental Rights stemming from Digital Tracking and other Surveillance Technologies (wcd.coe.int)
  9. ^ European Parliament (www.europarl.europa.eu)
  10. ^ ruled (curia.europa.eu)
  11. ^ carved up along national boundaries (www.internetsociety.org)
  12. ^ Mercosur Declaration (www.mercosur.int)
  13. ^ Netmundial Multistakeholder Declaration (netmundial.br)
  14. ^ RightsCon 2014 (rightscon.org)
  15. ^ Freedom Online Coalition (www.freedomonline.ee)
  16. ^ IGF 2014 (www.intgovforum.org)