UK government issues cybersecurity guidelines for connected cars

Cyber The Department for Transport has published cybersecurity guidelines for manufacturers of smart or connected cars. Written with help from the Centre for the Protection of National Infrastructure, the principles implore everyone in the automotive supply chain to collaborate during the design process and over software upgrades and maintenance long after cars hit the road. The authorities are concerned about the prospect of older vehicles running outdated software.

As cars become increasingly automated and ultimately, driverless the stakes will rise. Last year ethical hackers managed to wrest control of a Tesla Model S while the car was moving and slam on the brakes (see how they did it in the video below). Attacks can even inject malicious code into the electronic control units (ECUs) and controller-area-network (CAN) bus, which control critical systems such as electric steering and braking. Mark Noctor, VP EMEA, Arxan Technologies The eight principles, which were launched by transport minister Lord Callanan, follow: Organisational security is owned, governed and promoted at board level Security risks are assessed and managed appropriately and proportionately, including those specific to the supply chain Organisations need product aftercare and incident response to ensure systems are secure over their lifetime All organisations, including sub-contractors, suppliers and potential 3rd parties, work together to enhance the security of the system Systems are designed using a defence-in-depth approach The security of all software is managed throughout its lifetime The storage and transmission of data is secure and can be controlled The system is designed to be resilient to attacks and respond appropriately when its defences or sensors fail embedded content Connecting to WiFi and external devices via Bluetooth, Modern cars are increasingly smart . The communications and entertainment systems are particularly vulnerable to attack, and can be reverse engineered to access the API libraries that facilitate data sharing between systems, says Mark Noctor, VP EMEA at Arxan Technologies. From here attacks can even inject malicious code into the electronic control units (ECUs) and controller-area-network (CAN) bus, which control critical systems such as electric steering and braking. Preventing application code from being accessed and tampered is one of the biggest priorities in protecting a connected vehicle, and it is encouraging to see the government s guidelines specifically list the ability to protect code and ensure its integrity as key principles. Manufacturers must deploy code hardening measures to prevent attackers from accessing their source code and removing vital data such as cryptographic keys which can be used to access other systems. Anti-tampering measures should be hidden in the code to alert them if the code has been changed, and prevent systems from starting if alterations are detected.

The government announced the Autonomous and Electric Vehicles Bill, which will allow innovation to flourish and ensure the next wave of self-driving technology is invented, designed and operated safely in the UK , during the Queens Speech in June. The outcome of recent efforts by the US government to engage with US automakers over the issue do not augur well. Asked by a Senate committee if they supported mandatory privacy and safety standards, executives from Google, General Motors, Delphi and Lyft were evasive. Free Download: the Cyber Security Crashcourse This report contains 40 slides packed with insight into the trends shaping the industry and how you can protect yourself. Eric Hansleman from 451 Research presents a rapid-fire overview of cyber security.

Click here to download now

Divergent data collection methodologies hampering European efforts to reduce false alarms, says Euralarm

Fire detection A lack of coordination between fire services and others involved in the analysis of fire alarm data is hampering efforts to reduce false alarms across Europe, a forthcoming study will conclude. Euralarm has reviewed how fire services in Germany, the UK, Switzerland, Sweden and Austria collect and analyse data generated by responses to fire alarms. Noting sharp differences in methodologies, a study by the European body representing fire system manufacturers across Europe has called for greater collaboration between stakeholders in their efforts to reduce false alarms.

False alarms can be reduced with the deployment of modern multi-sensor fire detectors and regular, appropriate maintenance of fire detection systems. However, a dearth of data into false alarms is hampering efforts to address a problem that costs the UK in excess of 1bn a year. A study conducted by Euralarm in 2012 showed that data sources were missing or too divergent to draw meaningful comparisons. The association says that reliable details, like data pools, on the range of false alarm causes are needed to define and deploy effective countermeasures. Conducted by the Euralarm Task Group False Alarm in Germany, Great Britain (England), Switzerland, Sweden and Austria (Vorlarberg), the project s objective has been to calculate false alarm ratios based on four different models. The study concluded that comparison of fire alarm data in the respective countries is hampered by a lack of common terminology and processes. Application guidelines are national and therefore data is collected and handled quite differently from country to country. Narrow or wrong measures are being implemented as a result, says Euralarm. A common approach is perfectly feasible, the association believes, if the fire safety industry, fire services and building owners resolve to cooperate more closely.

The report will be published in autumn 2017. Euralarm represents the electronic fire and security industry across Europe. Founded in 1970, the association represents more than 5,000 companies within the fire safety and security industry.

InfoTechnica 12W 2.4A Compact & stylish Heavy Duty Wall Charger with dedicated removable 4 feet/1.2m Charge & Sync Micro USB cable for Samsung Galaxy S3,4,5 Nokia, Blackberry, HTC, LG, Motorola, MP3 players, portable video game consoles and other rechargeable electronic devices with Micro USB charging port.

InfoTechnica 12W 2.4A Compact & stylish Heavy Duty Wall Charger with dedicated removable 4 feet/1.2m Charge & Sync Micro USB cable for Samsung Galaxy S3,4,5 Nokia, Blackberry, HTC, LG, Motorola, MP3 players, portable video game consoles and other rechargeable electronic devices with Micro USB charging port.

List Price

Current Price

  • Trendy Stylish & Durable 2.4A charger with 1.2 Meter charging cable with Micro USB connector; compatible with Samsung Galaxy, Blackberry, HTC, LG, Nokia, Motorola, Plus USB port for charging most USB chargeable devices
  • USB Port is capable of delivering up to 2.4 Amp current for ultra-fast charging.
  • Superior quality and high-performance -LED power indicator glows soft blue when properly connected and ready to charge.
  • Input voltage: 100-240V ~ 0.3A 50/60Hz Output current: 5V=2.4A
  • Robust safety features – CE / RoHS / FCC authentications. Intelligent circuit design with over-current, over-heat and over-charge protection. Automatically stops charging when battery is full

The charger is featuring a new trendy and stylish compact design.
Offers fast, efficient and rapid accelerated charging at home, in the office or on the go.
It works with any iPhone, iPod, iPad, Android tablets and many other devices that can be charged via the wall socket.
Circuit Protection: Over Current, Over Voltage, Short Circuit, Over Temperature

• Input: 100-240V ~ 350mA 50/60Hz
• Output power: 12W
• Output Voltage: 5V 2.4A
• LED Light: Monochromatic Blue light
• Port: USB Port
• Dedicated Removable 4feet(1.2m) USB cable
• Product Dimensions L60*W42*H42MM
• Weight 0.06KG

Device compatibility
Dedicated Removable 1.2m USB cable with Micro USB connector:
• Samsung Galaxy, Blackberry, HTC, LG, Nokia, Motorola
USB port:
• All iPhones and iPods
• iPads
• Android smartphones – HTC, All Droids, Samsung
• Blackberry and Windows smartphones
• Other Tablets and USB powered devices

Detailed Product Description
• Built-in fuse prevents overcharging, over-voltage and short circuiting
• Intelligent IC chip
• LED charging indication

More Blackberry Products

SENHAI Universal Car Phone Holder Cradle Dock Station, FM Transmitter USB Charger for iPhone 6 Plus 6 5S 5C 5 4S 4 Samsung Galaxy S6 Edge S6 S5 S4 S S2 Note 3 Note 2 etc and Other Electronic Devices.

SENHAI Universal Car Phone Holder Cradle Dock Station, FM Transmitter USB Charger for iPhone 6 Plus 6 5S 5C 5 4S 4 Samsung Galaxy S6 Edge S6 S5 S4 S S2 Note 3 Note 2 etc and Other Electronic Devices.

List Price

Now Price

  • Compatible with all iPhone models, iPod models – Touch, Classic, Nano, Shuffle, all Samsung Galaxy & Note models, HTC, Google Nexus, LG, Nokia, Blackberry, Sony a, Motorola and all other Smartphones and GPS devices.
  • The Universal bracket can accommodate all different sizes of smartphones and hold them up for you to view (for GPS or roadside assistance). With the FM transmitter & USB charger, you can charge your electronic device while simultaneously listening to your favorite music or podcast through your existing car stereo.
  • Built-In Overcurrent Protector guards your device battery against overcharge damage.
  • Universal 360° Degree Rotating Flexible Gooseneck Clamp. USB Charger Port with a maximum 2.1A Output. An FM transmitter to play music and audio through your existing car stereo system via aux cable and FM radio station.
  • A great phone holder for any car as mount Plugs directly into the car cigarette power outlet. The FM transmitter uses an LED display to show and indicate radio frequency/station (88.1MHz – 107.9MHz).

It is an essential accessory for your vehicle to be able to navigate, listen to your favorite tunes and charge your phone all at the same time for convenient and safe driving.

Main Features:
*Frequency range:88.1MHz – 107.9MHz
*LED display shows the frequency
*HI-FI stereo music from Smartphone
*360° Rotation shows the best viewing,fixed with most cars
*Flexiable clip width from 20-100mm
*Restore the last frequency and volume when you restart the device support handfree function,Voice calls out through the car audio
*Systerm when using devices via Universal 3.5mm jack cable
*Handfree function supports Samsung,HTC,Apple and other smart phone
*Transmitting will turn off automatically when no audio signal in 60 seconds
*1 USB Charger (Max 2.1A)

Compatible with:
All iPhone Models – iPhone 6, 6 Plus, 5S, 5C, 5, 4S, 4, 3GS, 3G
All iPod Models
Samsung Galaxy Models – S6, S5, S4, S3, S2, Note 3, Note 2
Android Smartphones – HTC One, Google Nexus, LG, Nokia Lumia, Blackberry, Sony Xperia, Motorola Droid
Most GPS Devices
Other iOS/Android Smartphones

Package included:
1x Universal Car Gooseneck Mount with 360° Degree Rotating Holder with FM Transmitter.
1x microUSB charging cable
1x User Manual.

1.One year guarantee from Senhai.
2. If you have any question regarding our products and shipping,Please feel free to contact us.

More Blackberry Products

Universal Hot Shoe Camera Electronic Flash Light for Canon EOS M, G16 G15,Nikon P7800, Olympus Pen EP2,EP3,EP5,EPL2,EPL3,EP-L5,EM-5,E-PM1, Panasonic LX7 G3,G5,G6,GF3,GF5,GF6,GH3,GH6,Fuji X100 X10 X20 X-M1, Samsung NX1000,Pentax K-01 & other Compact System Cameras @ securityblogs.co.uk

Universal Hot Shoe Camera Electronic Flash Light for Canon EOS M, G16 G15,Nikon P7800, Olympus Pen EP2,EP3,EP5,EPL2,EPL3,EP-L5,EM-5,E-PM1, Panasonic LX7 G3,G5,G6,GF3,GF5,GF6,GH3,GH6,Fuji X100 X10 X20 X-M1, Samsung NX1000,Pentax K-01 & other Compact System Cameras

List Price

Web Price

  • This flash unit is a good partner for you and your camera especially be a slave flash unit.
  • The Great Features of this flash unit is its mini and light body (net weight 115g) and the rotatable flash head (5-angles)
  • Light diffuse angle: Vertical 40 x Horizontal 60
  • Work with flash units using universal hot shoe like CANON, Nikon, Sigma, Olympus, Pentax.
  • Package includes: 1 x CY-20 Flash Unit(The camera, flash stand and flash trigger in the pictures are not included).

1. adjustable lampholder, 2. hot shoe holder, 3. battery door 4. testing switch, 5. hot shoe lock, 6. prepare indicator lamp, 7. power switch, 8. in-phase jack.

Technology Capability
1,flash index: GN20m (ISO100,DIN21)
2,color temperature: 5600k (for sunlight)
3,efficient illuminating beam: horizontal 60°,vertical 40°
4,power: 1.5v double A battery
5,Back time interval: 7 seconds
6,flash continuous time: 1/1000s(manual)
7,size: 65×60×98mm

Camera shutter adjustment
The camera with inter-mirror shutter can adjust to any speed.While the camera with focal plane shutter can just adjust to the speed profile of”X”.(Generally 1/60s).Or you can adjust your speed according to your instruction.

How to use:
1,determine the distance between camera and the main feature by your eye,and then find this distance on the upside of the exposure meter.
2,find the photonasty of your camera from the first vertical line of the left of the exposure meter.The joint of this two lines is approximtely the apertu:re number.
3,you can get your aperture number from the following formula?
Eg.photonasty is ISO100/DIN21,the distance between the camera and the main feature is 5m,then the aperture is approximately F/4.

Suitable For: Work with Hot Shoe Cameras,Wireless Remote Trigger Studio,Wireless Hot Shoe Flash Remote Slave Trigger Sensor,Work with flash units using universal hot shoe like CANON, Nikon, Sigma, Olympus, Pentax (except Sony,Minolta as they use a special hot shoe,but you can use convertor to make it compatible,we have them in our shop).

Package includes: 1 x CY-20 Flash Unit(The camera, flash stand and flash trigger in the pictures are not included).

Related Camera Products

Logue Corporate assist FGH Security with their divestment of their …

Logue Corporate ran a divestment process on behalf of FGH Security to divest of their electronic security business and monitoring centre in Accrington. The process included identifying potential acquirers, developing an Information Memorandum, running a process to identify the best bid and then managing the negotiation process. The process started with six bidders and a final bidder was identified.

The business was sold to Lodge Service.

FGH Guardhall MD Peter Harrison

FGH Guardhall MD Peter Harrison

FGH Guardhall MD Peter Harrison commented about Logue Corporate s services during the sales process: Bobby Logue and his team were excellent. From my initial point of contact I knew we were dealing with professionals Bobby was able to let me know comparable prices of similar sales and put a fair market valuation on the part of our portfolio we chose to dispose of. Within a week or so we had some potential buyers and Bobby helped us rank them into an order of preference.

As an entrepreneur who is guilty of missing sleep for work I was glad to find Bobby had a similar ethos and our conversations and emails would range from 5pm to 11pm to 4am he seemed to be available at all hours of day. In order to finalise the deal Bobby came and met with me and the buyer to assist in the negotiation. At no point did I ever feel Bobby was working for the buyer or for me he took a fair approach .

Bobby Logue - Principal, Logue Corporate

Bobby Logue – Principal, Logue Corporate

Logue Corporate was established in 1997 and has played a key role in several major acquisitions.

Bobby Logue, our Principal, has been in the security business sector for over 30 years. He has received industry accolades such as the BSIA Services to Security Industry (2012), Skills for Security Services to the Security Business Sector (2006), and twice a finalist in the Association of Security Consultants, The Imbert Prize (2010 and 2012). Since 1997 Logue Corporate has produced the security industry news website, Infologue.com which provides industry analysis, Infologue.com table of the Top 20 UK security companies and a table of the top 5% ACS companies in the UK.

Logue Corporate is the business services division of Interconnective Limited, the security products, business services, and security industry training group.

Logue Corporate Website1


  1. ^ Logue Corporate Website (www.loguecorporate.com)

New York artist to debut 'drone-proof' anti-surveillance clothing line …

Image from primitivelondon.co.uk

Some fashonistas strive for sexy when it comes to clothes, but one artist from New York is taking a rather utilitarian approach with outfits he s about to unveil a whole line of garments designed to make the wearer nearly invisible to drones.

Brooklyn-based artist Adam Harvey used to work primarily with photography, but he undertakes an entirely different medium with his newest project. He says that in the years since the United States post-9/11 PATRIOT Act has been in place, cameras have stopped becoming art making tools and have instead become enablers of surveillance societies. That was Harvey s explanation last year when he discussed his projects with the website Rhizome.

At the time, Harvey was experimenting with how household make-up could render it harder for computers to use facial recognition programs to pluck people out of crowds. And while the practice of examining facial features using biometrics and sophisticated surveillance cameras has certainly intensified in the months since, Harvey has found another type of evasive practice that is a bit harder to avoid: the drone. The United States currently has a modest arsenal of unmanned aerial vehicles UAVS, or drones that it uses in surveillance missions on its border with Mexico and in war zones overseas.

By the year 2020, however, the Federal Aviation Administration expects the number of domestic drones in American airspace to be as large as 30,000. At the moment, law enforcement agencies across the country are trying to get their hands on their own surveillance drones, some of which can zoom in and read a milk carton from 60,000 feet, according to the Electronic Frontier Foundation. And while escaping a space-age robotic spy machine thousands of feet above the Earth might not be as easy as, say, putting on some blush or mascara to make it harder to be detected, Harvey has designed an entire clothing line that will help disguise people from the all-seeing eye of Big Brother.

On January 17, Harvey will unveil Stealth Wear at a studio in London. There he ll debut his new counter surveillance fashions that he plans to also test before his private audience. Building off previous work with CV Dazzle, camouflage from face detection, Privacy Mode continues to explore the aesthetics of privacy and the potential for fashion to challenge authoritarian surveillance, the press release reads.

In collaboration with NYC fashion designer Johanna Bloomfield, Harvey has tried to tackle some of the most pressing and sophisticated forms of surveillance today. Ultimately, it s a fashion statement that says an earful to those enabling a growing spy state. I think building privacy into modern garments can make them feel more comfortable and, like armor, more protected, Harvey told Rhizome last year. Data and privacy are increasingly valuable personal assets and it doesn t make sense to not protect them.

It s also a great conversation starter. Harvey hopes to get those conversations starting next week in London, where he will unveil an anti-drone hoodie and matching scarf, a shirt that shields the wearer from X-rays and a pocket protector that he says blocks cell phones from sending and receiving signals. For the hoodie and scarf set, Harvey and Bloomfield use materials designed to thwart thermal imaging, which the artist says most UAVs employ in order to zero-in on targets.

The t-shirt allegedly protects a person s internal organs from harmful X-rays and the Off Pocket pants accessory disconnects mobile devices from service providers with special materials. Smartphones infiltrate our senses. They cause anxiety, phantom vibrations, and keep us on alert, he told Rhizome. We expend energy maintaining an always-on connection.

Smartphones should come with a switch to turn this off, but they don t. Turning my iPhone off and back on takes 45 seconds. Using flight mode is also clumsy.

I wanted a way to quickly and politely disconnect myself without relying on the phone s software or hardware features. The Off Pocket circumvents this design flaw. When I first modified my pants with signal attenuating fabric, it felt odd to be unplugged.

It was as if I had blocked out part of the world, covered my ears, or closed my eyes. But then I adjusted and realized that I had just opened them again. The artist says accompanying each project will be either recorded and in-person demonstrations that reveal the process behind each specific technology and counter technology relevant to his work.

Speaking to the UK s Register back in 2010, Harvey said even then that surveillance was becoming more prevalent.

“The number of sensors that are going into the public spaces has been increasing, he said, adding that we very well might be heading to the point where we as a society need to think about what we are comfortable with.”

“Maybe you could go to a privacy hair stylist in the future, he quipped.

Olympus VF-2 Electronic Viewfinder – Black @ securityblogs.co.uk

Olympus VF-2 Electronic Viewfinder – Black

List Price

Now Price

  • Weight: 32 g
  • Colour of product: Black

Olympus PEN BLACK Electronic Viewfinder VF2 bullDetachable electronic Viewfinder bullPerfect for low angle shooting bullAvailable in black and silver bullTilting mechanism bullBright with high contrast from the center to the edges N3606492 Digital SLR

Find More Camera Products

Private Donor Offers To Pay For Security Guard For Tulsa Element …

TULSA, Oklahoma –

Tulsa Public Schools is considering fast-tracking security upgrades that were planned for the next several years.

The change in priorities could squeeze a three-year plan into one. School leaders are considering putting off other purchases to immediately buy security equipment. That comes as the parents at a school waiting for upgrades offer to pay for their own security guard.

Eliot is one of many TPS buildings – most all of them elementary schools – with less security than the district would like.

The parents don’t like it either, but this is the first school with parents ready to pay $10,000 toward a security guard.

“And I had a private donor step up and say, I’m willing to give a lump sum of the money,” said Gretchen Landers.

12/17/2012 Related Story: Tulsa Police, Tulsa Public Schools To Step Up School Security1

Landers is the PTA President and she says the parents aren’t willing to wait for security upgrades that are several months away.

“Our school, our parents are placing a priority on this.

I hope other
parents will. I wish the state would put a priority on this,” Landers

The Campus Police Department isn’t accustomed to getting donations,
and it’s going to take some time to figure out the procedure for parents
to pay for another security guard.

Meanwhile, the district might speed up the existing plans to install more security equipment at sites like Eliot.

“Last Thursday, no one really cared that this equipment wasn’t in there, and today it’s the number one priority for people and it’s frightening for them,” said TPS Campus Police Chief Gary Rudick.

Rudick said 15 schools will definitely get security cameras and electronic locks within a year, but 29 other schools, and some TPS offices, will be left waiting.

The change in priority could put all of them on the list for next year.

“Some of those sites may have a camera system, but not the doors. Some have the doors and not the cameras, but there are 47 sites that are needing equipment to bring them up to the standard we’ve set for the district,” Rudick said.

It’s up to the superintendent, the school board and bond oversight committee to consider changing the priorities, but it’s already under discussion.

12/17/2012 Related Story: Booker T.

Washington Leading District In School Security2

Schools Approved for Installation in 2013:

Anderson ElementaryBell ElementaryRemington ElementaryMcKinley ElementaryKendall Whittier ElementaryMitchell ElementaryEugene Field ElementaryEliot ElementaryCooper ElementaryMarshall ElementaryMcClure ElementarySkelly ElementarySkelly PrimaryJones ElementaryBurroughs Elementary

Schools Currently on the Waiting List:

Academy CentralCarnegie ElementaryColumbus ElementaryDisney ElementaryECDC BunchECDC PorterECDC ReedEisenhower at NimitzEmerson ElementaryFranklinGrimes ElementaryGrissom ElementaryHawthorne ElementaryHoover ElementaryJackson ElementaryKerr ElementaryLanier ElementaryLee ElementaryLindbergh ElementaryMcArthur ElementaryMark Twain ElementaryOwen ElementaryPark ElementaryPeary ElementaryPenn ElementaryRobertson ElementarySalk ElementarySpringdale ElementaryStreet SchoolTRAICE AcademyTulsa Learning AcademyWhitman ElementaryWright ElementaryOther TPS Offices


  1. ^ 12/17/2012 Related Story: Tulsa Police, Tulsa Public Schools To Step Up School Security (www.newson6.com)
  2. ^ 12/17/2012 Related Story: Booker T.

    Washington Leading District In School Security (www.newson6.com)

Forward Lookout | Surveillance Cameras to protect the Privacy …

New rules for the use of surveillance cameras by city departments. This is the APM (administrative procedure memorandum) that came out yesterday from the Mayor s office. This is why I like this mayor . . . here is the resolution we passed in 20081, and Mayor Dave ignored for his administration, along with many departments.

Seems like he picked up on many of the issues we did 4 years ago. So thank you! I wonder if we will see the policies appear in 30 days or not?

Note: I do take exception with the statement that The primary purpose of this policy is to protect the privacy rights of the public and the associational/collective action rights of City employees. But otherwise, this is a step forward! Vindicated again.

City of Madison agencies have identified a wide variety of legitimate business reasons to use surveillance cameras. The primary purpose of this policy is to protect the privacy rights of the public and the associational/collective action rights of City employees. This policy promotes security for the public and for City employees through timely surveillance of areas otherwise difficult to monitor.

Department of Information Technology (IT)
Shall design, acquire, manage and maintain the network infrastructure to support a City-wide enterprise surveillance camera system.

IT shall, in accordance with APM 4-7 (Policy for the Procurement and Disposal of Electronic Products), assist agencies in obtaining surveillance systems that meets the agency s technical requirements and complies with the City s enterprise system technological standards and policies.

IT shall manage network connectivity issues, coordinate problem remediation, maintenance and replacement of devices connected to the enterprise camera system. Agencies that have their own IT and/or facilities maintenance staff capable of maintaining camera devices may provide their own maintenance and problem remediation support.

IT shall ensure that the enterprise camera system is capable of complying with all Wisconsin Public Records Laws for the capturing, retention and timely production of public records.
Department/Division Head Responsibility

City agencies may develop their own surveillance camera programs to address the security issues. However, agencies shall not purchase, create or maintain their own independent surveillance camera systems but rather they shall work with IT.

Department/Division Heads must adopt a written surveillance camera policy on the use of surveillance cameras.

Such written policy shall be on file and available to the public for review with the City Clerk within 30 days of implementation of the surveillance camera system (See Common Council Resolution RES-08-00863). The policy must be reviewed by the IT Director, the City Attorney and the Human Resources Director prior to its implementation.

Owner Agencies
The authorized security contacts for owner agencies may grant access to their surveillance cameras for others outside the owner agency. The authority to manipulate the cameras will be restricted to owner agencies, unless otherwise specified by the owner agency.

Others may be provided view only permissions to specified surveillance cameras by the owner agency. Owner agencies are responsible for determining whether there is potential evidence of a law violation that was captured by their surveillance cameras, generate a police case number, and complete the form requesting preservation of evidence.

Agencies must provide Information Technology with at least 30 days advance notice of their intent to purchase cameras in order to afford adequate time to provision the network infrastructure required to support the new devices.
Agency policies must address the following considerations:
The circumstances which necessitate the use of surveillance cameras;
Whether the agency will utilize the City s standardized enterprise camera system and if not, specify business/technical reasons prohibiting such use;
The personnel, by name or position, that will have access to either the cameras or the data recorded by such cameras;
The circumstances under which such personnel will have access to either the cameras and/or the recorded data;
Whether the cameras will be recording video or both audio and video;.
The physical location of cameras and a description of the areas to be observed by such cameras;
The corresponding location and the verbiage of signage alerting persons that their actions are subject to audio-visual recording. Such signage shall be conspicuous and shall clearly inform all persons that their actions are being both audibly and visually recorded;
Unless otherwise prohibited by law, the Madison Police Department will be provided with immediate access to all data or recordings that may constitute evidence of a crime.

The Madison Police Department shall determine, in consultation with the Dane County District Attorney s Office, whether to obtain a warrant to take custody of such data or recording;
The time period that recorded audio/video will be retained and available. No retention period of less than fourteen days may be approved under this policy;
Procedures for ensuring that records are not destroyed during the pendency of any public records request, investigation or civil/criminal litigation.

Every agency policy shall comply and each use of surveillance cameras shall comply with the Fourth Amendment to the United States Constitution and Article 1, Section 11 of the Wisconsin Constitution. Furthermore, agencies shall comply with the requirements of sec.

968.31, Wis. Stats. This requires close consultation with the Office of the City Attorney.

Each agency policy shall address any laws unique to that agency.

For example, the Library s policy shall reflect consideration of sec.

43.30(5)(a), Wis. Stats. concerning the disclosure of library patron identities.
Every policy shall address the implications of any applicable collective bargaining agreement.

Compliance with this provision requires close consultation with the Labor Relations Unit of Human Resources.
Agencies shall be responsible for the costs of procuring and operating the surveillance cameras they employ.

Agencies shall use their budgeted funds to purchase all new camera devices, equipment, licenses, and services required to install and connect (fiber-optics, point-to-point radios, or any other network connectivity technologies) the devices to the enterprise camera system.

All enterprise cameras located in the street right-of-way will be owned by Traffic Engineering.

Traffic Engineering shall provide maintenance and remediation support for cameras located in the street right-of-way.

Information Technology will interpret and maintain this APM.


  1. ^ resolution we passed in 2008 (madison.legistar.com)