2000ft drone-busting invisible fence erected by Guernsey prison

Anti-drone tech Les Nicolles prison on Guernsey in the Channel Islands has become the first in the world to use an invisible shield to foil drones programmed to smuggle in drugs, weapons and mobile phones. The fence s technology works by jamming electronic transmissions that return the drone to its sender preventing its delivery of contraband. Sensors act as disruptors to jam the drone by blocking radio frequencies.

Sky Fence has been developed by Nottingham-based firm Drone Defence and Eclipse Digital Solutions with installation costs upwards of 100,000. Drone Defence founder and CEO Richard Gill said: It disrupts the control network between the flyer and the drone. The drone then activates return to home mode and it will then fly back to the position where it had signal with its flyer. Someone described it as the final piece in a prison s security puzzle. I think it could have a significant worldwide impact. Gill said the technology neither hacks nor damages the drones. The technology can combat the increasing number of unmanned aerial vehicles that are being dispatched to jails to drop off illicit goods that are fuelling growing violence and disorder among inmates. Les Nicolles prison is a mixed category jail with 139 inmates. Prison governor David Matthews said: This is the first time this technology has been used in any prison anywhere in the world.

I would like to see it adopted in other UK prisons because it has become a significant problem there. Drones can carry weapons, contraband, mobile phones and drugs. This is about prevention. The Drone Zone one again returns to IFSEC International in June for its 2017 edition. Brought to you in partnership with The UK Drone Show, the Drone Zone will feature demonstrations of drone and anti-drone technology from Yuneec, Dedrone, Hitachi and Magos. The Drone Zone will form part of Borders & Infrastructure Expo, a brand new show within IFSEC dedicated to the protection of borders and critical national infrastructure. Get your free badge for IFSEC 2017 now. Join other high-end security professionals at the launch of Borders & Infrastructure Expo In conjunction with Europe s most renowned security event , IFSEC International, B&I is addressing your critical needs for large scale security projects affecting national security, integrated systems, border protection and much more. You will have access to test the latest security innovations in; Physical & perimeter, Barriers & bollards, Command & control, Emergency response, Cyber solutions, Drones & UAVs, Transport security and much more.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

London 2012, the ATP Tour and the Kings of Leon incident: Fire safety at the O2 Arena

Paul Andrews, project manager at AEG Europe, has played a major role in the fire safety operation at the O2 Arena in London. Below he gives a detailed account of the fire protection/safety systems and fire-engineered strategy at the erstwhile Millennium Dome, including measures implemented for concerts, the 2012 Olympic Games and the ATP tennis tour. IFSEC Global: Hi, Paul.

Please tell us a bit about your role at the O2 Paul Andrews: I ve been working at The O2 since its opening in 2007. For the first four years I worked in the in the building services team. My job was to maintain the fire alarm system and coordinate the maintenance of the other fire protection systems across the venue. Unfortunately the venue had a serious fire incident in December of 2010. The Kings of Leon were due to play a number of concerts, but on the first morning, whilst the production team were loading-in the stage, a tour bus caught fire in the arena s service yard. The fire was extinguished by the London Fire Brigade. Their swift actions, coupled with the efforts on the in-house teams, meant that the incident only lasted for a matter of hours on that fateful day. Essentially the band still could have played that night, but the mutual decision was for the show not to take place. Off of the back of that and due to other restructuring taking place, the business created an enhanced role in the health and safety team, the role of fire safety manager, and since 2011 I ve been in that role for AEG.

Both the building services and health and safety teams are part of the facilities department. The O2 concourse (photo: Liam Daly under CC 2.0) CW: What was the thinking behind this restructuring? PA: I don t know how well you know the changes in fire legislation over the last 10 years but, basically, in 2005 there was a change in UK fire legislation. The Regulatory Reform (Fire Safety) Order 2005 (RRO) was created and enforced in 2006. For premises like The O 2, prior to 2006 the London Fire Brigade would carry out an annual audit and issue a fire certificate to say everything s OK . With the introduction of the new legislation this responsibility was placed back on the businesses and the employees (competent people) who work at the premises. The implementation of the new legislation roughly coincided with the opening The O2. IG: It s quite an unusual structure you have to protect PA: The building formerly the Millennium Dome initially opened in 2000 for the Millennium Experience. It was only open for a year to celebrate the coming of the third millennium, but even today there are lots of bits about the building, infrastructure-wise, that we ve inherited from the legacy of The Dome .

The building sits on the Greenwich Peninsula at the edge of South East London. Its western edge is passed by the Prime Meridian, which is the birthplace of time. The O2 has 12 iconic yellow support masts that jut out from the fabric to represent the 12 months of the year and the 12 hours on a clock face The building is constructed out of tensioned fabric over a skeleton of steel. Of the many large domes worldwide which share this construction scheme, the Millennium Dome is one of the largest. Symbolism was key to the design of the dome and there are many symbolic pieces of the structure. It has 12 iconic yellow support masts that jut out from the fabric that represent the 12 months of the year and the 12 hours on a clock face. This is an attempt to pay homage to the role of Greenwich mean time and the prime meridian. The circular dome shape also has a diameter of 365 metres to represent the days of the year. The centre of the dome is a full 52 metres tall to represent the 52 weeks in each year.

Prince s 2007 performance at the O2 IG: Can you give us an overview of fire safety tech and procedures in what is such an unusual building? PA: From a fire safety point of view, due to the bespoke design and construction, compliance with normal building regulations wasn t exactly possible. So we have what s known as a fire-engineered strategy. It s a unique combination of comprehensive fire protection and detection systems, plus a strict set of fire safety management rules that have to be adhered to. The venue has a number of perspex shutters that raise automatically when the fire alarm goes off and essentially they re our final fire exits The biggest challenge in terms of fire is because we are an enclosed environment, if we were to have a fire, how do we vent the smoke from The O2? One of the legacy items from the dome design is right on top of the roof. We have a number of smoke vents which open when the fire alarm is activated to assist with smoke ventilation. In each one of the structural yellow support masts there s a large smoke extract fan. These systems assist with the problem of venting the smoke out of the space if there is an incident.

Around the perimeter of the building we also have some unique assets from the history of the dome. The venue has a number of perspex shutters that raise automatically when the fire alarm goes off and essentially they re our final fire exits. So they re just some of the main quirky things that we ve inherited from the old design of the Millennium Dome and that we have to maintain even now almost 20 years later. Inside the arena we ve got pretty much the full complement of fire safety arrangements: a comprehensive, networked fire alarm system throughout the whole venue with a PAVA, audible warning system. There are certain areas of the fire alarm system where we ve got an aspirating type of smoke detection, called VESDAs very early smoke detection apparatus. That includes inside the auditorium itself at high level. We ve got a couple of areas inside the arena that have sprinkler coverage. One of those areas is the loading bay where we had the fire; the second area is the American Express invites lounge. All kitchen canopies at the venue incorporate a UV filtration system, which use UVC rays to break down grease particles in extracted cooking smoke/air Around the perimeter of The O2 Arena is The Avenue , which is where all the bars and restaurants are still inside the building!.

All of the buildings there have sprinklers throughout. Due to the higher risks associated with these premises higher fire risk because of the kitchens and cooking activities sprinklers are included to mitigate that risk. As you can imagine we ve got fire extinguishers in all areas of the site. All the restaurants units on The Avenue and the catering kitchens in the arena have a special arrangement in terms of extraction, which is quite unique as well. All of the kitchen canopies at the venue incorporate a UV filtration system, which use UVC rays to break down the grease particles in extracted cooking smoke/air. IG: Is that common in restaurants in general? PA: In some, but not others, but again, it s one of the stipulations of our fire engineering strategy at the O2. All 27 plus restaurants and bars have to follow our fire safety requirements inside The O2. Prospective tenants may or may not have done it in their other restaurant franchises across the country but they had to comply here.

Entrance to Cineworld (photo: Zeisterre under CC by SA-3.0) IG: What about firefighter access and evacuation routes? PA: There are four main firefighting staircases in the arena. During an evacuation spectators would use one of these four protected staircases each, which also consist of a firefighting lift. The O2 also has its own private fire hydrant water main onsite. In terms of fire brigade access, having the luxury of those perspex shutters at regular frequencies around the perimeter means they can access where need be in the event of an emergency. They re big enough to get a fire engine inside. So there s a clear route round the arena itself and around the perimeter of the venue. So they can utilise those fire hydrants and everything else. IG: Have any particular events posed the biggest challenges?

PA: The biggest event that I ve been lucky to part of to date was the Olympic Games in 2012, The O2 (was called the North Greenwich Arena for the duration of the Olympics) hosted the gymnastics and the finals of the basketball and the Paralympic basketball events as well. For some of larger events like the Olympics, organisers can erect temporary structures to support the main event in the arena. In previous years, for the Brit Awards for example- they will build a marquee structure for an after show party. Similarly for the world finals of the ATP tennis tour; hospitality structures & practice tennis courts and more are housed in temporary structures. Each and every time, as per the requirements of our fire engineered strategy, a fire detection system will installed throughout all of those marquees. We work with an external fire design consultant to scrutinise all of the construction materials that are used to make sure that fire size/fire loading limits of the existing smoke ventilation systems are complied with and not exceeded. It is very common for special effects to be part of the production for an incoming arena event. Whether its pyrotechnics, lasers, water effects all is demonstrated to the licensing team at Greenwich council. CW: Do you have to work closely with LFB?

PA: Yes. Because of our fire engineered strategy and these rules and requirements that we have to enforce, the LFB have also enforced what s known as an alterations notice on the venue. That s not a bad thing, like the HSE handing out an improvement or enforcement notice. An alterations notice means that if any physical or non-physical change to the existing fire precautions is planned, we have to notify the London Fire Brigade of how we plan to manage the risk. We may also notify our insurers, Greenwich building control and the Greenwich licensing team. Visit FIREX International for cutting-edge solutions, essential knowledge and the ability to grow your business by getting direct access to the whole fire safety industry. It is the perfect place to get your product in front of thousands of buyers, across a multitude of featured areas.

From the brand new Drone Zone, the ARC Village, ASFP Passive Protection Zone, the Engineers of Tomorrow competition and more, it s all under one roof so you ll never miss a beat.

Click here to register your place now to join us at London Excel on 20 22 June

Why tethered drones are a boon for surveillance of crowded public events

Why Tethered Drones Are A Boon For Surveillance Of Crowded Public Events

At the end of June last year the Federal Aviation Administration (FAA) implemented significant changes to the regulations and rules governing use in the US of unmanned aircraft systems (UAS), more commonly referred to as drones . This regulatory review was of particular interest to Oncam as we explore the opportunities to provide 360-degree cameras to drone manufacturers so they can offer additional security measures during large events. Commercial drone operations, such as the use of tethered drones, promote safety and security by allowing aerial coverage of high-attendance events such as sporting events, marathons, protests, parades and festivals.

Tethered drones use a small wire extending up to 500 feet that connects the drone to the ground. Tethered drones versus wireless drones The advantages of a tethered drone as opposed to a wireless drone is a constant connection to a power source, providing no limitations on the length of time the drone can stay in the air. This type of tethering technology can also provide greater bandwidth and, with that, much better video quality compared to wireless drones. Previous regulations burdened commercial drone users with strict restrictions on use and operability. Section 333 of the FAA Modernization and Reform Act of 2012 required special authority to operate UAS. New rules introduced in June under Part 107 enable the use of commercial drones without having to apply for a 333 exemption, thus streamlining the waiver process. Under Part 107, requirements for commercial drone flights are greatly reduced. Operators must now pass an aeronautical knowledge test and a background check to earn a remote pilot certificate. Although the FAA is demonstrating increased flexibility than traditional safety rules, with an influx of waiver requests, the agency will be forced to explore and define safety issues.

Many in the industry still criticize the lack of changes to the beyond-visual-line-of-sight drone regulations, voicing their discontent for ineffective restrictions on long-distance usage. The FAA remains concerned by risks posed by weather conditions, airspace and manned aircrafts, and location of people. With the drone industry booming, the future is sure to see further changes in regulations as the authorities scramble to keep pace with technological changes. Many security manufacturers are embracing advancements in drone surveillance capabilities as a means to grow situational awareness and safety for events, offering safe city applications for police departments and security personnel. IFSEC International is launching Borders and Infrastructure Expo, which will include the Drone Zone, for its 2017 edition.

Find out more about this new show within a show dedicated to the protection of borders and critical national infrastructure Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

TalkTalk and Post Office broadband routers breached by Mirai malware: security experts respond

TalkTalk And Post Office Broadband Routers Breached By Mirai Malware: Security Experts Respond

Thousands of broadband customers have lost access to the internet after TalkTalk and Post Office routers were breached by hackers. The coordinated attack, which began on Sunday and has affected about 100,000 Post Office customers, involves a version of the notorious Mirai worm a type of malware that is spread via hijacked computers, which causes damage to equipment powered by Linux-based operating systems. The broadband providers are yet to identify a culprit.

Germany s Deutsche Telekom was also affected, with 900,000 customers affected. A selection of cyber security experts delivered their verdict on the latest high profile hack. Stephen Gates, chief research intelligence analyst at NSFOCUS The upsurge of commercial, industrial, and municipal IoT-based attacks and outages was part of my predictions for 2017. It appears the world will not wait for January 1, and the weaponisation of these technologies has arrived ahead of schedule. No longer can service providers continue to operate their vulnerable networks in this fashion. Hackers apparently have them in their cross hairs, and the damage they can cause to their scantily secured infrastructures will continue to be a major pain in the backside for their customers; who are now likely looking for other options. Mike Ahmadi, global director critical systems security at Synopsys Massively scalable attacks are the current trend in cybersecurity, and this should raise concern among all users and organisations. We have multiple issue to deal with here. One is the fact that most product vendors and organisations deploying the products remain unaware of the level of vulnerabilities in their systems.

The other issue is for those that are aware, strategies to mitigate against large, scalable attacks are either rudimentary or non-existent. Simply put, organisations are not good at preparing for what they do not know about. The amount of risk out there is staggering, but there are ways for stakeholders to raise their awareness and come up with more effective pro-active strategies. Gavin Millard, EMEA Technical Director of Tenable Network Security With the battle for control of poorly configured IoT devices and routers being played out by multiple cybercriminal gangs at the moment, having default credentials on any device connected to the internet has a high probability of ending up with some derivative of Mirai installed. Any device that requires an inbound connection from the internet should have a strong, non default, password rather than one of the list Mirai is currently targeting. If you do have something with default credentials, reboot it and change the passwords immediately. Adam Brown, manager, security solutions at Synopsys Now that the source code for Mirai is out there this will most likely not be the last that we will see if this type of attack. Modern routers with 1+GHz CPU s make a great platform for a Botnet army and being located at the end of a high speed broadband connection make a great base for executing a DDoS attack. This outage may just be the first symptom of these infections.

Suppliers of hardware like this must ensure they govern their supply chain. Andy Green, senior technical specialist at Varonis The lessons that should be learned from these ongoing Mirai attacks is just how vulnerable we were as a result of our own IT laziness. Sure, we can excuse harried consumers for treating their home routers and IoT gadgetry like toasters and other kitchen appliances just plug it in and forget about it. So what excuse do professional IT types have for this rookie-level behaviour? Not much! Unfortunately, default-itis still plagues large organisations. As recently as 2014, the Verizon DBIR specifically noted that for POS-based attacks, the hackers typically scanned for public ports and then guessed for weak passwords on the PoS server or device either ones that were never changed or were created for convenience, admin1234 . This is exactly the technique used in the Mirai botnet attack against the IoT cameras. Even if hackers use other methods to get inside a corporate network phishing, most likely they can still take advantage of internal enterprise software in which defaults accounts were never changed.

For those organisations who think that the Mirai botnet incident has nothing to do with them, or have to convince their board of this, here are two points to consider.

1. The lesson of the Mirai botnet attack is that the perimeter will always have leaks. For argument s sake, even if you overlook phishing scenarios, there will continue to be vulnerabilities and holes in routers, network devices, and other core infrastructure that allow hackers to get inside.

2. Human nature tells us that IT will also continue to experience default-itis. Enterprise software is complicated. IT is often under pressure to quickly get apps and systems to work. As a result, default accounts and weak passwords that were set for reasons of convenience thinking that users will change the passwords later will always be an issue for organisations. You have to plan for attackers breaching the first line of defences, and therefore have in place security controls to monitor and detect intruders. In a way, we should be thankful for the script kiddies who launched the Mirai botnet DDoS attack: it s a great lesson for showing that companies should be looking inward, not at the perimeter, in planning their data security and risk mitigation programs.

Lisa Baergen, director at NuData Security The unfortunate reality is that organisations that have been victimised by a breach can find themselves getting targeted over and over as cybercriminals seek to exploit previous known weaknesses or test systems to find new vulnerabilities.

Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

Perimeter security: the big picture

Perimeter Security: The Big Picture

So often an afterthought compared to access control or video surveillance, the perimeter security market is poised for dramatic growth as governments prioritise counter-terror and reducing illegal immigration. Here is an overview of the perimeter security/perimeter protection markets. What does perimeter security mean?

Physical perimeter security can be defined as systems and technologies that protect people and assets within a facility and its grounds by blocking unauthorised physical intrusions across the perimeter. Myriad defence layers should be equipped to protect the boundary and should comprise: the holistic site and property perimeter, eg the fence line; the inner territory perimeter, eg specific buildings or key infrastructure; the building fa ade perimeter, ie the external building shell; and the internal perimeter, eg internal space where restricted access is necessary. Each layer should help delay, deter and detect intrusion. Over the past decade, advances in technology have helped increase the scope of perimeter security systems. Historically used to prevent and detect intrusions in military facilities, critical infrastructures, and other high-risk sites, perimeter security solutions are now being used in areas such as commercial and residential sites, retail spaces, transportation sites, and many other urban and remote locations. Perimeter security can include video detection, intrusion detection, access control, security fencing and gates, and barriers and bollards. The type of systems and technologies deployed will depend on the likely intrusion risks, which can range from vandalism and protests from activists, to criminal theft, espionage and, at worst, terrorism. A robust perimeter barrier aimed at impeding intruders should combine a fence or wall with security lighting and surveillance, eg a perimeter intruder detection system (PIDS) and CCTV. Toppings, including barbed wire and spikes, act as a deterrent to climbing a fence or wall by increasing the height of the barrier, as well as providing the opportunity for a would-be intruder to become entangled or injured.

A neglected market no more While there has been huge investment in CCTV and electronic security systems, physical perimeter security hasn t always received the same attention. This is beginning to change, however, as perimeter security systems become embedded into integrated security strategies. Market drivers include: the growing terrorist threat; increased awareness of issues around illegal immigration; technological trends in video surveillance; the need to reduce manpower costs; investment in smart city infrastructure; and more stringent government regulations and industry standards for perimeter security. PAS 68 and hostile vehicle mitigation PAS 68, for example, is a Publicly Available Specification for vehicle security barriers, which the UK government developed in partnership with perimeter security manufacturers. It has become the UK s standard and the security industry s benchmark for hostile vehicle mitigation (HVM) equipment. It is also the specification against which perimeter security equipment is tested as part of research to prevent vehicle-borne improvised explosive device (VBIED) attacks. If a product meets the PAS 68 standard, end users can be confident that it is high quality and will operate as expected. Major players in perimeter protection The global perimeter security market is estimated to reach US$21 billion by 2020, growing at 8% CAGR during 2015-2021, according to market research analysts Research and Markets. North America is currently the most advanced region for perimeter security technology, however, Latin America, the Middle East and Africa are expected to emerge as high-growth markets over the next five years.

Key players include Anixter International, Axis Communications, Fiber Sensys, FLIR Systems, Honeywell International, RBtec Perimeter Security Systems, Senstar, Southwest Microwave, Tyco, United Technologies Corporation, and Xtralis, among others. Multi-layered perimeter protection With growing perimeter security threats, demand for multi-layered perimeter protection has increased. Technologies growing in popularity include next-generation fence-mounted sensors, infrared, and integrated fibre-optic PIDS. Thermal cameras and video analytics are also popular solutions, while intrusion detection technologies such as microwave, seismic sensors and radar are also experiencing high growth. Indeed, radar has the advantage of working in most lighting and weather conditions, while it can also survey large areas that might otherwise require numerous cameras to achieve the same detection coverage. Nevertheless, video surveillance cameras are being deployed for perimeter security at a high rate and are an integral part of most perimeter security strategies. Designing a perimeter security solution When considering how to design a perimeter security solution, it is worth considering factors such as: visibility what perimeter protection is visible and what it looks like, and if any critical assets are visible and could be hidden away; local information and statistics local crime rates, first-responder locations, etc; landscape and environmental conditions terrain, weather, lighting, etc; power requirements eg for certain barrier systems. How you respond to a detected intrusion should also be considered how well trained and equipped are your responders? The future of perimeter security While perimeter security has an obvious deterrent purpose, its increased use in urban areas, and in commercial, retail and public applications, has focused attention on marking territories in a non-aggressive way through landscaping and other softer design elements.

In the case of vehicle barriers, for example, users should consider their materials and finishes, and whether they are low maintenance and are suitably sensitive to the surrounding environment. Such is the importance of design that some perimeter security products, such as security planters, are being manufactured with an aesthetic purpose in mind. The high cost of perimeter security systems can be a constraining factor in market adoption, however, costs are falling, particularly in respect of thermal cameras. Perimeter intrusion detection systems are also susceptible to false alarms caused by animals, weather, etc. Improving reliability is therefore a key challenge for the sector, and will also be important in ensuring that perimeter security and business continuity strategies are aligned and don t conflict with one another. In the future, perimeter security could become part of a connected technology system, which is able to profile specific locations, and match the skills and competencies of manpower required for each area. When disruptions occur in different parts of an organisation, this connected technology will be able to analyse and identify information that could point to a serious threat, and raise alarms when business safeguards and operational processes are compromised. Other innovations include aerial surveillance, via balloons and drones. The latter, in particular, may become popular if manufacturers can extend their battery life and if analytic capabilities can be integrated.

Robotics could also be part of future perimeter protection strategies. Indeed, there are already devices that can travel along monorails and patrol perimeters, as well as respond to suspected intrusions. Self-driving security patrol vehicles with CCTV, sensor and audio/visual capabilities may also be on the horizon soon.

Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

AMG set to unveil TotemCam360 solution

AMG set to unveil TotemCam360 solution A five megapixel re-deployable 360 degree integrated camera system with built-in recording solution has been designed by AMG to operate over 3G/WiFi for remote area and perimeter detection. The all-new TotemCam360 solution will debut at Intersec 2013, which runs from 15-17 January in Dubai, UAE. Sara Bullock, the sales and marketing director at AMG Group, said: We have developed the TotemCam360 solution to address remote CCTV applications where there is no cabling infrastructure available or in place.” The 360 degree capability allows viewing/monitoring of the full scene from a single camera.

The unit comes with an on-board 1TB DVR and a connection for a removable USB 2.0 hard disk. “The advanced aerial technology we have applied allows the TotemCam360 to record almost indefinitely and stream the video 24/7 back to a Video Alarm Centre via 3G, 802.11b/g Wi-Fi or Broadband/LAN/5Ghz options,” explained Bullock. “The applicability of the solution is incredibly flexible and versatile as it covers large or small areas in both day and night-time conditions. We’ve also designed the solution to be easy and straightforward to install. The result is rapid set-up with minimal project planning needed for implementation.

AMG asserts that this solution is particularly well suited to help prevent remote asset damage and can act as a deterrent for anti-social behavior.

The TotemCam360 solution provides multiple electronic Pan-Tilt-Zoom (ePTZ) and panoramic video streams which may be recorded or viewed live.

TotemCam360: the key points to note Rapidly deployable, remote self-contained camera and recording solution 360 degree panoramic view with no blind-spots, five megapixel sensor 24/7 monitoring at low resolution 3G/WiFi Full resolution recording locally Powered from mains/battery/generator IP66 rated Heat shield available for harsh environments Easy to set up (remote downloading/viewing of video) Camera is also configurable remotely so customers can save a lot of manpower as on-site visits may be minimised Ideal for rural areas where infrastructure doesn’t exist or is minimal Minimal cost compared to traditional wired CCTV installations

Man Tries to Steal Christmas Tree, Shoots at Security Guard | KTXL …


Christmas tree lot targeted by the man.


Early morning Saturday morning, West Sacramento Police responded to the Russian Baptist Church at 1000 Sacramento Avenue for a reported shooting and attempted robbery.

A security guard at that location said he had confronted a white man with long hair who was attempting to steal a Christmas tree from the lot. The man made threats to the security guard and fired several shots at him before fleeing from the scene on foot.

The security guard was not hit. West Sac Police established a perimeter, but were unable to locate the suspect.

Police were able to track down the suspect by 2 p.m.

The West Sacramento Police Department Patrol and Investigations Division arrested 20-year-old West Sacramento resident Brian Brinsfield.

Brinsfield was arrested for several felony charges, including the shooting at 1000 Sacramento Ave.

He will be booked in the Yolo County Jail.

Meghan Flohr filed this report.

Shots fired at security guard | Oklahoma City News …

OKLAHOMA CITY Police responded to a call of shots fired early Tuesday morning.

The crime scene is the 6400 block of NW 10th Street near the Terrace Apartments.

According to police a security guard was patrolling the area when four suspects fired shots at him.

Each shot missed.

The victim was able to give police the suspect descriptions.

Police spotted the suspects a short distance away and tried to make a stop when the suspects took off on foot.

Police set up a perimeter near NW 10th and Chisholm and spent the next hour searching.

Authorities arrested three of the four suspects.

The fourth suspect was taken to the hospital after being bitten by a K9 unit helping with the search.

This is the same area where police were investigating a homicide last week.

A security guard does something useful in Harrison | The RiotACT

A 39-year-old man, of no fixed abode, will face the ACT Magistrates Court this morning after being arrested while attempting to steal from a construction site in Harrison.

Around 4am yesterday (Sunday, October 28), CCTV cameras detected the man entering the secure construction site on Flemington Road, and a security guard was dispatched to the site. On arrival, the security guard saw the man attempting to steal from a vending machine. The man hit the security guard s arm with a torch, before being detained by the security guard and his dog.

A Gungahlin General Duties patrol attended the construction site and arrested the man. The man had a key to a Holden Cruz which was reported stolen to police on Wednesday (October 24), and was parked next to the construction site.

The man was taken to the ACT Watch House, where he was charged with stealing a motor vehicle, burglary, attempt theft and common assault.

Acting Superintendent of North District Peter Davis said this arrest demonstrated the effectiveness of security measures to prevent theft from construction sites.

We encourage construction site managers to properly secure or remove tools and valuable equipment after hours and on weekends, and where possible, install secure perimeter fencing and CCTV cameras, to help their construction site from being targeted. The security measures enforced by this construction site led to the arrest of this man by police, Acting Superintendent Davis said.

The man will face the ACT Magistrates Court today (Monday, October 29), where bail will be opposed by police.

Courtesy ACT Policing1


  1. ^ Courtesy ACT Policing (

Exclusive interview with Harmony Alliance founders

Exclusive interview with Harmony Alliance founders The founding members of the Harmony Alliance The profile of today s security end user is often not always that of a security manager many are from an IT background or facilities management, and have had security added to their job description. The complex array of security products available, each with their own claims of being best in breed can be daunting. The Harmony Alliance, launched at last week’s Global Securit Summit, is trying to change this: Four companies Texecom, TDSI, GJD and Elmdene have formed the alliance to provide an integrated security solution that doesn t compromise on using the best products.

Elmdene International specialises in efficient power supplies, sounders and magnetic contacts; TDSi manufacture integrated access control systems; GJD offers exterior detection equipment alongside CCTV and lighting controllers and Texecom manufacture intruder alarm products. By combining their efforts, the companies are able to market the Harmony Alliance to end users who are looking for one solution made up of the most appropriate products in each area. Harmony Alliance members provides perimeter security, power management, alarm systems, access control and CCTV.

In some instances end users would have to compromise on certain parts of their systems in order to have a solution that was fully interoperable. In these cases the customers reliance on systems integrators was huge. At the launch of the Alliance at last week s Global Security Summit, spokesman Clym Brown said: At this stage of the Harmony Alliance we are very much in listening mode.

Where end users have specific project requirements we really want to understand their needs and at a wider level their thoughts on how they would like to work with us. We spoke to the managing directors of the founder members to ask why they joined the Harmony Alliance. Jim Ludwig, managing director at Texecom I’ve always been intrigued about finding ways for businesses to add value where a collective contribution could equal more than the sum of the individual parts.

End users selecting security equipment today have to weigh up the balance between one-stop-shop providers and a system comprised from many vendors. In some ways, a one-stop-shop offers the reassurance that there is only one person to blame if something goes wrong but at the expense of sacrificing system performance for those areas where the vendor may not be world-class John Davies, managing director, TDSi Just over a year ago, TDSi was conducting a review of its marketing strategy and hit on the idea of what we termed reciprocal marketing. This was a simple concept to market ourselves to the customer base of complementary technology companies and have these companies market themselves to our base.

Each company would endorse the other to their respective bases. I looked at companies I knew that had complimentary and non-competing offerings. I knew the senior teams at Elmdene, GJD and Texecom well and we started to chat about the idea.

This led on to doing some joint exhibitions in SE Asia in 2011 and then discussions later in the year. We liked the results we were getting from our few joint activities and decided to formalise things by establishing Harmony. Ian Moore, managing director, Elmdene International Limited “There is a preconceived idea that working with a larger single player takes away issues and concerns.

The reality is that you will often find a performance gap in key areas because it is nigh on impossible for one big company to be the best at what they do in every single discipline.

Ultimately, the Harmony Alliance provides an opportunity to come up with a broader based modular approach, tailored to a projects requirements, with the reassurance that everything should work together.” Mark Tibbenham, managing director, GJD Being part of a ‘best in breed team’ gives us a stronger voice within the industry.

Alliance members are able to integrate their complementary technologies and expertise to offer innovative security solutions and at the same time have peace of mind that each part of the system will work together seamlessly.