standards

IP CCTV: What does pixel density mean exactly?

IN DEPTH An IP surveillance system may be used to observe and protect people, objects and people s activity inside and outside the objects, traffic and vehicles, money handling in banks, or games in casino environment. All of these objects of interest may have different clarity when displayed on a workstation screen. The image clarity depends primarily on the camera used, the imaging sensor, its lens and the distance from the object.

There is one parameter in IP CCTV that expresses the image clarity in a simple way with just one parameter: pixel density. The pixel density is usually expressed in pixels per metre (Pix/m), at the object plane, although it can be expressed in pixels per foot. Pixel density in IP CCTV sense should not be confused with the display pixel density quoted by various LCD display manufacturers which defines the screen density, in pixels per inch (PPI). The advantage of expressing object clarity with its pixel density is that it combines the sensor size, pixel count, focal length and distance to the object in just one parameter . When using pixel density metrics all variables are included and makes it universally understandable what details you will get on an operator s workstation screen. When designing a system, or a tender for a system, one can request pixel density for a particular image quality. So, instead of asking for a 6 mm lens for your camera in a particular location, for example (which means nothing without knowing the camera sensor it is used on), it would be much more useful if a particular pixel density is defined for the view. This will then be used to calculate the required lens for the particular camera used and the distance from the object. This will guarantee the clarity of the image (assuming the lens is focused optimally and there is sufficient light, of course).

Pixel density can be used for any object that IP CCTV user might be interested in: face, licence plate, playing card, money and similar. Let us now explore how many pixels per metre are attributed to various objects. One of the most commonly referred pixel densities is for Face Identification. Face Identification in CCTV means sufficient clarity of the image so that one can positively identify who the person on the screen is. According to Australian Standards AS4806.2, for Face Identification in analogue CCTV, we require 100% person s height to fit on the monitor screen display. The details of 100% person s height on a screen have been tested many times and it s been verified that they are sufficient for such a person to be identified. We know that PAL signal is composed of 576 active TV lines, so, according to AS4806.2, a person s height would occupy all of the active lines to make it 100%. Head occupies around 15% of a person s height, which is equivalent to around 86 lines (576 x 0.15 = 86.4), which is the same when converted to pixels (assuming recording is made full TV frame mode, which is equal to two TV fields). If we agree that an average person height is 170 cm, the head would occupy around 25 cm of that.

The pixel density at the object, which is required to make a positive Face Identification according to AS 4806.2, can be calculated to be 86 pixels at 25 cm of head height. Since there are 4 times 25 cm in 1 m of height, this becomes 4 x 86 = 344 pix/m. So, one can say that with pixel density of 344 pix/m at the objects plane it should be possible to positively identify a face, according to AS4806.2. Face Identification as per AS4806.2 Some other standards may require different values, and one such (newer) standard is the IEC 62676-4, which defines 250 pix/m to be sufficient (i.e. suggests that with slightly lesser pixel density than the AS standards one should be able to identify a person). Clearly, this number is not fixed in concrete, and it will depend on the observing ability of the operator, as well as other parameters (lens quality, illumination, compression artefacts, etc ), but the key is to understand that such a pixel density can be calculated for any type of camera, irrespective if that is SD, HD, 4k or any other format. The next image quality down, as defined by the standards is for Face Recognition. The details of Face Recognition image should be sufficient to recognise the gender of a person, what he/she is wearing and possibly make an assertion of who that person might be, if picked from a bunch of people that have already been identified somewhere else (e.g. passport or drivers licence photo).

This is basically an image with half the pixel density to the face identification, which according to AS4806.2 should be around 172 pix/m, while IEC62676-4 suggests 125 pix/m. Similarly, pixel density can be defined for vehicle licence plates visual recognition (not software automatic LPR). In the AS 4806.2, this is defined as 5% characters height on a display screen, which is around 30 TV lines (pixels) (to be very accurate 576 x 0.05 = 28.8). If we assume that a typical Australian number plate has characters of around 90 mm in height, than this equates to 11 x 30 pixels = 330 pix/m. The number 11 is obtained from dividing 1000 mm (1 m) with 90 mm. One may say that for visual licence plates recognition similar pixel density is required as for face identification. Licence plate recognition as per AS4806.2 When money and playing cards are observed in banks or casinos, many practical tests have shown that at least 50 pixels are required across the notes or cards longer side in order to positively identify the values. Standard playing cards dimensions are B8 according to ISO216 standard, which is 62 mm x 88 mm. So, we need the 88 mm card length to be covered with at least 50 pixels for proper identification.

This means around 550 pix/m (1000 mm / 88 mm = 11 => 50 pix x 11 = 550 pix/m) should be sufficient for playing cards. We may require slightly better pixel density for identifying money, since notes size is typically larger than playing cards, so if one takes the Face Inspection pixels density of 1000 pix/m, it should attain pretty good identification, although as it can be seen from the real life example below, even 770 pix/m might be sufficient. Playing cards and money shown above with 770 pix/m As it can be concluded from the above examples, the pixel density can be defined for any object and any camera, large or small. The beauty of the pixel density parameter is, as said at the very beginning, that includes all parameters influencing the clarity of the observed objects. For this reason, ViDi Labs has developed the ViDiLabs iOS calc (search the iTunes App Store under ViDiLabs calc ), a unique tool for the surveillance industry, which can also be used in cinematography, photography and any other imaging application dealing with objects details. So the following table can be used as a rough guide for various pixel densities. Free Download: The key to mitigating cybersecurity risks Exploiting IoT technology without creating cybersecurity vulnerabilities is one of the defining challenges in today s security landscape.

This report will help you to see why third parties should adhere to secure by design principles and why the necessary convergence of IT and security departments demands a holistic approach .

Download now

FCO adopts new standard for private security companies

FCO adopts new standard for private security companies The Foreign and Commonwealth Office has issued a ministerial statement that the British Government intends to adopt PSC1 as the standard for private security companies “working on land in complex and high risk environments overseas”. The Parliamentary Under-Secretary of State for Foreign and Commonwealth Affairs, Mark Simmonds, has emphasised the Government s aim to raise the global standards of private security companies. Here’s the ministerial statement in full… “The Government aims to raise the global standards of private security companies (PSCs) working in complex and high risk environments overseas.

To this end, we have been working closely with interested partners, including industry and civil society, to establish a voluntary, independently audited and internationally recognised regulatory system that is practicable, effective and affordable. “Certification to professional standards is the next step towards effective voluntary regulation. First, the Government endorsed the Montreux Document in 2008 in which States commit to observe existing international legal obligations relevant to the operations of PSCs in areas of armed conflict. “Second, in 2010 an International Code of Conduct for Private Security Providers (ICOC) was created. This provides a set of principles to guide companies.

The ICOC has now been signed by over 500 PSCs, around a third of them British. We have reviewed options on setting new professional standards to make the Code effective. We now intend to issue an HMG publication specifying that ASIS PSC 1-2012 is the applicable standard for UK-based PSCs working in complex environments on land overseas. “I will place a copy of the publication in the libraries of both Houses.

Companies, independent auditors and the UK Accreditation Service (UKAS) will then take the further steps to enable auditing against these standards to begin. “The ICOC mandated the development of auditable standards to ensure that signatory companies are implementing their commitments under the Code. In response to this requirement, the international security trade association ASIS was funded by the Department of Defense to develop the standard PSC1 for the regulation of private security companies operating on land in complex environments overseas. This standard was drafted in a multinational and multi-stakeholder forum in which UK Government, UK industry and UK civil society fully participated.

It was published in March 2012 as an approved American National Standard and is the only standard currently available for companies operating in this field. “PSCs seeking certification in the UK to this new standard will have to be audited by independent third party auditors accredited by UKAS. Our trade association partners, the Security in Complex Environments Group, will – in consultation with Government – develop guidance to help British PSCs meet the requirements of the new standards. “Our ambition is to have a single, internationally agreed standard and we therefore welcome the fact that PSC1 was recently submitted to the International Standards Organisation (ISO) to be considered for adoption as an international standard for PSCs working in complex environments. This process may take some time.

We will review the need for a separate HMG publication of this standard once the ISO process has been completed. “We are also working with other States, industry and civil society internationally to ensure that there should be globally recognised standards and that UK companies are not unfairly disadvantaged by raising their standards. We expect that the ICOC governing board, when established, will advise that certification to the PSC 1 standard by suitably accredited independent auditors will meet the Code s requirements for PSCs to have auditable professional standards. “We are still consulting with industry and civil society partners on what additional steps PSCs might need to take to obtain full certification by the ICOC that they are meeting the Code s principles, but I can confirm that there will be no need for PSCs to go through duplicate auditing procedures to become certified. “The ICOC was drafted with land-based PSCs in mind. However, since 2010 there has been a rapid rise in the number of PSCs working on anti-piracy operations at sea.

Although many of the principles relating to PSCs working on land and at sea are similar, there are important legal and practical differences. The Government is therefore also contributing to an international drafting process under the ISO for an equivalent professional standard for PSCs working in the maritime sector. “A draft maritime standard was introduced at the International Maritime Organisation in late November. If and when this standard is adopted, UKAS will start the process of accrediting suitably qualified independent third party auditors to certify UK-based maritime PSCs under it. “Clarity on the standards against which PSCs should be audited is an important step forward in the drive to raise standards in this industry through voluntary action, but independently audited.

It is also a practical illustration of the Government s commitment to Human Rights and to working with business and civil society to find effective ways to implement our commitments even in the most challenging environments.” Response from the SCEG and ASIS International The Security in Complex Environments Group (SCEG), a special interest group within ADS, welcomes the announcement by the FCO that it is to publish ANSI/ASIS PSC1 as the applicable standard for UK-based land private security companies working in complex environments overseas, and that the UK Accreditation Service will take steps to accredit Certification Bodies to enable them to audit PSCs against this standard. A statement reads: “SCEG members have contributed to the development of this important standard and recommended it to the British Government. The standard gives full effect to the International Code of Conduct for Private Security Companies which they have signed, and they are keen to seek formal certification against that standard responding to the Government s declared aim to have a single internationally agreed standard.” The statement continues: “PSC1 was recently submitted to the International Standards Organisation (ISO) to be considered for adoption as an international standard for private security companies working in complex environments.

SCEG works in partnership with the British Government to improve standards across the private security industry.” Mike Hurst – the vice-chairman of ASIS International’s UK Chapter with responsibility for strategy – commented: “Writing standards is a key part of what ASIS does and we are all delighted that HMG recognises the quality of this work.”

NIST Updates, Expands Glossary of Security Terms | Systems – Sytech

nist 6 NIST Updates, Expands Glossary of Security TermsThe National Institute of Standards and Technology is updating its Glossary of Key Information Security terms, and has released a draft of the latest revision1 of Interagency Report 7298.

The glossary contains more than 200 pages of definitions, from Access (the ability to make use of any information system resource) to Zone of Control (the three-dimensional space surrounding equipment that processes classified and/or sensitive information).

It defines the responsibilities of the chief information officer and describes the Security Content Automation Protocol (SCAP) as well as its specifications and languages.

NIST Updates, Expands Glossary of Security Terms | DFI News2.

References

  1. ^ draft of the latest revision (csrc.nist.gov)
  2. ^ NIST Updates, Expands Glossary of Security Terms | DFI News (www.dfinews.com)

RIM's BlackBerry 10 gets security clearance from US govt | Firstpost

Research In Motion Ltd said on Thursday it has won a much-coveted US government security clearance for its yet-to-be launched platform for BlackBerry 10 devices that are expected to hit store shelves in the first quarter of 2013.

The company said its BlackBerry 10 platform has received the FIPS 140-2 certification, which would allow government agencies to deploy the devices, along with the new enterprise management platform to run the devices, as soon as the new smartphones are launched.

RIM, a one-time pioneer in the smartphone industry, has seen its fortunes fade in recent years as nimbler rivals such as Apple Inc and Samsung Electronics Co have taken the game away from RIM with faster and snazzier devices.

RIM s fate now depends almost entirely on the long-awaited line of so-called BB 10 devices.

Last month, RIM said it had begun carrier tests on the new line of devices, which the company hopes will help it regain some of the market share it has ceded to the likes of Apple s iPhone and a slew of other devices that run on Google Inc s Android operating system.

The Waterloo, Ontario-based company said this is the first time BlackBerry products have been FIPS certified ahead of launch.

BlackBerry10_AP

BlackBerry CEO Thorsten Heins.

AP

Achieving FIPS certification for an entirely new platform in a very short period of time, and before launch, is quite remarkable, RIM s head of security certifications, David MacFarlane, said in a statement.

FIPS certification, which is given by the National Institute of Standards and Technology, is one of the minimum criteria that is required for products used by US government agencies and regulated industries that collect, store, transfer, share and disseminate sensitive information.

The stamp of approval gives confidence to security conscious organisations including some of RIM s top clients like US and Canadian government agencies that the data stored on smartphones running BlackBerry 10 can be properly secured and encrypted.

RIM promises that BlackBerry 10 will deliver a better user experience, along with the ability to separately manage both one s corporate and personal data on the same device.

Reuters

More Exclusive Offers


ISO 12931: raising the standards for authentication solutions

ISO 12931: raising the standards for authentication solutions The International Standards Organisation has adopted a new standard which should bring significant security benefits to the hologram industry, as Ian Lancaster explains. The International Standards Organisation (ISO) has adopted a new standard which should bring significant security benefits to the hologram industry. ISO 12931 covers ‘Performance criteria for authentication solutions used to combat counterfeiting of material goods’ and is as far as we are aware the first international standard to provide guidance to rights holders on how they can protect their products from counterfeits.

The introduction to ISO 12931 explains the growing problem of counterfeit products (or material goods , which includes manufactured finished goods, original equipment components and goods from nature), and states that: The authentication element provides a specific and more reliable method of determining if the item is genuine or a counterfeit good . It goes on: This international standard sets out the performance criteria for purpose-built authentication solutions. These authentication solutions are designed to provide reliable evidence, making it easier to assess whether material goods are authentic or counterfeit.

The scope of ISO 2931 is also described carefully as… intended to guide organisations in the determination of the categories of authentication elements they need to combat those risks, and the criteria for selection of authentication elements that provide those categories, having undertaken a counterfeiting risk analysis. Definitions play a central role For the security holography industry, a crucial element of ISO 12931 centres on the definitions (a required part of any ISO standard).

Hologram or holography is not specifically used in the standard, which carefully does not promote any particular technology or features. However, the standard identifies the use of only two types of authentication solutions: overt and covert. An overt authentication element and a covert authentication element are defined respectively as: (an) authentication element which is detectable and verifiable by one or more of the human senses without resource to a tool (other than everyday tools which correct imperfect human senses, such as spectacles or hearing aids) (an) authentication element which is hidden from the human senses until the use of a tool by an informed person reveals it to their senses or else allows automated interpretation of the element.

Dispensing with the idea of a ‘forensic solution’ ISO 12931 dispenses with the notion of a forensic solution , a phrase that’s often heard in discussion of authentication solutions. Instead, it describes forensic analysis, and defines this as: “Scientific methodology for authenticating material goods by confirming an authentication element or an intrinsic attribute through the use of specialised equipment by a skilled expert with special knowledge.” Thus a hologram, for example, meets the definition of an overt authentication element and, depending on the optical design, may also contain parts that meet the definition of a covert authentication element. Forensic analysis can also be applied to a hologram by microscopically examining the diffraction pattern to ascertain that it matches that of a genuine hologram.

This concept of overt and covert authentication elements is carried through to a discussion on the audience for information about the elements adopted on a material good. The general audience will receive knowledge through public media advertisements, websites, marketing materials whereas the restricted audience comprises people that need to know about the specifics of the authentication solution and how to examine it. An authentication tool will be required to examine a covert solution, and thus information about what to look for with this tool will be made available only to the restricted audience.

In describing how an overt solution is examined, ISO 12931 states that: Ideally, the inspector will have a genuine authentication element as a reference comparison, going on to say: Overt authentication elements must be difficult to copy accurately so that their absence or their imperfections will alert examiners to the fact that a material good may not be genuine.’ ISO 12931 also discusses the relationship between authentication solutions and track and trace solutions. It states simply that: Track and Trace technology when used alone is not considered to be an authentication solution. Covert authentication elements, it points out, require a tool for examination, and that tool may be standalone and reveal something in the authentication element to human senses (or may require a network connection).

Risk analysis: the key These discussions of the categories of authentication solutions are important, but they’re really a preamble to the key section of ISO 12931 which explains to authentication users how to assess the performance criteria they require of their authentication solutions. It recommends that a user undertakes a risk analysis before assessing which category or categories of authentication solution provide the functionality to meet the risks thus defined. The characteristics to be considered are not only those related to the obvious authentication functionality, but also physical characteristics such as size and thickness, environmental durability and so on issues which are often overlooked by users (and which can prove awkward for suppliers, as the US Bureau of Engraving and Printing s crumple test has shown in which holograms did not pass scruitny when first proposed for use on US dollar bills).

Authentication aspects that should be considered include tamper resistance and attack resistance: points which may seem obvious to suppliers but which users often need reminding they need to consider. Having addressed risk analysis and then the selection and implementation of authentication solutions, ISO 12931 guides users through an effectiveness assessment. ISO 12931 takes a lifecycle approach to authentication, recognising that it may be important to authenticate a material good long after its first sale, but also proposing that users need to remain active in assessing the effectiveness of the solution they’ve adopted.

Users cannot sit back, complacent in the knowledge that they have an authentication solution, but need to carry out regular effectiveness assessments. According to ISO 12931: Effectiveness assessment is a means to evaluate that a solution is complying with the established standards and if the solution is providing a measurable result.’ ISO 12931 also follows up on its recommendations to users in that it shows a risk analysis and authentication solution selection process, as well as including selection criteria tables in Annexes to the main standard. Benefits for the holography industry Before the publication of ISO 12931, brand owners and other rights holders were dependent on authentication solutions providers to guide them through their requirements for the protection of their material goods (or, in some few cases, they have been provided with guidance from their Trade Association).

Dependence on suppliers for guidance has been, understandably, uncomfortable for many rights holders so they have preferred to do nothing and turn a blind eye to their losses to counterfeits. For the first time, they now have an objective guide to how to proceed. This in itself should encourage more rights holders to take seriously the counterfeit problem and how they can protect against it.

The success of management practice standards such as ISO 9000 shows how beneficial an international standard can be in providing common principles and practices. Ultimately, ISO 12931 should encourage the use of authentication solutions. More particularly, it encourages the use of overt and covert solutions, functional categories that can be combined in one hologram.

It’s now up to secure hologram suppliers to build compliance with ISO 12931 into their marketing materials and training.

Ian Lancaster is general secretary of the International Hologram Manufacturers Association *Ian Lancaster was a member of the ISO Committee that produced ISO 12931, while the IHMA was involved from an early stage in developing the document

The Maritime Security Consultant: ‘Maritime security firms want regulation’

Info4Security Web Exclusive The Maritime Security Consultant: ‘Maritime security firms want regulation’ In the first instalment of a new blog on Info4Security, Philip Cable examines why regulation of the maritime security sector is so vitally important. Over the years, private maritime security firms have received unfair and unjustified criticism. Indeed, in certain circles they’ve come to be seen as trigger happy mercenaries.

It’s an image that’s not easy to shake off. Even the UN has taken pot-shots at the industry and its lack of regulation, saying that without any regulation there’s a genuine risk that the sector’s exploitation by unscrupulous and criminal actors will eventually come to represent a threat to regional peace and security. Amid the indecision of national Governments and UN agencies about how best to proceed, it’s the industry itself that’s leading the way in calling for – and assisting with – a defined regulatory structure.

MAST is playing a leading role in tandem with agencies like SAMI (the Security Association for the Maritime Industry) and the ISO (International Standards Organisation) to formulate internationally recognised standards for private maritime security companies. For its part, the ISO has been given a mandate by the International Maritime Organisation (IMO) to complete this task. Ongoing discussions are aimed at producing a transparent framework that will allow maritime security companies to identify all the applicable legislation and demonstrate their compliance before, during and after operations.

Demand for specialist security increasing The demand for specialist maritime security is increasing as trade and the exploration for oil and gas and other minerals continues to extend into areas where there are security concerns. The reason shipping companies have turned to private security companies for help is to protect their crews and cargo from the actions of pirates. We must never forget the human cost of these attacks.

Last year alone, 35 sailors lost their lives as a result of attacks by pirates. That’s 35 too many. The international community is rightly concerned about the risks associated with private security deploying in high risk areas, such as off the coast of Somalia.

One of the interesting aspects of the Somalia issue is the way private security companies have, by and large, been kept out of the country. However, at a time when formal naval resources are limited it’s clear that there might be useful roles for the right sort of private security company, retained by the right sort of State or UN agency, in maintaining neutral, non-political law and order on the high seas. Identifying the competent and responsible companies How can Governments, UN agencies, the shipping industry and others identify the competent, responsible and transparent security companies?

The UK has taken the lead in this area: MAST is an active member of the UK s Security in Complex Environments Group (SCEG) (a not-for profit partnership between the UK s FCO and the UK private security industry) which has been the pioneer of detailed proposals and drafts for what the IMO, through the auspices of ISO, intends to become the international standard for private maritime security companies and this as early as the close of 2012. We hope that, in due course, this will help to facilitate the difficult decisions that the UK Government, the Royal Navy and the shipping industry will face, from time to time, about the use of private security in exceptional circumstances. There are clear signals that the shipping industry, which recently introduced a standard contract for use between ship owners and PSCs (BIMCO s Guardcon contract), is also fully behind this drive for an international standard for maritime PSCs.

If more is required of us then we and other leaders in this industry are prepared to listen. Standards: not a panacea The standards that MAST and the private maritime security industry are striving towards will provide a starting point for shipping concerns to make informed decisions about which companies they choose to trust, but they’re not a panacea. In truth, piracy can only be addressed through concerted and co-ordinated action led by navies, shipping companies and the insurance industry and using private security teams on board ships.

There must also be a consistent approach to maritime security across all shipping. Without this, pirates know that not all vessels are adequately protected and they will continue to exploit this unco-ordinated approach, in turn causing huge cost to global trade and immense human misery. Philip Cable is CEO of MAST (Maritime Asset Security and Training) About MAST Maritime Asset Security and Training (MAST) is a leading security organisation that provides specialist security services for the maritime community.

With client satisfaction and a robust approach to standards at its core, MAST has a global infrastructure with offices in Malta, the United Kingdom, Germany, Djibouti, Oman, Sri Lanka, Nigeria and China. MAST specialises in providing innovative solutions for a wide range of security problems and offers a range of services including armed protection for commercial ships, contingency response and hijack negotiation, maritime safety and security training, crisis management, explosives ordnance disposal capabilityand a specialist Mega -Yacht security system design and installation service. The organisation is committed to the regulation of the security industry and has been at the forefront of working with Governments and industry bodies to achieve this.

MAST s business culture and cautious yet thorough approach to the provision of security leads to a clear ethos of professionalism, integrity and respect

Bosch conforms to Euro EMC standards two years early

Bosch conforms to Euro EMC standards two years early Bosch Security Systems has announced that all of its intrusion products now conform with the new European standard EN 50130-4:2011, two years before it becomes mandatory. EN 50130-4:2011 is the eletromagnetic compatibility (EMC) standard hat applies to alarm systems intended for use in and around buildings in commercial, residential and industrial environments. EMC means that the products will continue to operate correctly in the presence of electromagnetic interference (EMI).

The range of radiated field frequencies that a device must now be immune to in order to be certified under this standard has been extended. The previous generation of the standard required immunity from frequencies in the range of 80MHz to 2.0 GHz. This has been increased to cover frequencies up to 2.7 GHz.

The standard is designed to counter the increase in electromagnetic interference in buildings caused by devices that operate in this new, higher frequency band, such as wifi and mobile phones.

Manufacturers of intrusion products in Europe have until summer 2014 to ensure their products are compliant with the standard.

Manned Guarding | Security Guard | Mobile Patrols – Octavian Security

Octavian Security is truly revolutionising the manned guarding security industry. Renowned as the business that is passionate about excellence in customer service, it has almost single-handedly increased operational standards – and decreased tolerance of the poor performance that remains common within the security sector. This has involved a much more rigorous vetting of staff and the delivery of first class courses from its own industry accredited in-house training division. The result of these measures has been peace of mind for Octavian’s clients, in an industry plagued with ineffective security provision and mistrust of guards, and has led to dramatically improved customer service.

Octavian works with many of the UK’s largest and highest profile organisations. From Government agencies, broadcasters and logistics giants to construction firms, major retailers and shopping centres, Octavian’s highly-trained Security Officers are safeguarding clients’ operations and interests.

Octavian is one of the fastest growing manned security firms – listed 27th in the 2008/9 Sunday Times Virgin Fast Track 100 League Table.

Octavian operates in all sectors and has specialisms including retail, financial and professional services, logistics, distribution and warehousing, ports, construction, automotive, utilities, events (sports and leisure), governmental/local authority work and outside broadcast security1.

Octavian Security s services include:

  • Access/egress control duties
  • Inputting access control data
  • Vehicle checks (interior/exterior)
  • Employee and all other types of searches
  • Monitoring and recording contractor activities
  • Meeting, greeting and announcing visitors
  • Signing staff in/out
  • Manned guarding
  • Mobile patrols
  • External patrol of site buildings and perimeters
  • Remote and onsite CCTV monitoring and surveillance
  • Monitoring of all types of alarm systems
  • Key holding and alarm response
  • Courier deliveries (accepting, recording and announcing)
  • Courier despatches
  • Fire exit monitoring
  • Fault reporting
  • Car park management
  • X-ray and metal detection equipment operators at ports and airports
  • Executive protection
  • Police partnership patrols

References

  1. ^ Octavian | Outside Broadcast Security (www.octaviangr.com)

Private Investigator – UK Private Investigators Crown Intelligence …

We offer a discreet and comprehensive Private Investigator service in London and most areas within the UK. Most of our Private Investigators are drawn from police backgrounds with the experience to obtain accurate results in total confidence. Our Detectives can deal with cases of all sizes, from small to large and for individuals and also business clients.

Our extensive and long term experience allows us to cover a very wide range of services. We can supply effective solutions to almost any problem or requirement. When you call us, you can discuss your case directly with a specalist Private Investigator who will assist you with available options and costs.

Deciding to use an Investigation Agency is often done during difficult or demanding times, and we believe your experience with us should be helpful, secure and above all reliable.

Talk to us..

Talk to us and we will advise on the best answers to your needs. All details discussed with us will be in complete confidence. We will listen to your requirements and give you helpful advice.

Established with a physical presence

We are based near Victoria in SW central London. Our offices are at the centre of our nationwide operation of qualified Investigators. This gives you the security of dealing with a physical location in London. We welcome appointments at our offices or at your own location. We are also happy to service our clients by phone or email.

Know the facts..

It may be that you need a Private Investigator to find the truth about something or someone. We guarantee that we will help and support you, and complete our work carefully and in confidence.

We all have the right to know the truth about something that affects us. We can reveal the facts and secure the evidence allowing you to make an informed decision. We offer…..

Professional standards The highest possible professional standards.
Private Investigators with Police backgrounds Ex Police officers.
Total discretion Total discretion – maintaining your privacy.
Specialist Investigator Services Very comprehensive range of investigation services.
Specialist Detective Agency Advice Advice given on the best and most effective options.
Private Investigators UK and worldwide Investigators UK and worldwide.
Professional and reliable Detective Services Professional and reliable results.

Our Private investigators1 can carry out unfaithful partner investigations2 and surveillance3. We can investigate a persons movements and communications. We investigate insurance claims, work and employee issues, bugging, and background checks4. We also investigate evidence for criminal defence5 and appeals.

We can search for hidden assets6 in the UK and offshore. Investigate financial details, fraud and internet scams7, counterfeit goods and false companies and money laundering.

Our Private Investigators and Detectives8 can carry out forensic investigations9 including DNA testing and matching, body fluid and also semen testing. We offer finger printing and matching, handwriting and computer forensics. We have detectives, and offshore personnel who can investigate worldwide. In addition we can trace and find missing persons10, family and birth parents. We also provide effective counter intelligence and counter surveillance11 services; these include bug sweeping12, together with risk assessment and protection.

investigation success..

We pride ourselves on having the experience to accept most investigations from straightforward cases to highly complex investigations. We have often achieved excellent results even when clients have thought the case to be too difficult or impossible. This success is achieved by the experience and background of our Private Investigators and the attention given to detail and client support.

Contacting us..

We invite you to call us on 020 7138 3118 and talk to a private investigator or visit the contact page13 to send us an email.

References

  1. ^ Private investigators (www.private-investigators.uk.com)
  2. ^ partner investigations (www.private-investigators.uk.com)
  3. ^ surveillance (www.private-investigators.uk.com)
  4. ^ background checks (www.private-investigators.uk.com)
  5. ^ criminal defence (www.private-investigators.uk.com)
  6. ^ hidden assets (www.private-investigators.uk.com)
  7. ^ fraud and internet scams (www.private-investigators.uk.com)
  8. ^ Detectives (www.private-investigators.uk.com)
  9. ^ forensic investigations (www.private-investigators.uk.com)
  10. ^ find missing persons (www.private-investigators.uk.com)
  11. ^ counter surveillance (www.private-investigators.uk.com)
  12. ^ bug sweeping (www.private-investigators.uk.com)
  13. ^ contact page (www.private-investigators.uk.com)

Corps Security and Assa Abloy: unlocking the potential of remote door opening

Corps Security and Assa Abloy: unlocking the potential of remote door opening An agreement between Corps Security and Assa Abloy will give customers of the Corps Monitoring Centre (CMC) access to the latter’s state-of-the-art door opening products. The Corps CMC provides alarm receiving and surveillance system monitoring services to customers in a diverse range of market sectors on an independent basis, or as part of an integrated service. Eric Roberts, Corps Security s CMC business development director, explained: “Our Glasgow-based facility exemplifies our commitment to excellence in everything we do.

To add to its credentials we have also attained National Security Inspectorate (NSI) Gold accreditation to go with our existing BS 8418 and ISO 9001:2008 certifications.” Headquartered in Willenhall, West Midlands, Assa Abloy UK plays host to a wide variety of leading brands including, Assa,Union, Adams Rite, Trimec and Abloy. Eryl Jones, Assa Abloy Security Solutions’ commercial manager, commented: “The Assa Abloy Group is represented in all the major regions of the world with over 36,000 employees. We offer a complete range of high quality door opening systems more than any other organisation on the market including locks, cylinders, electromechanical products, remote monitoring solutions and accessories.

Our products are proven to help our customers meet strict security standards such as PAS 24 and LPS1175 which addresses critical issues relating to total doorset security.” Features of the CLIQ system In the rapidly growing electromechanical security sector, Assa Abloy enjoys “unrivalled status” in access control as a result of its pioneering technology such as the CLIQ system. The keys used with the CLIQ system feature a unique electronic ID that ensures a greatly enhanced level of security, power and control. CLIQ keys can operate both mechanical and electronic cylinders in the same master key system, in turn making it one of the most secure locking systems in the world.

Embedded in the head of the key is a battery and microcircuit that stores an encrypted digital ID. When the key is placed in the lock, the circuit in the key communicates with the cylinder chip to authenticate it and allow the user to gain entry. The chips in the key and cylinder log activity to track anyone whose key opens the door or is denied access.

Recent addition of CLIQ Remote The CLIQ solution has recently been enhanced with the introduction of CLIQ REMOTE. CLIQ Remote makes it possible to give one person regardless of location, anywhere in the world remote access to a building. In addition, for greater security an option is available to determine when and where the key will work.

A major benefit to the user is the vastly reduced administrative work involved with managing keys for employees, consultants and temporary staff. A copied or lost key is an immediate security threat, and replacing lock cylinders and keys combined is a time consuming and expensive process. CLIQ remote make those changes quick and easy, without changing keys or cylinders.

By using Assa Abloy s Web Manager software, operatives in the CMC can programme keys, obtain an overview of the locking system, check authorisations and identify shared keys by connecting a programming key to a PC. Entry to specific building areas The CMC operators can also grant employees and visitors entry to specific areas of a building, and allow restricted access for specified time periods to certain individuals (such as third party service engineers). The CMC is currently promoting Assa Abloy Security Solution s products to its customers and third party installers as its preferred door opening technology partner.

Corps Security s Eric Roberts concluded: “In the past we have experienced problems unlocking doors remotely due to badly fitted or inferior locks. This can cause major problems, and often necessitates a site visit to rectify the situation. The quality of Assa Abloy Security Solutions’ products gives us and our customers valuable peace of mind, and I m delighted that we have entered into this formidable partnership.

I’m fully confident it will generate significant amounts of new business for us both.”