29 November 2012

Welcome to INFRAGARD



I am honored to be a new member of INFRAGARD and look forward to providing my support and skills to the organization. InfraGard is a partnership between the Federal Bureau of Investigation and the private sector. InfraGard is an association of businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

From drinking water supplies to communications systems, chemical production processes to agricultural resources, Americans depend on a select group of critical infrastructures to sustain our way of life. Any attempts to harm or destroy these resources would directly impact the security of the United States and its citizens.

Most of these systems and services are owned and operated by private industry. Therefore, the protection of our nation’s infrastructure cannot be accomplished by the federal government alone. It requires coordinated action from numerous stakeholders – including government, the private sector, law enforcement, academia and concerned citizens. My INFRAGARD E-Mail is James.E.McDonald@infragard.org.


12 September 2012

9/11 Thoughts on 9/12


 
Never forget!
Driving to work yesterday it hit me that the day's weather felt the same as it did in 2001.  I took pause to remember the horrific and tragic events of 9/11: the thousands of lives lost, the bravery and dedication of first responders and ordinary citizens and the lingering  effects on us all.



05 September 2012

Food for thought, are you happy?



Rhonda Byrne, creator of "The Secret" say's it this way...

"You must be happy now to bring happiness into your life through the law of attraction. It's a simple formula. Happiness attracts happiness. Yet people use so many excuses as to why they can't be happy. They use excuses of debt, excuses of health, excuses of relationships, and excuses of all sorts of things as to why they can't use this simple formula. But the formula is the law.
No matter what the excuse, unless you begin to feel happy despite it, you cannot attract happiness. The law of attraction is saying to you, "Be happy now, and as long as you keep doing that, I will give you unlimited happiness."  -  Rhonda Byrne, 9/3/2012


Thermal Imaging Software Detects Drunks

Thermal imaging software detects drunks - Vision Systems Design Greek researchers have developed software to analyze images from thermal imaging cameras to objectively determine whether a person has consumed an excessive amount of alcohol.

Georgia Koukiou and Vassilis Anastassopoulos of the Electronics Laboratory at the University of Patras (Rio,Greece) have devised two algorithms that can determine whether a person has been drinking alcohol to excess by analyzing infrared thermal images of the person's face.
The first algorithm measures pixel values of specific points on the person's face, which are compared to values in a database of scans of sober and inebriated people. Given that alcohol causes dilation of blood vessels in the surface of the skin, hot spots on the face can be seen in the thermal imaging scans, which can be used to classify whether an individual is drunk or sober.
The second algorithm assesses the thermal differences between various locations on the face. Using the approach, the researchers found that increased thermal illumination is common in the noses of inebriated people whereas their foreheads tend to be cooler. The advantage of the second technique is that no thermal image of the sober person is needed to determine whether the individual has been drinking.
Working together, the researchers say that the two techniques could be used to quickly scan individuals entering public premises or attempting to buy alcohol while inebriated.
The researchers presented the results of their work in the International Journal of Electronic Security and Digital Forensics in a paper entitled "Drunk person identification using thermal infrared images."












02 September 2012

Avigilon has a Superior Platform and Camera Line and Will Also Work with Most Existing Cameras You May Have


Many of you who have worked with me in the last 18 months know that I have been deploying Avigilon’s cameras and platform throughout my customer base.  I was very impressed with their processing and management of high-definition surveillance footage especially how they handle can bandwidth management.  HD can be taxing on your bandwidth—that’s not the case with High-Definition Stream Management™ (HDSM™) by Avigilon.  HDSM™ efficiently manages bandwidth usage and storage, so you can add as many high-definition surveillance cameras to your system as you want without affecting your network.  Additionally, With HDSM™ you can add more megapixels to your surveillance system including cameras from existing analog up to 29 MP to get better coverage and more image detail by putting more pixels on target than the millions of traditional analog and lower IP systems that are already deployed.

ACC was designed with openness in mind. Their video management software allows you to easily integrate with most leading camera and hardware manufactures. You can integrate Avigilon with existing legacy systems, including access control and building management. Their distributed architecture with .NET based API makes it easy. Maintain a single interface and save on training costs. Personally I have had great success with many of my preferred solution platforms.

Most recently I have begun to deploy their new H3 (H.246) line of 1mp – 5mp including their 1.0mp and 2.0mp PTZ products.  I have gotten crystal clear images even in challenging lighting conditions, with wide dynamic range on their upgraded H3 compression platform. The new 3 MP H264 HD camera has greater resolution and improved low light performance as well as simple installation with remote zoom and focus, which has been accepted very well equally by my customers and installation technicians.

If you have been deploying video solutions for more than a few years, you know from time your solution does not always work as designed.  Many times there is finger pointing by the different manufacturers on why this camera doesn’t work with this software and so on. With Avigilon's network video recorders that employ RAID storage when needed and redundant power supply options for maximum reliability so you never have to worry about downtime or finger pointing.   The Avigilon servers are perfect for larger-scale deployments. NVR servers come in a standard rack mount enclosure and can record up to 32MB/s of image data from up to 128 cameras, giving you a scalable solution to meet your growing needs.

No matter if your organization is Retail, Banking, Airport, Transportation, Casino, Healthcare, Education, Public Transit, Critical Infrastructure or any location or facility where an integrated surveillance solution can enhance your security or mitigate risk and liability, Avigilon is a solution you should explore.  Avigilon is a leader in the design, manufacturing and marketing of high definition, network-based video surveillance systems and equipment for the global security market.  Go to www.Avigilon.com for additional information, for a no obligation demonstration or free 30 day trial, give me a call.

24 August 2012

AXIS Communications Q6035-E PTZ Deserves a Look, it’s a Powerful Tool


I spent a day this month at AXIS Communications new Headquarters in Chelmsford, Massachusetts; I had not been there since 2007 when I was working with them in deployment of their new IP dome camera at that time.  I got to see their impressive new facility and get an up-date on current and future products.
I see their “P” and “Q” series cameras as very powerful solutions for many commercial applications.  I had recommended their Q6035 & Q6035-E PTZ cameras to an existing client who needed an immediate 2.0mp PTZ for a government application.  In fact they told me today that they are very satisfied with its quality and performance.

Some key features of the Q6035-E are:
  • HDTV 1080p 25/30 fps as well as 
  • HDTV 720p 50/60 fps
  • Day/night and H.264
  • 20x optical zoom
  • Outdoor-ready with Arctic Temperature Control
  • Active Gatekeeper and tour recording
  • High Power over Ethernet

The Q6035-E is designed for the most demanding applications, the outdoor-ready PTZ dome provides HDTV coverage of large areas, great details when zooming in, and high-speed pan/tilt performance. It is ideal for city and perimeter surveillance, as well as at airports and seaports.  The HDTV 1080p complies with the SMPTE 274M standard regarding a 1920x1080 pixel resolution (twice the resolution of HDTV 720p), full frame rate at 25/30 frames per second, HDTV color fidelity and a 16:9 format. AXIS Q6035-E also supports 50/60 frames per second in HDTV 720p, ideal for applications that require the capture of quick movements and smoother video. Due to the HDTV 1080p resolution, the camera’s 20x optical zoom with autofocus provides extremely detailed zoomed-in views that are comparable to a 4CIF-resolution camera with more than twice the optical zoom. AXIS Q6035-E supports day/night functionality for clear video even in low light conditions, and wide dynamic range for better visibility of objects in dark and light areas of a scene.

The AXIS Q6035-E PTZ Dome Network Camera collected the platinum award in the "IP Video Surveillance Cameras" category at the Govies Government Security Awards at GovSec in April 2012.

If you have not looked at Axis in a while, I suggest you look again.  Go to www.axis.com for more information.


21 July 2012

How to Reduce Risk by Designing and Supporting the Best Physical Security Technology Solution

It is clear that a system that aims to improve physical security and reduce risk must cater for today’s challenges and tomorrow’s risks. As a security professional, I often encounter clients with integrated security technology systems that do not measure up to their expectations, or fail to effectively mitigate common risks, or need to be completely replaced at cost due to poor design.

Today’s Security Technology Systems are very technical and installations need to cater for a variety of conditions. Even though it is common practice, organizations should not be solely dependent on the installers of their current systems when contemplating security investments. The following 10 steps towards implementing a cost-effective integrated security system can serve as indicators for you as client when evaluating a new security system or a system upgrade:

1.  Design for Risks
When designing a security system I look to design one that not only meets the customer’sexpectations and requirements, but more importantly, mitigates their risk profile significantly, it is imperative to design to reduce current and future risk. Security systems designed to mitigate or neutralize a particular set of vulnerabilities at a particular point in time, are basically restricted from the outset. A security system designed without conducting a comprehensive physical security risk assessment is doomed to failure once the customer’s risk profile changes - a costly mistake! Therefore, a thorough risk assessment should be done to give the designer a clear indication of the threats and vulnerabilities to be aware of the consequences on the design.

 2. Security System Design as a Project
A security system design must be managed as a project with agreed project deliverables. As such, the project must be initiated, planned and executed according to a formal project plan (including scope of work, project schedule and cost estimation) to manage time, cost and quality effectively. Throughout the project attention must also be given to customer expectation management.  Deliverables of a successful security system design project include:
  • Technical design drawings
  • Technical design specifications
  • Inter-disciplinary coordination
  • Product selection

3. Design for Scalability
Can the design be expanded upon and is it flexible? There is nothing worse than a fixed design system that cannot be extended or adjusted. A scalable security system design should integrate with other systems, be upgradable and comply with the customer’s strategic security plan and current security policy.

 4. Design for Robustness
Robustness refers to the quality of the system’s design and installation workmanship. Poorly installed electrical wiring, fragile network installation, incorrectly placed equipment mountings, poorly shrouded cameras and the like, may cause system failure and/or interruptions for repairs or maintenance. A well-designed security system incorporates robustness as a core consideration to ensure that the installed system copes well with day-to-day handling demands.

 5. Provide for Redundancy
The system design should provide for component failure (redundancy) to ensure that there are other components that can replace it functionally, either internally or through a layered approach.

 6. Manage the Roles and Responsibilities
Role players include the design team, integrators and system product suppliers. The different responsibilities must be clearly defined and understood, for example: Is the installer qualified to install the system? Are the technicians trained? Is there a client owned agreement between client and the installer that is supported by the supplier?   It is imperative to create a process flow where there is an independently constructed technical specification document underwritten by the supplier and integrator.

7. Planned Maintenance
With regards to maintenance, the following questions should be contemplated: Is the system correctly installed to meet manufacturer standards and supplier warranties? Is there a dedicated system maintenance team that is trained to maintain the system? Are there comprehensive maintenance schedules set out in a client owned maintenance agreement that are checked on a regular basis? Is there a technical specification document available that has been agreed to by all parties prior to the commencement of the installation? Does this document accurately reflect what you as the client are paying for? Was there proper testing and demonstrations conducted before the installation? Has there been proper user expectation management in the pre-installation phase? Is the system tested against the current and future requirements and expectations? Can you confirm that that which you paid for is installed?

8. Service and Support
Today’s customers need 24/7/365 access to service and support.  Monitoring systems live from a central command center is just one part of the needs of a security system.  From time to time customers need either in-line or on-site emergency support from their integrator.  Does your integrator offer 4 hour on-site support by a qualified technician at any time of the day or week?  Your service agreement should include this type of response written into the contract.

9. Parts Inventories
Integrated security platforms are complex and integrators must respond to service calls and be available 24x7x365. Contractors must send a fully trained and qualified if applicable Certified Technician and have replacement parts available in the vehicle at the time of arrival to the eligible entities location.  The fully trained and qualified if applicable Certified Technician will be required to perform repairs or diagnosis the problem.  The fully trained and qualified if applicable Certified Technician must have replacement components available including but not limited to boards, power supplies, cameras, hard drives, electrical components and all other parts required to make the equipment work.

10. Training
Integrators must provide significant training to designated customers personnel during the final system testing and start-up phase of the project.  The amount of training required is dependent on the complexity of the equipment purchased or leased by the customer and the ability of the designated personnel to learn from the training and training material.  The integrator and customer shall mutually agree on the duration as well as the location and schedule of the training.  The integrator’s fully trained and qualified if applicable Certified Technician shall conduct and instruct the training.  Training materials: to include but not limited to books, handouts, software, or customized training videos will be provided by the Contractor and will be given to the customer at no additional cost, as agreed upon by the parties.  Additionally the maintenance agreement should also include the option for some regular annual training.  Many customers have regular employee turnover and some ongoing training should be expected.

In conclusion, when comprehensive foresight is applied to plan and manage tomorrow’s risks with today’s technology, clients can indeed reap the benefits of a proper system design with risk planning included, followed by proper implementation and ongoing support.

Physical Security Talking Points and Fraud

When discussing physical security, there are several important talking points to consider. Here are some key points to include: Risk Assessm...