QinetiQ demonstrates new privacy-protecting body scanner for crowded places

Size: px
Start display at page:

Download "QinetiQ demonstrates new privacy-protecting body scanner for crowded places"

Transcription

1 QinetiQ demonstrates new privacy-protecting body scanner for crowded places Published on 4 Mar 2017 Most body scanners are designed to work one person at a time, checkpoint style. QinetiQ has developed a scanner that can be used in crowded places without having to slow down or stop moving targets. The body scanner, capable of detecting hidden explosives or weapons on a person, has been demonstrated publicly in the United Kingdom for the first time. The QinetiQ SPO-NX SPO-NX from QinetiQ a company spun out of the UK s Defence Evaluation and Research Agency (DERA) in 2001 can quickly screen large groups of people for concealed weapons or explosives

2 in a passive, non-intrusive way, without needing people to stop or slow down. The system was built into the immersive Securing Crowded Places Demonstrator at UK Security Expo 2016 last November, consisting of three linked zones set in and close to the entrance of the Olympia exhibition centre in London. To safeguard privacy, the system does not generate images of the body beneath the subject s clothing. Instead, it displays a video-style image of the subject with a threat level overlaid when it detects unusual objects concealed on an individual, enabling law enforcement or security personnel to investigate further. The system is entirely passive and does not emit radiation. Upgraded security screening In 2014, the USA s Transport Security Administration (TSA) awarded QinetiQ a 24-month contract to implement the technology. The system an upgrade from the QinetiQ SPO-7R already in use by the US Transportation Security Administration enables the operator to scan crowds and search for anomalies, without the need to disrupt the flow of foot traffic through the area, minimising inconvenience and enabling security screening in locations where it was impractical before. (Click to see larger image) The QinetiQ SPO-NX is designed to operate in relatively large, open spaces such as a train station concourse

3 The law enforcement community has been asking for this solution for many years, says Colin Cameron, Technical Leader, Protective Security Technologies at QinetiQ. Under the supervision of the Transportation Security Administration, some law enforcement teams have been using the technology at special events and on some of the country s busiest mass transit systems, including rail, metro and commuter ferry. Last Thanksgiving holiday, for example, it was deployed as part of enhanced security measures at Washington Union Station in central Washington DC. Passive Millimetre Wave Technology The scanning system uses Passive Millimetre Wave Technology, which exploits part of the electromagnetic spectrum that sits between visible/infrared and radio. It therefore has characteristics of both parts, so for example we can build pseudo-optical cameras in a similar way to infrared cameras, but we can also see through materials and obscurants just like radio waves can penetrate these materials, explains Cameron. So for security applications, we can build sensors that can sense or see through materials and obscurants. In the case of the SPO-NX system, we exploit this approach to find potential suicide bombers or people with large concealed weapons. But with what sort of numbers of people can the system operate and at what rate? Facial recognition systems operating on moving video targets, for example, can be limited to a certain number of faces caught in a single frame of video. At the UK Security Expo we achieved a rate of 380 people an hour, but this was limited by the particular concept of operation and other factors. It takes about four to five seconds to scan one person, so throughput rates could be significantly higher. Operator-controlled scanning Unlike airport scanning systems that mostly require people to pass through a checkpoint arrangement, the SPO-NX is designed to operate in relatively large, open spaces such as a train station concourse, but without necessarily scanning all of the people all of the time. Whether the

4 deployment of such a system in Brussels or Paris could have detected the guns and explosives being carried by the perpetrators of those terrorist attacks is a matter for speculation. "The SPO-NX system is completely passive and privacy-protecting" Depending on the concept of operation at a particular event or location, the operator may or may not wish to scan 100% of people passing the sensor, explains Cameron. There is a trade-off between scanning people that have no restriction placed on them for security versus slowing people or funnelling people through a checkpoint of some type to ensure 100% scanning even if it is a high throughput checkpoint. Different users are likely to use this technology in different ways and random sampling of crowds is certainly one viable approach. To get an idea of the scale and scope of operation, it helps to consider the range limits of the SPO- NX. The standard model has a range of 6m to 15m. A longer-range option will also be available, with a range of up to around 25m with a larger front lens on the sensor. This moves the security perimeter further back, making the earlier detection of a threat possible, explains Cameron, especially where there is a high throughput of people flowing into a contained space. By scanning the crowd before they converge, risk is managed without the need to funnel or slow down the footfall further. At present the scanner is operator-controlled, but part of the roadmap at QinetiQ is the development of automated tracking. Privacy-protected scanning system

5 So, what differentiates this system from other scanning systems available? The SPO-NX system is completely passive and privacy-protecting, says Cameron. It is therefore safe and easy for end users to deploy, because there are no privacy or other regulatory issues to navigate that some competitive systems have. It also allows fully non-cooperative scanning people being scanned do not need to stop or pause their journey and do not need to divest any objects from their pockets or from their person. SPO-NX is a portable system that can be set up by one person in less than five minutes. This makes it a cost-effective asset that can be re-deployed at a new venue or location as required. Alternatively, it can be fixed permanently on a wall or ceiling mount. It is a real-time system, selfcalibrates and can be operated locally at the sensor head or, for example, remotely from a CCTV control room. Author Profile Ron Alalouff

6 Contributing Editor, SourceSecurity.com

7 You may also be interested in... BSIA supports use of full-body scanners in UK airports Full-body scanners help in carrying out important security checksin light of the fullbody scanners recently hitting the headlines aga... Researchers demonstrate how to thwart backscatter X-ray screening Backscatter x-ray is a full-body scanning technology, typically used for passenger screening at airports and to detect plastic bombs and oth...

Security on London Underground

Security on London Underground Security on London Underground HKARMS Hong Kong, 1-2 December 2005 Geoff.dunmore@tube.tfl.gov.uk Robin.hirsch@imperial.ac.uk CoMET Overview London Underground (LUL) has 30+ years of experience Frequent

More information

IP Video For Law Enforcement

IP Video For Law Enforcement IP Video For Law Enforcement IP VIDEO FOR LAW ENFORCEMENT WWW.INDIGOVISION.COM 1 Introduction The security issues facing law enforcement and criminal justice systems are many and complex. A site-wide surveillance

More information

2018 FIFA World Cup Russia integrates safety, security and service

2018 FIFA World Cup Russia integrates safety, security and service 2018 FIFA World Cup Russia integrates safety, security and service Published on 18 Jun 2018 The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign football fans

More information

Airport Security & Safety Thales, Your Trusted Hub Partner

Airport Security & Safety Thales, Your Trusted Hub Partner Airport Security & Safety Thales, Your Trusted Hub Partner www.thalesgroup.com/shield Securing People Ensuring Business Continuity Protecting Assets Thales Credentials Thales is a leading international

More information

OPTIMUM DETECTION WITHOUT COMPROMISE. DRA_0291_Scanna_CapBro_AW.indd 1 21/02/ :16

OPTIMUM DETECTION WITHOUT COMPROMISE.  DRA_0291_Scanna_CapBro_AW.indd 1 21/02/ :16 OPTIMUM DETECTION WITHOUT COMPROMISE DRA_0291_Scanna_CapBro_AW.indd 1 21/02/2014 10:16 WITHOUT COMPROMI E DRA_0291_Scanna_CapBro_AW.indd 2 21/02/2014 10:16 Scanna - leading manufacturers of portable X-ray

More information

Remote Control Thermal Imaging Camera System - 12V - Wireless or Wired Remote - 6" LCD Monitor

Remote Control Thermal Imaging Camera System - 12V - Wireless or Wired Remote - 6 LCD Monitor Remote Control Thermal Imaging Camera System - 12V - Wireless or Wired Remote - 6" LCD Monitor Part #: RCL-336 The Golight remote controlled thermal imaging infrared camera system with 6 inch LCD monitor

More information

Marine Security Overview

Marine Security Overview Marine Security Overview November 2017 Fred Myer Senior Manager, Marine Security & Waterways fred.myer@portofportland.com 503.415.6542 Port of Portland Facilities Three airports, four marine terminals,

More information

Tackling Crime, Protecting Citizens and Assisting First Responders. IN COLLABORATION WITH A Frost & Sullivan Executive Brief

Tackling Crime, Protecting Citizens and Assisting First Responders. IN COLLABORATION WITH A Frost & Sullivan Executive Brief Tackling Crime, Protecting Citizens and Assisting First Responders IN COLLABORATION WITH A Frost & Sullivan Executive Brief Information and Communications Technology 50 Years of Growth, Innovation and

More information

Out of the Fog: Use Case Scenarios. Industry. Smart Cities. Visual Security & Surveillance. Application

Out of the Fog: Use Case Scenarios. Industry. Smart Cities. Visual Security & Surveillance. Application Out of the Fog: Use Case Scenarios Industry Application Smart Cities Visual Security & Surveillance 0 Executive Summary Surveillance and security cameras are being deployed worldwide in record numbers

More information

Defence and Security

Defence and Security Defence and Security 13 HVM Perimeter Security Deployed at Westminster 2 Our Story TSP Projects is an innovative solutions driven company which prides itself on engineering projects and products, tailored

More information

EU Research for Secure Societies

EU Research for Secure Societies EU Research for Secure Societies Paolo Salieri European Commission DG Migration Home Affairs Innovation and Industry for Security Rotterdam October 9 th 20182013 Content EU Security Research "Secure Societies

More information

AGENDA Regular Commission Meeting Port of Portland Headquarters 7200 N.E. Airport Way, 8 th Floor August 13, :30 a.m.

AGENDA Regular Commission Meeting Port of Portland Headquarters 7200 N.E. Airport Way, 8 th Floor August 13, :30 a.m. AGENDA Regular Commission Meeting Port of Portland Headquarters 7200 N.E. Airport Way, 8 th Floor 9:30 a.m. Minutes Approval of Minutes: Regular Commission Meeting July 9, 2014 Executive Director Approval

More information

Standoff Technology Demonstration Program: Developing an Explosive Countermeasure Architecture for Large Public Events (LPEs)

Standoff Technology Demonstration Program: Developing an Explosive Countermeasure Architecture for Large Public Events (LPEs) Standoff Technology Demonstration Program: Developing an Explosive Countermeasure Architecture for Large Public Events (LPEs) Joe Foster Explosives Division Science and Technology Directorate Department

More information

TSA/FTA Security and Emergency Management Action Items for Transit Agencies

TSA/FTA Security and Emergency Management Action Items for Transit Agencies TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:

More information

Security Technology October 31, Overview

Security Technology October 31, Overview Security Technology October 31, 2005 Overview Passenger Screening Current Passenger Screening Technology Improvement Goals Emerging Technologies Screening Current Screening Technology Improvement Goals

More information

Published Privacy Impact Assessments on the Web. ACTION: Notice of Publication of Privacy Impact Assessments (PIA).

Published Privacy Impact Assessments on the Web. ACTION: Notice of Publication of Privacy Impact Assessments (PIA). This document is scheduled to be published in the Federal Register on 03/22/2012 and available online at http://federalregister.gov/a/2012-06847, and on FDsys.gov 9110-9L DEPARTMENT OF HOMELAND SECURITY

More information

PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT

PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT HOUSE TRANSPORTATION & INFRASTRUCTURE SUBCOMMITTEE ON RAILROADS Oversight Hearing on Railroad Security

More information

TSP Technical Solutions in Partnership

TSP Technical Solutions in Partnership TSP Technical Solutions in Partnership Discovering our customers needs and delivering the correct solutions: on budget, on time, first time. w: tspprojects.co.uk t: +44(0)1904 454600 Offices in Birmingham,

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

INTRODUCTION. A main question for ISS: why are there so few prosecutions? Copyright Institute for Security Studies 20 November

INTRODUCTION. A main question for ISS: why are there so few prosecutions? Copyright Institute for Security Studies 20 November INTRODUCTION ISS provides training to law enforcement and security agencies; and mentors explosives and CBRN investigators supported by the International Association for Bomb Technicians and Investigators

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

CHAPTER 15 SECURITY MEASURES FOR A METRO SYSTEM

CHAPTER 15 SECURITY MEASURES FOR A METRO SYSTEM CHAPTER 15 SECURITY MEASURES FOR A METRO SYSTEM 15.1 INTRODUCTION 15.2 NECESSSITY OF SECURITY 15.3 THREE PILLARS OF SECURITY 15.4 PHASES OF SECURITY 15.5 RESPONSIBILITIES AND PARTNERSHIPS 15.6 PROPOSED

More information

FTE Asia. IATA Workshop. Vinoop Goel Regional Director, APCS IATA

FTE Asia. IATA Workshop. Vinoop Goel Regional Director, APCS IATA FTE Asia IATA Workshop Vinoop Goel Regional Director, APCS IATA Passenger satisfaction level at the different touchpoints 100% 80% 60% 40% 20% 0% -20% -40% -60% -80% -100% Satisfied Not Sastisfied Airport

More information

Intelligent Transportation Systems (ITS) for Critical Infrastructure Protection

Intelligent Transportation Systems (ITS) for Critical Infrastructure Protection Intelligent Transportation Systems (ITS) for Critical Infrastructure Protection Presented at the Transportation Research Board January 2002 Annual Meeting Washington DC, USA HAMED BENOUAR Executive Director

More information

DOWNLOAD OR READ : THREAT AND VULNERABILITY MANAGEMENT COMPLETE SELF ASSESSMENT GUIDE PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : THREAT AND VULNERABILITY MANAGEMENT COMPLETE SELF ASSESSMENT GUIDE PDF EBOOK EPUB MOBI DOWNLOAD OR READ : THREAT AND VULNERABILITY MANAGEMENT COMPLETE SELF ASSESSMENT GUIDE PDF EBOOK EPUB MOBI Page 1 Page 2 threat and vulnerability management complete self assessment guide threat and vulnerability

More information

DIMETRA X CORE DATA SHEET DIMETRA X CORE

DIMETRA X CORE DATA SHEET DIMETRA X CORE DIMETRA X CORE FOR GOVERNMENT ORGANISATIONS, PUBLIC SAFETY AGENCIES AND LARGE ENTERPRISES, MOBILE BROADBAND IS ON THE WAY. AND WHILE YOU DON T KNOW WHEN THAT CHANGE IS COMING YOU CAN BE READY FOR IT WITH

More information

Defence, Safety and Security

Defence, Safety and Security Defence, Safety and Security 2 The mission of TNO TNO connects people and knowledge to create innovations that boost the sustainable competitive strength of industry and well-being of society. 3 TNO facts

More information

Thermal and Optical Cameras. By Philip Smerkovitz TeleEye South Africa

Thermal and Optical Cameras. By Philip Smerkovitz TeleEye South Africa Thermal and Optical Cameras By Philip Smerkovitz TeleEye South Africa phil@teleeye.co.za OPTICAL CAMERAS OVERVIEW Traditional CCTV Camera s (IP and Analog, many form factors). Colour and Black and White

More information

Copyright ECSC Group plc 2017 ECSC - UNRESTRICTED

Copyright ECSC Group plc 2017 ECSC - UNRESTRICTED Copyright ECSC Group plc 2017 ECSC - UNRESTRICTED ECSC - UNRESTRICTED Introduction A Web Application Firewall (WAF) is, in our experience, the most important layer of defence against a wide range of attacks

More information

La gestione di Security e Safety con un singolo sistema di supporto alle decisioni Baltimore/Washington Airport - USA

La gestione di Security e Safety con un singolo sistema di supporto alle decisioni Baltimore/Washington Airport - USA La gestione di Security e Safety con un singolo sistema di supporto alle decisioni Baltimore/Washington Airport - USA Filippo Silvestri Sales Manager PS&S Intergraph Italia Security Government & Infrastructure

More information

How to adjust and improve the security level of infrastructure

How to adjust and improve the security level of infrastructure How to adjust and improve the security level of infrastructure Andrea Demadonna UNIFE Luigi Rucher ThalesGroup Andrea Bastianelli ThalesGroup UNIFE Florence, 25 November 2016 About UNIFE UNIFE represents

More information

Authentication Technologies

Authentication Technologies Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys), something

More information

SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE

SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED CONTENTS 3 4 5 6 8 9 10 11 12 14 15 16 INTRODUCTION THREATS RISK MITIGATION REFERENCE ARCHITECTURE

More information

JANUARY 2017 WATER S END. Mobile Mapping. Station to Station. Decided Guidance Indoor application. Implementing BIM. A fixed boundary R E YEARS

JANUARY 2017 WATER S END. Mobile Mapping. Station to Station. Decided Guidance Indoor application. Implementing BIM. A fixed boundary R E YEARS JANUARY 2017 WATER S END Mobile Mapping Station to Station Decided Guidance Indoor application Implementing BIM A fixed boundary R LEB ATING E C 30 YEARS Indoor Mobile Mapping A unique approach to interior

More information

Port Facility Cyber Security

Port Facility Cyber Security International Port Security Program Port Facility Cyber Security Cyber Security Assessment MAR'01 1 Lesson Topics ISPS Code Requirement The Assessment Process ISPS Code Requirements What is the purpose

More information

BPF GLOBAL SECURITY DETECT DEFEND DETER. Company Profile

BPF GLOBAL SECURITY DETECT DEFEND DETER. Company Profile BPF GLOBAL SECURITY Company Profile BPF GLOBAL SECURITY Guarding, patrolling and protecting Australia wide BPF Global Security is a specialist Security and Facilities Management company providing professional

More information

The UK s National Cyber Security Strategy

The UK s National Cyber Security Strategy The UK s National Cyber Security Strategy 2016 2021 Vision for 2021: The UK is secure and resilient to cyber threats, prosperous and confident in the digital world 1 National Cyber Security Strategy 2016

More information

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo. Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third

More information

Aviation Law Enforcement Officer Security Training Kansas City International Airport May 21 & 22, 2014

Aviation Law Enforcement Officer Security Training Kansas City International Airport May 21 & 22, 2014 0900-1200 Welcome and Introductions Wednesday, May 21 Discussion of prerequisite online LEO modules DHS/Transportation Security Administration (TSA) Organization and Operations o Headquarters o Responsibilities

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Security is one of the biggest concerns today. Ever since the advent of the 21 st century, the world has been facing several challenges regarding the

Security is one of the biggest concerns today. Ever since the advent of the 21 st century, the world has been facing several challenges regarding the Security is one of the biggest concerns today. Ever since the advent of the 21 st century, the world has been facing several challenges regarding the security of people, economy, and infrastructure. One

More information

Management. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group,

Management. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group, Port Security Management Second Edition KENNETH CHRISTOPHER CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business Preface

More information

Motorola Mobility Binding Corporate Rules (BCRs)

Motorola Mobility Binding Corporate Rules (BCRs) Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,

More information

BEST SECURITY PRACTICES FOR PROTECTING SURFACE TRANSPORTATION AGAINST TERRORISM AND SERIOUS CRIME. Brian Michael Jenkins Research Associate

BEST SECURITY PRACTICES FOR PROTECTING SURFACE TRANSPORTATION AGAINST TERRORISM AND SERIOUS CRIME. Brian Michael Jenkins Research Associate BEST SECURITY PRACTICES FOR PROTECTING SURFACE TRANSPORTATION AGAINST TERRORISM AND SERIOUS CRIME Brian Michael Jenkins Research Associate Mineta Transportation Institute January 14, 2002 Contemporary

More information

thalesgroup.com Thales in Mexico Factsheet

thalesgroup.com Thales in Mexico Factsheet thalesgroup.com Thales in Mexico Factsheet Thales has been present for over 50 years in Mexico and currently employs 330 persons. Thales has successfully deployed urban security solutions, radio communication

More information

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool Contact Ashley House, Ashley Road London N17 9LZ 0333 234 4288 info@networkiq.co.uk The General Data Privacy Regulation

More information

A Perspective on Public Safety and Critical Infrastructure Protection

A Perspective on Public Safety and Critical Infrastructure Protection A Perspective on Public Safety and Critical Infrastructure Protection Vision and market trends for Homeland Security and role in Critical Infrastructure Protection in response to the new security situation

More information

NASCIO Recognition Award Nomination. Title: Central Issuance of State Drivers Licenses. Category: Digital Government Government to Citizen

NASCIO Recognition Award Nomination. Title: Central Issuance of State Drivers Licenses. Category: Digital Government Government to Citizen NASCIO Recognition Award Nomination Title: Central Issuance of State Drivers Licenses Category: Digital Government Government to Citizen State: North Carolina Executive Summary The NCDMV wanted to reduce

More information

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE INTRODUCTION In line with commercial industry standards, the data center used by EndNote employs a dedicated security team to protect our

More information

INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK

INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK CASE STUDY Application of High-Assurance Network Encryption Sector: Use Case: Solution: Government CCTV security Real-time HD video transmission across Layer

More information

This policy is a public document and has been prepared in light of the National Privacy Principle 5: Openness.

This policy is a public document and has been prepared in light of the National Privacy Principle 5: Openness. Privacy Policy: Wireless Life Pty Ltd trading as ISP Connect Effective: 11 November 2015 Wireless Life Pty Ltd t/as ISP Connect ( ISP Connect ) is committed to protecting the privacy of its customer s

More information

Development of a new security architecture for signalling at DB Netz AG Intelligent Rail Summit 2017

Development of a new security architecture for signalling at DB Netz AG Intelligent Rail Summit 2017 Development of a new security architecture for signalling at DB Netz AG Intelligent Rail Summit 2017 DB Netz AG Christian Schlehuber I.NPS 5 Vienna 2017-11-29 Agenda 1. 2. 3. Introduction New Features

More information

Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002

Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002 Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002 Pace University reserves the right to amend or otherwise revise this document as may be necessary to reflect future changes made

More information

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES CASE STUDY Application of High-Assurance Network Encryption Sector : Use Case: Solution: CCTV security HD video Layer 2 network architecture A Major

More information

Cellular Site Simulator Usage and Privacy

Cellular Site Simulator Usage and Privacy Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and

More information

Express Monitoring 2019

Express Monitoring 2019 Express Monitoring 2019 WHY CHOOSE PT EXPRESS MONITORING PT Express Monitoring provides a quick evaluation of the current signaling network protection level. This service helps to discover critical vulnerabilities

More information

Transportation Security Planning in British Columbia David Morhart, Deputy Solicitor General

Transportation Security Planning in British Columbia David Morhart, Deputy Solicitor General Transportation Security Planning in British Columbia David Morhart, Deputy Solicitor General Transportation Security Conference Calgary, October 2-4, 2 2006 B.C. s Unique Transportation Sector Canada s

More information

Cyber Security Guidelines for Securing Home and Small Office Routers

Cyber Security Guidelines for Securing Home and Small Office Routers Cyber Security Guidelines for Securing Home and Small Office Routers Author: CS Risk Management Section Document Published Date: March 2018 Document History: Version Description Date 1.0 Published V1.0

More information

Meeting on Regulatory Issues Related to the Deployment of Telecommunications Networks in New Property Developments. Agenda:

Meeting on Regulatory Issues Related to the Deployment of Telecommunications Networks in New Property Developments. Agenda: Agenda: Meeting on Regulatory Issues Related to the Deployment of Telecommunications Networks in New Property Developments Introduction by Mr. Alan Horne, General Director, TRA Bahrain Presentation of

More information

Security of Critical Rail Infrastructures: UIC contributions

Security of Critical Rail Infrastructures: UIC contributions Security of Critical Rail Infrastructures: UIC contributions Grigore M. Havârneanu, PhD Research Advisor Fundamental Values Department Security Division UNECE Workshop on Critical Transport Infrastructure

More information

Issue I. Airport Communication Project

Issue I. Airport Communication Project Issue I Airport Communication Project Recommendation 1 Governments are encouraged to continue their financial and technical support to the Airport Communication Project (AIRCOP) of the United Nations Office

More information

Boundary Security. Innovative Planning Solutions. Analysis Planning Design. criterra Technology

Boundary Security. Innovative Planning Solutions. Analysis Planning Design. criterra Technology Boundary Security Analysis Planning Design Innovative Planning Solutions criterra Technology Setting the new standard DEFENSOFT - A Global Leader in Boundary Security Planning Threats, illegal immigration

More information

WG Mobile Entire Truck & Cargo X-Ray Scanning System

WG Mobile Entire Truck & Cargo X-Ray Scanning System Telephone : +44 (01295 756300 Fax : +44 (0)1295 756302 E-Mail : info@wi-ltd.com Website : www.wi-ltd.com WG Mobile Entire Truck & Cargo X-Ray Scanning System The WG Mobile Entire Truck and Cargo X-Ray

More information

TRANSPORTATION SECURITY ADMINISTRATION. Insider Threat Awareness ICAO Global Aviation Security Symposium 2018

TRANSPORTATION SECURITY ADMINISTRATION. Insider Threat Awareness ICAO Global Aviation Security Symposium 2018 TRANSPORTATION SECURITY ADMINISTRATION Insider Threat Awareness ICAO Global Aviation Security Symposium 2018 Overview Discuss the key elements of insider risk and how to mitigate the unique security risks

More information

Creating Safer, More Secure Railways. Briefing Document

Creating Safer, More Secure Railways. Briefing Document Creating Safer, More Secure Railways Briefing Document In real time. OptaSense Monitoring Your Network Key point brief OptaSense Building The Earth s Nervous System OptaSense is a virtual nervous system

More information

Live Broadcast: Video Services from AT&T

Live Broadcast: Video Services from AT&T Delivering your content through the power of the cloud Live Broadcast: Video Services from AT&T Getting your content to your audience is becoming increasingly diverse and complex. Today, people want to

More information

NCIRC Security Tools NIAPC Submission Summary Juniper IDP 200

NCIRC Security Tools NIAPC Submission Summary Juniper IDP 200 NCIRC Security Tools NIAPC Submission Summary Juniper IDP 200 Document Reference: Security Tools Internal NIAPC Submission NIAPC Category: Intrusion Detection & Prevention Date Approved for Submission:

More information

TIBCO Nimbus Service

TIBCO Nimbus Service TIBCO Nimbus TIBCO Software Inc. (NASDAQ: TIBX) is a provider of infrastructure software for companies to use onpremise or as part of cloud computing environments. Whether it's efficient claims or trade

More information

COVERING A WIDE SPECTRUM OF INDUSTRIES

COVERING A WIDE SPECTRUM OF INDUSTRIES MEDIA KIT 2019 for CONNECT WITH US Follow us on facebook www.facebook.com/securitysolutionstoday for news, event updates and more PRINT Published bimonthly since 1992 Amongst leading security trade publications

More information

Progress Report: The MTA Capital Security Program

Progress Report: The MTA Capital Security Program Progress Report: The MTA Capital Security Program Thomas P. DiNapoli New York State Comptroller Kenneth B. Bleiwas Deputy Comptroller Report 6-2009 November 2008 The Metropolitan Transportation Authority

More information

Are we breached? Deloitte's Cyber Threat Hunting

Are we breached? Deloitte's Cyber Threat Hunting Are we breached? Deloitte's Cyber Threat Hunting Brochure / report title goes here Section title goes here Have we been breached? Are we exposed? How do we proactively detect an attack and minimize the

More information

Palm Vein Technology

Palm Vein Technology Technical Paper Presentation On Palm Vein Technology (Security Issue) Hyderabad Institute of Technology And Management ABSTRACT Identity verification has become increasingly important in many areas of

More information

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1. Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change

More information

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

White Paper. Why IDS Can t Adequately Protect Your IoT Devices White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity

More information

Research of Personnel. 9. Interface Manager (Class B - 60 months - Over 15 years experience with degree and professional qualification)

Research of Personnel. 9. Interface Manager (Class B - 60 months - Over 15 years experience with degree and professional qualification) Research of Personnel 9. Interface Manager (Class B - 60 months - Over 15 years experience with degree and professional A manager with experience in the coordination of interfaces in complex large scale

More information

PRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV)

PRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV) PRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV) 1 Principle 2 of the surveillance camera code of practice states that the use of a surveillance camera

More information

Security by Default: Enabling Transformation Through Cyber Resilience

Security by Default: Enabling Transformation Through Cyber Resilience Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,

More information

Advanced Biometric Access Control Training Course # :

Advanced Biometric Access Control Training Course # : Advanced Biometric Access Control Training Course # : 14-4156 Content A. Objectives 5 mins B. History of EAC- 10 mins C. Electronic Access Control in Todays World 20 mins D. Essential Components of Electronic

More information

Overview of Customs-Trade Partnership Against Terrorism (C-TPAT)

Overview of Customs-Trade Partnership Against Terrorism (C-TPAT) Overview of Customs-Trade Partnership Against Terrorism (C-TPAT) Our Mission We are the guardians of our Nation s borders. We are America s frontline. We safeguard the American homeland at and beyond our

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

ADVANCING SECURITY INTELLIGENCE

ADVANCING SECURITY INTELLIGENCE UVIS Under Vehicle Inspection Systems ADVANCING SECURITY INTELLIGENCE www.irdinc.com Intelligent Optical Threat Detection International Road Dynamics Inc. (IRD) is a global leader in the design, development

More information

TransLink Video Surveillance & Audio Recording Privacy Statement

TransLink Video Surveillance & Audio Recording Privacy Statement TransLink Video Surveillance & Audio Recording Privacy Statement Last Update: August 4, 2015 Previous version: July 22, 2008 TransLink is committed to achieving a balance between an individual s right

More information

What is AI Face Search? Benefits over facial recognition systems

What is AI Face Search? Benefits over facial recognition systems What is AI Face Search? Benefits over facial recognition systems Published on 10 Oct 2018 When a child goes missing in a large, crowded mall, we have a panicking mom asking for help from the staff, at

More information

ACI-NA 2018 Risk Management Conference SAFETY Act. Washington, D.C

ACI-NA 2018 Risk Management Conference SAFETY Act.  Washington, D.C ACI-NA 2018 Risk Management Conference SAFETY Act Akmal Ali, J.D. akmal.ali@catalystdc.com Principal, Catalyst Partners 1250 Connecticut Ave. NW www.catalystdc.com Washington, D.C. 20036 Following the

More information

External Supplier Control Obligations. Cyber Security

External Supplier Control Obligations. Cyber Security External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place

More information

Non-Cooperative Biometrics. Patricia Wolfhope Program Manager Resilient Systems Division Science and Technology Directorate

Non-Cooperative Biometrics. Patricia Wolfhope Program Manager Resilient Systems Division Science and Technology Directorate Non-Cooperative Biometrics Patricia Wolfhope Program Manager Resilient Systems Division Science and Technology Directorate patricia.wolfhope@dhs.gov DHS Organization 2 Resilient Systems Division 3 DHS

More information

Tenable.io User Guide. Last Revised: November 03, 2017

Tenable.io User Guide. Last Revised: November 03, 2017 Tenable.io User Guide Last Revised: November 03, 2017 Table of Contents Tenable.io User Guide 1 Getting Started with Tenable.io 10 Tenable.io Workflow 12 System Requirements 15 Scanners and Agents 16 Link

More information

2 nd International Workshop The Security Market Technology Trends: Vision of a large enterprise and the interest on SME s technologies.

2 nd International Workshop The Security Market Technology Trends: Vision of a large enterprise and the interest on SME s technologies. 2 nd International Workshop The Security Market Technology Trends: Vision of a large enterprise and the interest on SME s technologies José Neves 28 th February 2012 Vision of a Large Enterprise What is

More information

The Global Security Threat How are Customs responding

The Global Security Threat How are Customs responding The Global Security Threat How are Customs responding Ana Hinojosa Director-Compliance & Facilitation World Customs Organization Global Security Conference: Punta Cana Resolution 3 Years on Punta Cana

More information

EU Customs Policy for Supply Chain Security & Detection Technology (for CBRNE)

EU Customs Policy for Supply Chain Security & Detection Technology (for CBRNE) EU Customs Policy for Supply Chain Security & Detection Technology (for CBRNE) Manuela Cabral Directorate General for Taxation and Customs Union Head of Risk management and Security, Unit B 2 Brussels,

More information

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations EXCERPT NIST Special Publication 800-171 R1 Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations An Excerpt Listing All: Security Requirement Families & Controls Security

More information

The Golden Triangle Business Improvement District Washington, DC Program: Safe, Secure, Prepared Award Category: Downtown Leadership and Management

The Golden Triangle Business Improvement District Washington, DC Program: Safe, Secure, Prepared Award Category: Downtown Leadership and Management The Golden Triangle Business Improvement District Washington, DC Program: Safe, Secure, Prepared Award Category: Downtown Leadership and Management Encompasses 43 square blocks of prime commercial real

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)

THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT) ASEAN REGIONAL FORUM INTER-SESSIONAL SUPPORT GROUP MEETING ON CONFIDENCE BUILDING MEASURES (ISG on CBMs) Beijing, 20-22 November 2003 THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)

More information

How DDoS Mitigation is about Corporate Social Responsibility

How DDoS Mitigation is about Corporate Social Responsibility How DDoS Mitigation is about Corporate Social Responsibility We see the Network, we monitor the Network and we can protect your business with automatic DDoS mitigation services from our Network core. Regardless

More information

Thailand Initiatives and Challenges in Cyber Terrorism

Thailand Initiatives and Challenges in Cyber Terrorism Thailand Initiatives and Challenges in Cyber Terrorism Agenda Cyber-Terrorism weapons & tactics MICT Cyber Inspector Group IT Laws Development Challenges Cyber-Terrorism weapons & tactics What is Cyber-Terrorism?

More information

Access Control Biometrics User Guide

Access Control Biometrics User Guide Access Control Biometrics User Guide October 2016 For other information please contact: British Security Industry Association t: 0845 389 3889 e: info@bsia.co.uk www.bsia.co.uk Form No. 181 Issue 3 This

More information

Privacy Impact Assessment

Privacy Impact Assessment Automatic Number Plate Recognition (ANPR) Deployments Review Of ANPR infrastructure February 2018 Contents 1. Overview.. 3 2. Identifying the need for a (PIA).. 3 3. Screening Questions.. 4 4. Provisions

More information

Video Surveillance Linear Architecture

Video Surveillance Linear Architecture Video Surveillance Linear Architecture SECURITY FAST, RELIABLE, AND COST EFFECTIVE Violent crime, burglary and theft threaten the safety of our citizens. Public Safety organizations are charged with leading

More information

The University of British Columbia Board of Governors

The University of British Columbia Board of Governors The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:

More information