QinetiQ demonstrates new privacy-protecting body scanner for crowded places
|
|
- Todd Cameron
- 5 years ago
- Views:
Transcription
1 QinetiQ demonstrates new privacy-protecting body scanner for crowded places Published on 4 Mar 2017 Most body scanners are designed to work one person at a time, checkpoint style. QinetiQ has developed a scanner that can be used in crowded places without having to slow down or stop moving targets. The body scanner, capable of detecting hidden explosives or weapons on a person, has been demonstrated publicly in the United Kingdom for the first time. The QinetiQ SPO-NX SPO-NX from QinetiQ a company spun out of the UK s Defence Evaluation and Research Agency (DERA) in 2001 can quickly screen large groups of people for concealed weapons or explosives
2 in a passive, non-intrusive way, without needing people to stop or slow down. The system was built into the immersive Securing Crowded Places Demonstrator at UK Security Expo 2016 last November, consisting of three linked zones set in and close to the entrance of the Olympia exhibition centre in London. To safeguard privacy, the system does not generate images of the body beneath the subject s clothing. Instead, it displays a video-style image of the subject with a threat level overlaid when it detects unusual objects concealed on an individual, enabling law enforcement or security personnel to investigate further. The system is entirely passive and does not emit radiation. Upgraded security screening In 2014, the USA s Transport Security Administration (TSA) awarded QinetiQ a 24-month contract to implement the technology. The system an upgrade from the QinetiQ SPO-7R already in use by the US Transportation Security Administration enables the operator to scan crowds and search for anomalies, without the need to disrupt the flow of foot traffic through the area, minimising inconvenience and enabling security screening in locations where it was impractical before. (Click to see larger image) The QinetiQ SPO-NX is designed to operate in relatively large, open spaces such as a train station concourse
3 The law enforcement community has been asking for this solution for many years, says Colin Cameron, Technical Leader, Protective Security Technologies at QinetiQ. Under the supervision of the Transportation Security Administration, some law enforcement teams have been using the technology at special events and on some of the country s busiest mass transit systems, including rail, metro and commuter ferry. Last Thanksgiving holiday, for example, it was deployed as part of enhanced security measures at Washington Union Station in central Washington DC. Passive Millimetre Wave Technology The scanning system uses Passive Millimetre Wave Technology, which exploits part of the electromagnetic spectrum that sits between visible/infrared and radio. It therefore has characteristics of both parts, so for example we can build pseudo-optical cameras in a similar way to infrared cameras, but we can also see through materials and obscurants just like radio waves can penetrate these materials, explains Cameron. So for security applications, we can build sensors that can sense or see through materials and obscurants. In the case of the SPO-NX system, we exploit this approach to find potential suicide bombers or people with large concealed weapons. But with what sort of numbers of people can the system operate and at what rate? Facial recognition systems operating on moving video targets, for example, can be limited to a certain number of faces caught in a single frame of video. At the UK Security Expo we achieved a rate of 380 people an hour, but this was limited by the particular concept of operation and other factors. It takes about four to five seconds to scan one person, so throughput rates could be significantly higher. Operator-controlled scanning Unlike airport scanning systems that mostly require people to pass through a checkpoint arrangement, the SPO-NX is designed to operate in relatively large, open spaces such as a train station concourse, but without necessarily scanning all of the people all of the time. Whether the
4 deployment of such a system in Brussels or Paris could have detected the guns and explosives being carried by the perpetrators of those terrorist attacks is a matter for speculation. "The SPO-NX system is completely passive and privacy-protecting" Depending on the concept of operation at a particular event or location, the operator may or may not wish to scan 100% of people passing the sensor, explains Cameron. There is a trade-off between scanning people that have no restriction placed on them for security versus slowing people or funnelling people through a checkpoint of some type to ensure 100% scanning even if it is a high throughput checkpoint. Different users are likely to use this technology in different ways and random sampling of crowds is certainly one viable approach. To get an idea of the scale and scope of operation, it helps to consider the range limits of the SPO- NX. The standard model has a range of 6m to 15m. A longer-range option will also be available, with a range of up to around 25m with a larger front lens on the sensor. This moves the security perimeter further back, making the earlier detection of a threat possible, explains Cameron, especially where there is a high throughput of people flowing into a contained space. By scanning the crowd before they converge, risk is managed without the need to funnel or slow down the footfall further. At present the scanner is operator-controlled, but part of the roadmap at QinetiQ is the development of automated tracking. Privacy-protected scanning system
5 So, what differentiates this system from other scanning systems available? The SPO-NX system is completely passive and privacy-protecting, says Cameron. It is therefore safe and easy for end users to deploy, because there are no privacy or other regulatory issues to navigate that some competitive systems have. It also allows fully non-cooperative scanning people being scanned do not need to stop or pause their journey and do not need to divest any objects from their pockets or from their person. SPO-NX is a portable system that can be set up by one person in less than five minutes. This makes it a cost-effective asset that can be re-deployed at a new venue or location as required. Alternatively, it can be fixed permanently on a wall or ceiling mount. It is a real-time system, selfcalibrates and can be operated locally at the sensor head or, for example, remotely from a CCTV control room. Author Profile Ron Alalouff
6 Contributing Editor, SourceSecurity.com
7 You may also be interested in... BSIA supports use of full-body scanners in UK airports Full-body scanners help in carrying out important security checksin light of the fullbody scanners recently hitting the headlines aga... Researchers demonstrate how to thwart backscatter X-ray screening Backscatter x-ray is a full-body scanning technology, typically used for passenger screening at airports and to detect plastic bombs and oth...
Security on London Underground
Security on London Underground HKARMS Hong Kong, 1-2 December 2005 Geoff.dunmore@tube.tfl.gov.uk Robin.hirsch@imperial.ac.uk CoMET Overview London Underground (LUL) has 30+ years of experience Frequent
More informationIP Video For Law Enforcement
IP Video For Law Enforcement IP VIDEO FOR LAW ENFORCEMENT WWW.INDIGOVISION.COM 1 Introduction The security issues facing law enforcement and criminal justice systems are many and complex. A site-wide surveillance
More information2018 FIFA World Cup Russia integrates safety, security and service
2018 FIFA World Cup Russia integrates safety, security and service Published on 18 Jun 2018 The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign football fans
More informationAirport Security & Safety Thales, Your Trusted Hub Partner
Airport Security & Safety Thales, Your Trusted Hub Partner www.thalesgroup.com/shield Securing People Ensuring Business Continuity Protecting Assets Thales Credentials Thales is a leading international
More informationOPTIMUM DETECTION WITHOUT COMPROMISE. DRA_0291_Scanna_CapBro_AW.indd 1 21/02/ :16
OPTIMUM DETECTION WITHOUT COMPROMISE DRA_0291_Scanna_CapBro_AW.indd 1 21/02/2014 10:16 WITHOUT COMPROMI E DRA_0291_Scanna_CapBro_AW.indd 2 21/02/2014 10:16 Scanna - leading manufacturers of portable X-ray
More informationRemote Control Thermal Imaging Camera System - 12V - Wireless or Wired Remote - 6" LCD Monitor
Remote Control Thermal Imaging Camera System - 12V - Wireless or Wired Remote - 6" LCD Monitor Part #: RCL-336 The Golight remote controlled thermal imaging infrared camera system with 6 inch LCD monitor
More informationMarine Security Overview
Marine Security Overview November 2017 Fred Myer Senior Manager, Marine Security & Waterways fred.myer@portofportland.com 503.415.6542 Port of Portland Facilities Three airports, four marine terminals,
More informationTackling Crime, Protecting Citizens and Assisting First Responders. IN COLLABORATION WITH A Frost & Sullivan Executive Brief
Tackling Crime, Protecting Citizens and Assisting First Responders IN COLLABORATION WITH A Frost & Sullivan Executive Brief Information and Communications Technology 50 Years of Growth, Innovation and
More informationOut of the Fog: Use Case Scenarios. Industry. Smart Cities. Visual Security & Surveillance. Application
Out of the Fog: Use Case Scenarios Industry Application Smart Cities Visual Security & Surveillance 0 Executive Summary Surveillance and security cameras are being deployed worldwide in record numbers
More informationDefence and Security
Defence and Security 13 HVM Perimeter Security Deployed at Westminster 2 Our Story TSP Projects is an innovative solutions driven company which prides itself on engineering projects and products, tailored
More informationEU Research for Secure Societies
EU Research for Secure Societies Paolo Salieri European Commission DG Migration Home Affairs Innovation and Industry for Security Rotterdam October 9 th 20182013 Content EU Security Research "Secure Societies
More informationAGENDA Regular Commission Meeting Port of Portland Headquarters 7200 N.E. Airport Way, 8 th Floor August 13, :30 a.m.
AGENDA Regular Commission Meeting Port of Portland Headquarters 7200 N.E. Airport Way, 8 th Floor 9:30 a.m. Minutes Approval of Minutes: Regular Commission Meeting July 9, 2014 Executive Director Approval
More informationStandoff Technology Demonstration Program: Developing an Explosive Countermeasure Architecture for Large Public Events (LPEs)
Standoff Technology Demonstration Program: Developing an Explosive Countermeasure Architecture for Large Public Events (LPEs) Joe Foster Explosives Division Science and Technology Directorate Department
More informationTSA/FTA Security and Emergency Management Action Items for Transit Agencies
TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:
More informationSecurity Technology October 31, Overview
Security Technology October 31, 2005 Overview Passenger Screening Current Passenger Screening Technology Improvement Goals Emerging Technologies Screening Current Screening Technology Improvement Goals
More informationPublished Privacy Impact Assessments on the Web. ACTION: Notice of Publication of Privacy Impact Assessments (PIA).
This document is scheduled to be published in the Federal Register on 03/22/2012 and available online at http://federalregister.gov/a/2012-06847, and on FDsys.gov 9110-9L DEPARTMENT OF HOMELAND SECURITY
More informationPREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT
PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT HOUSE TRANSPORTATION & INFRASTRUCTURE SUBCOMMITTEE ON RAILROADS Oversight Hearing on Railroad Security
More informationTSP Technical Solutions in Partnership
TSP Technical Solutions in Partnership Discovering our customers needs and delivering the correct solutions: on budget, on time, first time. w: tspprojects.co.uk t: +44(0)1904 454600 Offices in Birmingham,
More informationCyber Security Technologies
1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales
More informationINTRODUCTION. A main question for ISS: why are there so few prosecutions? Copyright Institute for Security Studies 20 November
INTRODUCTION ISS provides training to law enforcement and security agencies; and mentors explosives and CBRN investigators supported by the International Association for Bomb Technicians and Investigators
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons
More informationCHAPTER 15 SECURITY MEASURES FOR A METRO SYSTEM
CHAPTER 15 SECURITY MEASURES FOR A METRO SYSTEM 15.1 INTRODUCTION 15.2 NECESSSITY OF SECURITY 15.3 THREE PILLARS OF SECURITY 15.4 PHASES OF SECURITY 15.5 RESPONSIBILITIES AND PARTNERSHIPS 15.6 PROPOSED
More informationFTE Asia. IATA Workshop. Vinoop Goel Regional Director, APCS IATA
FTE Asia IATA Workshop Vinoop Goel Regional Director, APCS IATA Passenger satisfaction level at the different touchpoints 100% 80% 60% 40% 20% 0% -20% -40% -60% -80% -100% Satisfied Not Sastisfied Airport
More informationIntelligent Transportation Systems (ITS) for Critical Infrastructure Protection
Intelligent Transportation Systems (ITS) for Critical Infrastructure Protection Presented at the Transportation Research Board January 2002 Annual Meeting Washington DC, USA HAMED BENOUAR Executive Director
More informationDOWNLOAD OR READ : THREAT AND VULNERABILITY MANAGEMENT COMPLETE SELF ASSESSMENT GUIDE PDF EBOOK EPUB MOBI
DOWNLOAD OR READ : THREAT AND VULNERABILITY MANAGEMENT COMPLETE SELF ASSESSMENT GUIDE PDF EBOOK EPUB MOBI Page 1 Page 2 threat and vulnerability management complete self assessment guide threat and vulnerability
More informationDIMETRA X CORE DATA SHEET DIMETRA X CORE
DIMETRA X CORE FOR GOVERNMENT ORGANISATIONS, PUBLIC SAFETY AGENCIES AND LARGE ENTERPRISES, MOBILE BROADBAND IS ON THE WAY. AND WHILE YOU DON T KNOW WHEN THAT CHANGE IS COMING YOU CAN BE READY FOR IT WITH
More informationDefence, Safety and Security
Defence, Safety and Security 2 The mission of TNO TNO connects people and knowledge to create innovations that boost the sustainable competitive strength of industry and well-being of society. 3 TNO facts
More informationThermal and Optical Cameras. By Philip Smerkovitz TeleEye South Africa
Thermal and Optical Cameras By Philip Smerkovitz TeleEye South Africa phil@teleeye.co.za OPTICAL CAMERAS OVERVIEW Traditional CCTV Camera s (IP and Analog, many form factors). Colour and Black and White
More informationCopyright ECSC Group plc 2017 ECSC - UNRESTRICTED
Copyright ECSC Group plc 2017 ECSC - UNRESTRICTED ECSC - UNRESTRICTED Introduction A Web Application Firewall (WAF) is, in our experience, the most important layer of defence against a wide range of attacks
More informationLa gestione di Security e Safety con un singolo sistema di supporto alle decisioni Baltimore/Washington Airport - USA
La gestione di Security e Safety con un singolo sistema di supporto alle decisioni Baltimore/Washington Airport - USA Filippo Silvestri Sales Manager PS&S Intergraph Italia Security Government & Infrastructure
More informationHow to adjust and improve the security level of infrastructure
How to adjust and improve the security level of infrastructure Andrea Demadonna UNIFE Luigi Rucher ThalesGroup Andrea Bastianelli ThalesGroup UNIFE Florence, 25 November 2016 About UNIFE UNIFE represents
More informationAuthentication Technologies
Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys), something
More informationSECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE
SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED CONTENTS 3 4 5 6 8 9 10 11 12 14 15 16 INTRODUCTION THREATS RISK MITIGATION REFERENCE ARCHITECTURE
More informationJANUARY 2017 WATER S END. Mobile Mapping. Station to Station. Decided Guidance Indoor application. Implementing BIM. A fixed boundary R E YEARS
JANUARY 2017 WATER S END Mobile Mapping Station to Station Decided Guidance Indoor application Implementing BIM A fixed boundary R LEB ATING E C 30 YEARS Indoor Mobile Mapping A unique approach to interior
More informationPort Facility Cyber Security
International Port Security Program Port Facility Cyber Security Cyber Security Assessment MAR'01 1 Lesson Topics ISPS Code Requirement The Assessment Process ISPS Code Requirements What is the purpose
More informationBPF GLOBAL SECURITY DETECT DEFEND DETER. Company Profile
BPF GLOBAL SECURITY Company Profile BPF GLOBAL SECURITY Guarding, patrolling and protecting Australia wide BPF Global Security is a specialist Security and Facilities Management company providing professional
More informationThe UK s National Cyber Security Strategy
The UK s National Cyber Security Strategy 2016 2021 Vision for 2021: The UK is secure and resilient to cyber threats, prosperous and confident in the digital world 1 National Cyber Security Strategy 2016
More information2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.
Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third
More informationAviation Law Enforcement Officer Security Training Kansas City International Airport May 21 & 22, 2014
0900-1200 Welcome and Introductions Wednesday, May 21 Discussion of prerequisite online LEO modules DHS/Transportation Security Administration (TSA) Organization and Operations o Headquarters o Responsibilities
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationSecurity is one of the biggest concerns today. Ever since the advent of the 21 st century, the world has been facing several challenges regarding the
Security is one of the biggest concerns today. Ever since the advent of the 21 st century, the world has been facing several challenges regarding the security of people, economy, and infrastructure. One
More informationManagement. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group,
Port Security Management Second Edition KENNETH CHRISTOPHER CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business Preface
More informationMotorola Mobility Binding Corporate Rules (BCRs)
Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,
More informationBEST SECURITY PRACTICES FOR PROTECTING SURFACE TRANSPORTATION AGAINST TERRORISM AND SERIOUS CRIME. Brian Michael Jenkins Research Associate
BEST SECURITY PRACTICES FOR PROTECTING SURFACE TRANSPORTATION AGAINST TERRORISM AND SERIOUS CRIME Brian Michael Jenkins Research Associate Mineta Transportation Institute January 14, 2002 Contemporary
More informationthalesgroup.com Thales in Mexico Factsheet
thalesgroup.com Thales in Mexico Factsheet Thales has been present for over 50 years in Mexico and currently employs 330 persons. Thales has successfully deployed urban security solutions, radio communication
More informationGDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ
GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool Contact Ashley House, Ashley Road London N17 9LZ 0333 234 4288 info@networkiq.co.uk The General Data Privacy Regulation
More informationA Perspective on Public Safety and Critical Infrastructure Protection
A Perspective on Public Safety and Critical Infrastructure Protection Vision and market trends for Homeland Security and role in Critical Infrastructure Protection in response to the new security situation
More informationNASCIO Recognition Award Nomination. Title: Central Issuance of State Drivers Licenses. Category: Digital Government Government to Citizen
NASCIO Recognition Award Nomination Title: Central Issuance of State Drivers Licenses Category: Digital Government Government to Citizen State: North Carolina Executive Summary The NCDMV wanted to reduce
More informationENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE
ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE INTRODUCTION In line with commercial industry standards, the data center used by EndNote employs a dedicated security team to protect our
More informationINTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK
INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK CASE STUDY Application of High-Assurance Network Encryption Sector: Use Case: Solution: Government CCTV security Real-time HD video transmission across Layer
More informationThis policy is a public document and has been prepared in light of the National Privacy Principle 5: Openness.
Privacy Policy: Wireless Life Pty Ltd trading as ISP Connect Effective: 11 November 2015 Wireless Life Pty Ltd t/as ISP Connect ( ISP Connect ) is committed to protecting the privacy of its customer s
More informationDevelopment of a new security architecture for signalling at DB Netz AG Intelligent Rail Summit 2017
Development of a new security architecture for signalling at DB Netz AG Intelligent Rail Summit 2017 DB Netz AG Christian Schlehuber I.NPS 5 Vienna 2017-11-29 Agenda 1. 2. 3. Introduction New Features
More informationWireless Network Policy and Procedures Version 1.5 Dated November 27, 2002
Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002 Pace University reserves the right to amend or otherwise revise this document as may be necessary to reflect future changes made
More informationINTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES
INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES CASE STUDY Application of High-Assurance Network Encryption Sector : Use Case: Solution: CCTV security HD video Layer 2 network architecture A Major
More informationCellular Site Simulator Usage and Privacy
Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and
More informationExpress Monitoring 2019
Express Monitoring 2019 WHY CHOOSE PT EXPRESS MONITORING PT Express Monitoring provides a quick evaluation of the current signaling network protection level. This service helps to discover critical vulnerabilities
More informationTransportation Security Planning in British Columbia David Morhart, Deputy Solicitor General
Transportation Security Planning in British Columbia David Morhart, Deputy Solicitor General Transportation Security Conference Calgary, October 2-4, 2 2006 B.C. s Unique Transportation Sector Canada s
More informationCyber Security Guidelines for Securing Home and Small Office Routers
Cyber Security Guidelines for Securing Home and Small Office Routers Author: CS Risk Management Section Document Published Date: March 2018 Document History: Version Description Date 1.0 Published V1.0
More informationMeeting on Regulatory Issues Related to the Deployment of Telecommunications Networks in New Property Developments. Agenda:
Agenda: Meeting on Regulatory Issues Related to the Deployment of Telecommunications Networks in New Property Developments Introduction by Mr. Alan Horne, General Director, TRA Bahrain Presentation of
More informationSecurity of Critical Rail Infrastructures: UIC contributions
Security of Critical Rail Infrastructures: UIC contributions Grigore M. Havârneanu, PhD Research Advisor Fundamental Values Department Security Division UNECE Workshop on Critical Transport Infrastructure
More informationIssue I. Airport Communication Project
Issue I Airport Communication Project Recommendation 1 Governments are encouraged to continue their financial and technical support to the Airport Communication Project (AIRCOP) of the United Nations Office
More informationBoundary Security. Innovative Planning Solutions. Analysis Planning Design. criterra Technology
Boundary Security Analysis Planning Design Innovative Planning Solutions criterra Technology Setting the new standard DEFENSOFT - A Global Leader in Boundary Security Planning Threats, illegal immigration
More informationWG Mobile Entire Truck & Cargo X-Ray Scanning System
Telephone : +44 (01295 756300 Fax : +44 (0)1295 756302 E-Mail : info@wi-ltd.com Website : www.wi-ltd.com WG Mobile Entire Truck & Cargo X-Ray Scanning System The WG Mobile Entire Truck and Cargo X-Ray
More informationTRANSPORTATION SECURITY ADMINISTRATION. Insider Threat Awareness ICAO Global Aviation Security Symposium 2018
TRANSPORTATION SECURITY ADMINISTRATION Insider Threat Awareness ICAO Global Aviation Security Symposium 2018 Overview Discuss the key elements of insider risk and how to mitigate the unique security risks
More informationCreating Safer, More Secure Railways. Briefing Document
Creating Safer, More Secure Railways Briefing Document In real time. OptaSense Monitoring Your Network Key point brief OptaSense Building The Earth s Nervous System OptaSense is a virtual nervous system
More informationLive Broadcast: Video Services from AT&T
Delivering your content through the power of the cloud Live Broadcast: Video Services from AT&T Getting your content to your audience is becoming increasingly diverse and complex. Today, people want to
More informationNCIRC Security Tools NIAPC Submission Summary Juniper IDP 200
NCIRC Security Tools NIAPC Submission Summary Juniper IDP 200 Document Reference: Security Tools Internal NIAPC Submission NIAPC Category: Intrusion Detection & Prevention Date Approved for Submission:
More informationTIBCO Nimbus Service
TIBCO Nimbus TIBCO Software Inc. (NASDAQ: TIBX) is a provider of infrastructure software for companies to use onpremise or as part of cloud computing environments. Whether it's efficient claims or trade
More informationCOVERING A WIDE SPECTRUM OF INDUSTRIES
MEDIA KIT 2019 for CONNECT WITH US Follow us on facebook www.facebook.com/securitysolutionstoday for news, event updates and more PRINT Published bimonthly since 1992 Amongst leading security trade publications
More informationProgress Report: The MTA Capital Security Program
Progress Report: The MTA Capital Security Program Thomas P. DiNapoli New York State Comptroller Kenneth B. Bleiwas Deputy Comptroller Report 6-2009 November 2008 The Metropolitan Transportation Authority
More informationAre we breached? Deloitte's Cyber Threat Hunting
Are we breached? Deloitte's Cyber Threat Hunting Brochure / report title goes here Section title goes here Have we been breached? Are we exposed? How do we proactively detect an attack and minimize the
More informationPalm Vein Technology
Technical Paper Presentation On Palm Vein Technology (Security Issue) Hyderabad Institute of Technology And Management ABSTRACT Identity verification has become increasingly important in many areas of
More informationSecuring the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.
Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change
More informationWhite Paper. Why IDS Can t Adequately Protect Your IoT Devices
White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity
More informationResearch of Personnel. 9. Interface Manager (Class B - 60 months - Over 15 years experience with degree and professional qualification)
Research of Personnel 9. Interface Manager (Class B - 60 months - Over 15 years experience with degree and professional A manager with experience in the coordination of interfaces in complex large scale
More informationPRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV)
PRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV) 1 Principle 2 of the surveillance camera code of practice states that the use of a surveillance camera
More informationSecurity by Default: Enabling Transformation Through Cyber Resilience
Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,
More informationAdvanced Biometric Access Control Training Course # :
Advanced Biometric Access Control Training Course # : 14-4156 Content A. Objectives 5 mins B. History of EAC- 10 mins C. Electronic Access Control in Todays World 20 mins D. Essential Components of Electronic
More informationOverview of Customs-Trade Partnership Against Terrorism (C-TPAT)
Overview of Customs-Trade Partnership Against Terrorism (C-TPAT) Our Mission We are the guardians of our Nation s borders. We are America s frontline. We safeguard the American homeland at and beyond our
More informationTARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS
Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS
More informationADVANCING SECURITY INTELLIGENCE
UVIS Under Vehicle Inspection Systems ADVANCING SECURITY INTELLIGENCE www.irdinc.com Intelligent Optical Threat Detection International Road Dynamics Inc. (IRD) is a global leader in the design, development
More informationTransLink Video Surveillance & Audio Recording Privacy Statement
TransLink Video Surveillance & Audio Recording Privacy Statement Last Update: August 4, 2015 Previous version: July 22, 2008 TransLink is committed to achieving a balance between an individual s right
More informationWhat is AI Face Search? Benefits over facial recognition systems
What is AI Face Search? Benefits over facial recognition systems Published on 10 Oct 2018 When a child goes missing in a large, crowded mall, we have a panicking mom asking for help from the staff, at
More informationACI-NA 2018 Risk Management Conference SAFETY Act. Washington, D.C
ACI-NA 2018 Risk Management Conference SAFETY Act Akmal Ali, J.D. akmal.ali@catalystdc.com Principal, Catalyst Partners 1250 Connecticut Ave. NW www.catalystdc.com Washington, D.C. 20036 Following the
More informationExternal Supplier Control Obligations. Cyber Security
External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place
More informationNon-Cooperative Biometrics. Patricia Wolfhope Program Manager Resilient Systems Division Science and Technology Directorate
Non-Cooperative Biometrics Patricia Wolfhope Program Manager Resilient Systems Division Science and Technology Directorate patricia.wolfhope@dhs.gov DHS Organization 2 Resilient Systems Division 3 DHS
More informationTenable.io User Guide. Last Revised: November 03, 2017
Tenable.io User Guide Last Revised: November 03, 2017 Table of Contents Tenable.io User Guide 1 Getting Started with Tenable.io 10 Tenable.io Workflow 12 System Requirements 15 Scanners and Agents 16 Link
More information2 nd International Workshop The Security Market Technology Trends: Vision of a large enterprise and the interest on SME s technologies.
2 nd International Workshop The Security Market Technology Trends: Vision of a large enterprise and the interest on SME s technologies José Neves 28 th February 2012 Vision of a Large Enterprise What is
More informationThe Global Security Threat How are Customs responding
The Global Security Threat How are Customs responding Ana Hinojosa Director-Compliance & Facilitation World Customs Organization Global Security Conference: Punta Cana Resolution 3 Years on Punta Cana
More informationEU Customs Policy for Supply Chain Security & Detection Technology (for CBRNE)
EU Customs Policy for Supply Chain Security & Detection Technology (for CBRNE) Manuela Cabral Directorate General for Taxation and Customs Union Head of Risk management and Security, Unit B 2 Brussels,
More informationEXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
EXCERPT NIST Special Publication 800-171 R1 Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations An Excerpt Listing All: Security Requirement Families & Controls Security
More informationThe Golden Triangle Business Improvement District Washington, DC Program: Safe, Secure, Prepared Award Category: Downtown Leadership and Management
The Golden Triangle Business Improvement District Washington, DC Program: Safe, Secure, Prepared Award Category: Downtown Leadership and Management Encompasses 43 square blocks of prime commercial real
More informationAUTHORITY FOR ELECTRICITY REGULATION
SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...
More informationTHE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)
ASEAN REGIONAL FORUM INTER-SESSIONAL SUPPORT GROUP MEETING ON CONFIDENCE BUILDING MEASURES (ISG on CBMs) Beijing, 20-22 November 2003 THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)
More informationHow DDoS Mitigation is about Corporate Social Responsibility
How DDoS Mitigation is about Corporate Social Responsibility We see the Network, we monitor the Network and we can protect your business with automatic DDoS mitigation services from our Network core. Regardless
More informationThailand Initiatives and Challenges in Cyber Terrorism
Thailand Initiatives and Challenges in Cyber Terrorism Agenda Cyber-Terrorism weapons & tactics MICT Cyber Inspector Group IT Laws Development Challenges Cyber-Terrorism weapons & tactics What is Cyber-Terrorism?
More informationAccess Control Biometrics User Guide
Access Control Biometrics User Guide October 2016 For other information please contact: British Security Industry Association t: 0845 389 3889 e: info@bsia.co.uk www.bsia.co.uk Form No. 181 Issue 3 This
More informationPrivacy Impact Assessment
Automatic Number Plate Recognition (ANPR) Deployments Review Of ANPR infrastructure February 2018 Contents 1. Overview.. 3 2. Identifying the need for a (PIA).. 3 3. Screening Questions.. 4 4. Provisions
More informationVideo Surveillance Linear Architecture
Video Surveillance Linear Architecture SECURITY FAST, RELIABLE, AND COST EFFECTIVE Violent crime, burglary and theft threaten the safety of our citizens. Public Safety organizations are charged with leading
More informationThe University of British Columbia Board of Governors
The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:
More information