securitylinkindia

STF, UP Police Wins: FICCI Smart Policing Award 2021

The Special Task Force (STF) of Uttar Pradesh Police has been conferred with the prestigious FICCI Smart Policing Award 2021, at the annual conference on homeland security that was held at FICCI in New Delhi. STF, UP police won this Special Jury Award in a highly competitive field which received more than 192 entries from 19 State Police Forces and 4 CAPFs, and other Central Police Forces, for its application of the AI-Powered JARVIS tool. JARVIS-SIAN was launched by Amitabh Yash (IPS) in 2021 and has been indigenously developed by Staqu Technologies, which is a Gurugram-based AI research start-up. The annual conference that witnessed the participation of senior officials from the Government of India, Central Armed Police Forces (CAPFs), and various State Police Forces (SPFs) acknowledged the ingenuity and far-sightedness of the smart policing solutions adopted by STF Uttar Pradesh Police. STF, UP Police department had launched the JARVIS – SIAN, an AI-powered audio and video analytics platform for the identification of criminals and miscreants by utilization of both their voice samples and photographs. Technology has been highly efficient and useful in the reduction of organized crime and the capture of cybercriminals. Amitabh Yash, IPS, ADG, STF UP Police, under whose guidance the JARVIS-SIAN was developed, said, “It is a humbling experience to be receiving this recognition from a national body like FICCI. With the technology, we envisioned utilizing the latest advancements in the field of artificial intelligence to strengthen our ground-level defense. We are glad to be recognized for the same and sincerely hope that more Indian states would now be motivated to adopt the latest technologies to enhance policing operations.” Commenting on the win, Atul Rai, Founder, and CEO, Staqu Technologies said, “We would like to firstly congratulate STF, UP Police for this award. The manner and commitment in which the technology has been adopted across the strata by STF are reflected in this victory here. A lot of countries worldwide have adopted AIbased deep learning in their security and surveillance methods, and have experienced success. The technology certainly eliminates the room for errors and adds a layer of intelligence to the whole procedure. We could not be happier about how our country is now embracing the advancement of technology. At Staqu we believe in the continuous enhancement of our offerings which at the end of the day are designed to make the lives of our fellow countrymen safer and easier.” Empowering the special task forces officers at Ground Zero, JARVIS helps officers identify criminals through voice samples, facial scans, video footage etc. Owing to its widespread use cases and superior AI capabilities, JARVIS is used by all the officers in 7 zones of STF in Uttar Pradesh, ranging from inspectors to ADG. As a Gurgaon-based Artificial Intelligence start-up, Staqu strives to utilize technology in solving real-world problems. Founded in 2015, the company provides state-of-the-art image recognition, language-independent proprietary speaker identification, and text processing, including sentiment analysis, text classification and summarization. Staqu was handpicked by the British High Commission as the Best AI Start-up in the country. Furthermore, triumphing in IBM’s Global Entrepreneur Program, Staqu has successfully raised investment from Indian Angel Network.  

Read More

On-line Certification: Certified Security Professional (CSP) & Certified Security Manager (CSM)

The International Council for Industrial Security and Safety Management (ICISSM) is a security and safety professionals’ forum that works towards creating an open platform for security and safety professionals to share their knowledge and expertise. With the membership of more than seven thousand working security and safety professionals from all over the world, it has been conducting the training with the help world renowned Master Trainers. These training carry a lot of respect and recognition in the fraternity. ICISSM is the only institution in India which is focussing on continual improvement and career enhancement of security supervisors and security guards. The high-value on-line certification program are specially curated keeping in mind the busy lives security professionals have and also the burning desire in them to excel in their chosen profession. The Council is aware that they want to constantly upskill themselves to remain ahead to forthcoming challenges profession would offer to them. Even when harder they tried, there was always paucity of time and sense losing out in the competitive environment just because they could not acquire the needed Certificate, an essential evidence so much needed for the career progression. To help and support the working security professionals, ICISSM has started two online certification programs to ‘professionalize the professionals.’ Certified Security Professional (CSP). Certified Security Manager (CSM). Industry Accreditation These courses are based on national occupational standards and in conformity to the industry standards and benchmarks. All the security professionals with these certificates have progressed well and they are doing very well so far as their career progression is concerned. In India there are no on-line or off-line certification programs for security supervisors or security managers. Only the basic syllabus for the 12 hours’ training program is prescribed for security guards under the Private Security Agencies Regulation Act. For our ‘On-line Certifications Courses’ for CSP & CSM, the ICISSM has signed Memorandum of Understanding (MoU) with Security Sector Skill Development Council (SSSDC). This was closely followed by signing another MoU with Central Association of Private Security Industry (CAPSI) on 15 November 2018 during its Annual Summit very aptly focussing on Security Skills & Leadership. The MoU was signed by Kunwar Vikram Singh, Chairman, CAPSI and Col DR Semwal, President of ICISSM. The MoU is aimed to encourage working security professionals from the member PSAs of CAPSI for up-skilling and upgrading their professional qualifications for assured career progression and instant recognition to their peers, superiors and recruiters regarding their professional acumen and expertise. Benefits of Certifications The certification training imparted will have following discernible benefits: Provides in-depth subject knowledge. Allows the learnings and ‘take homes’ to be incorporated in day-to-day professional work and discharge of duties with conviction and confidence. Case studies encourage the application of new leanings to be applied on ground with modifications to specific needs. Certification allows instant recognition in fraternity and by the peers. The enrolled personnel for above trainings are made members of ICISSM for the one calendar year and are sent our monthly newsletters and inducted as members to our LinkedIn and Google Groups also for one year. The successful certified professionals in recognition to their distinguished achievement will enjoy these privileges for their entire professional lives. The certificate holders are also inducted as members in our WhatsApp group – an exclusive group of select professionals. We regularly send information to our members on forthcoming conferences and seminars to encourage their participation for continual upgradation of their knowledge and skills. Eligibility Certified Security Professional (CSP): For those having minimum five years’ professional experience in any position and possessing minimum educational qualification of graduation. Certified Security Manager (CSM): For those having minimum five years’ professional experience and working in managerial position with minimum educational qualification of graduation. How to Enrol Following are the modalities: The Certified Security Professional (CSP): This course contains twenty (20) sessions as per details given in Appendix A. Upon receiving the fees along with the filled form and supporting documents, the reading material will be provided by ICISSM by e-mail. Certified Security Manager (CSM): This course contains forty (40) sessions as per details given in Appendix B. Upon receiving the fees along with the filled form and supporting documents, the reading material will be provided by ICISSM by e-mail. The interested professionals need to send their queries if any while browsing the web-site and visiting last page. They need to fill-up and send by e-mail or post, the form given in Appendix C along with proof of having acquired educational qualification of graduation or above. They also need to provide copy of their employer identity card or certificate clearly indicating their designation. The certification fee for Certified Security Professional (CSP) is Rs.10000.00 (Ten Thousand) and for Certified Security Manager (CSM) it is Rs.20000.00 (Twenty Thousand) only. The GST at 18% is to be paid extra. Despatch of Reading Material Upon receiving the payment and enrolment papers and finding them in order, the reading material in the batch of ten elements will be sent by mail. The CSP Module has total twenty (20) and CSM has total forty (40) elements. There is no time limit for study of the sent material; however, when the registered candidate is ready to appear in the examination, a mail needs to be sent to ICISSM which will send the link/ question paper containing multiple choice questions. The examination will be in the batch of ten elements of the modules and therefore for CSP there will be two and for CSM there will be four exams. However any candidate wishing to attempt all the elements and examination thereof in one go can make specific request. Examination Process Since these are online courses, there is no pre-set dates. One can start on-line registration and begin the course and appear for the exam at own convenience. However, the time limit set to complete the certification process must be kept in mind. On candidate’s intimation about readiness for the exam, a link will be sent which will contain examination papers…

Read More

New DeepinView Bullet Cameras with TandemVu Technology

Hikvision recently launched its new DeepinView bullet network cameras with TandemVu technology, expanding the reach of TandemVu technology from PTZ units to bullet-styled models. As their name implies, the new TandemVu-enabled bullet cameras are also able to monitor large scenes and close-up details simultaneously, maintaining both ‘viewpoints’ for improved situational awareness and security capability. Distinguishing from its PTZ ‘sibling,’ DeepinView bullet cameras with TandemVu feature two adjacent bullet lenses. While the top fixed lens provides the big picture at all times, the bottom motorized lens features a 10-50 mm focal length (8A86), or an 8-32mm focal length (8A46), designed to check on specific security events in detail. Features and benefits of the DeepinView bullet cameras with TandemVu The requirement of obtaining detailed views while not sacrificing the overall viewpoint drives security technology companies to continuously innovate new types of camera, just like those powered by Hikvision’s TandemVu technology. They integrate the capabilities of multiple cameras in a single unit, boasting reliable and even greater security performance. They also reduce installation efforts with devices that are less cumbersome, making security operators’ job easier. With Hikvision’s TandemVu-enabled bullet cameras, users can benefit from the following features: Two-in-one design for cost savings By applying DeepinView bullet cameras with TandemVu, users eliminate the need to deploy two separate cameras with doubled purchasing cost, installation and maintenance costs, as well as the required technical skills for product linkage. The camera’s two-in-one design also means there is only one IP channel to manage, and only one license is needed on the video management software (VMS) platform. 4K DarkFighter for superb image clarity The DeepinView bullet cameras with TandemVu also inherit Hikvision’s ColorVu and DarkFighter imaging technologies in their two lenses respectively. The top lens with ColorVu produces 4MP full-color imaging day and night. The bottom lens with DarkFighter now supports 4K resolution for the first time. That means colored images in 4K can be achieved down to 0.0003 lux – ensuring that every security incident is recorded in fine detail. Innovative ‘fusion light’ for enhanced security efficiency The cameras are embedded with both supplemental white light and infrared (IR) light on either side that work together in a smart way. The camera activates IR light for normal, low-light operation. When a security event occurs, for example a trespasser or a vehicle enters predefined areas, the white light will be triggered to replace IR, allowing the camera to capture colored images of intruders. The automatic ‘switch on’ function of white light also provides a deterring signal to them, making it clear that they’ve entered into an area with security coverage. Switchable algorithms for varied security needs The DeepinView bullet cameras with TandemVu feature four switchable Deep Learning algorithms in their lower unit, including perimeter protection, facial recognition, automatic number plate recognition (ANPR), and multi-target-type detection. Accordingly, users can simply enable an algorithm manually for dedicated use, then later switch the algorithm as needed. This makes the cameras ideal for perimeters, entrances and exits of industrial parks, parking facilities, city streets, and others. Window heater for reliable outdoor operations The cameras are made further reliable in cold weathers thanks to a built-in window heater to protect the lens from snow or ice. The heater also prevents fogging on the lens in sudden temperature shifts. In this way, users can always get crystal-clear pictures in harsh environments. There are two Hikvision TandemVu bullet camera models – iDS-2CD8A46G0-XZ(H)S(Y) and iDS2CD8A86G0-XZ(H)S(Y).  

Read More

Out of the Shadows: New Imaging Method Reveals Concealed Objects

A new way of imaging concealed objects, devised by a researcher at the National Institute of Standards and Technology (NIST) and his colleagues, might take all the fun out of hide-andseek, but could also help save lives. Imaging scenes that lie outside an observer’s direct line of sight could greatly enhance search and rescue missions, such as finding a lost child in an abandoned factory, as well as military and police surveillance operations, such as exposing a hidden terrorist or enemy stronghold. The ability to see around corners and reconstruct a full image of a hidden object or obstacle in real time also could someday improve robotic vision and the safety and accuracy of self-driving cars. (At present, the prototype method cannot create an image instantaneously.) Most conventional methods used to image objects behind an obstruction use an external source of light – ultra-short pulses of visible or infrared laser light, for example. The light source initially illuminates a wall that scatters the light into the concealed region. When the light strikes a hidden object, the object re-scatters some of the light back to the wall where it can be detected. However, imaging hidden objects using only visible and infrared light is challenging. At those relatively short wavelengths, a typical wall – no matter how smooth to the human touch – presents itself as a rough surface and scatters incoming light in all directions. It therefore reveals less information about objects than light reflected from a smooth or mirrored surface and requires sophisticated algorithms and significant computing time to create even a semi-sharp image. In addition, the illumination could tip off adversaries that they are under surveillance. Other methods, which don’t require a light source, analyze shadows cast by a hidden object on a wall, or detect the heat (infrared radiation) naturally emitted by the concealed body and scattered diffusely into view. But these approaches also require extensive computing time and analysis. “A good algorithm and lots of computer power might extract an image, but not a very good one,” said Erich Grossman, NIST Physicist. Grossman and his colleagues based their new approach on detecting the tiny amounts of much longer wavelength radiation – the ‘submillimeter’ range of the spectrum of light that lies just beyond microwave radiation and which people and objects also naturally emit. At these long, invisible wavelengths, ranging from 300 micrometers up to 1 millimeter, walls made of a variety of materials appear relatively smooth and act as partial mirrors, reflecting rather than diffusely scattering into view radiation from a concealed object. To create an image, the reflected radiation has to be directed and focused. Unlike visible light, submillimeter radiation can’t be steered by glass lenses. Instead, Grossman and his colleagues relied on curved mirrors to focus the invisible light. Experimenting with their prototype, Grossman and his collaborators at the University of Minnesota Twin Cities in Minneapolis demonstrated that they could construct images of objects hidden behind walls in about 20 minutes. The prototype technique employs state-of-theart indium phosphide transistors, which amplify submillimeter radiation with little noise over a wide range of wavelengths. The method does not require complex algorithms or intensive computer analysis. “What’s cool about this method is its simplicity,” Grossman said, “There’s no quantum mechanics, no relativity, there’s nothing cryogenic or anything fancy – just transistors and a basic computer and mirrors.” The entire apparatus is small enough to fit in a backpack. With NIST facilities closed during the peak of the COVID-19 pandemic, Grossman used his own home – converting the bedroom of his daughter, who had left for college, into a makeshift laboratory. Grossman himself was the body hidden behind a wall. He tested walls made of a range of common indoor building materials to determine which ones reflected enough submillimeter radiation to form an image, including wet and dry wallboard, plywood, wood paneling, unpainted cinderblock and stone kitchen tiles. Walls that reflected at least 5% of the submillimeter radiation were best at producing images of concealed bodies. These included dry wallboard, wood paneling, vinyl floor planking, plywood, stone kitchen tiles and medium-density fiberboard. With a larger array of detectors and transistors, Grossman said that the method should be able to image hidden objects in real time. The work was supported by NIST and the Defense Advanced Research Projects Agency (DARPA).  

Read More

Tenable Achieves AWS Security Competency Status

Tenable®, the Cyber Exposure Management company, recently announced it has achieved the Application Security distinction in the Amazon Web Services (AWS) Security Competency for its cloud-native vulnerability management solution. This designation recognizes that Tenable has demonstrated and successfully met AWS’s technical and quality requirements for providing customers with a deep level of software expertise in Application Security to help them achieve their cloud security goals. Achieving the Application Security distinction in the AWS Security Competency differentiates Tenable as an AWS Partner Network (APN) member that provides specialized software designed to help companies – from startups and mid-sized businesses to the largest global organizations – to adopt, develop and deploy security into their AWS environments, increasing their overall security posture on AWS. To receive the designation, APN Partners must possess deep AWS expertise and deliver solutions seamlessly on AWS. “Tenable is proud to be an APN Partner to achieve the Application Security distinction in the AWS Security Competency,” said Ray Komar, Vice President of Technology and Cloud Alliances, Tenable, “Our team is dedicated to helping companies achieve their security goals by combining our vulnerability management expertise with the range of powerful security tools AWS provides.” AWS is enabling scalable, flexible, and cost-effective solutions from startups to global enterprises. To support the seamless integration and deployment of these solutions, AWS established the AWS Competency Program to help customers identify AWS Partners with deep industry experience and expertise. “Tenable.io has unified our vulnerability management program under one toolset,” said Patrick King, Head of IT Operations and Security, Global Payments AU/ NZ, “It’s brought together teams across different business units to use a common language around vulnerability posture. The solution is easy to use and streamlines our reporting.” Managed in the cloud and powered by Nessus technology, Tenable provides comprehensive vulnerability coverage with the ability to predict which security issues to remediate first. It’s a complete end-to-end vulnerability management solution.  

Read More

USD 11 Million in Illicit Medicines Seized in Global INTERPOL Operation

Every day, advertisements for medicines invade the Internet, posted on social media networks or other websites. However, behind this slick marketing often lies fraudulent products that threaten consumers’ health instead of healing them. The global trade in illicit pharmaceuticals is a vast and lucrative crime area – valued at US$ 4.4 billion – which attracts the involvement of organized crime groups around the world. Over just one week (23-30 June), 94 INTERPOL member countries representing every continent launched a coordinated crackdown on illicit online pharmacies in Operation Pangea XV. Globally, law enforcement made more than 7,800 seizures of illicit and misbranded medicines and healthcare products, totaling more than 3 million individual units. During the week, law enforcement: Investigated more than 4,000 web links, mainly from social media platforms and messaging apps. Shut down or removed more than 4,000 web links containing adverts for illicit products. Inspected nearly 3,000 packages and 280 postal hubs at airports, borders and mail distribution or cargo mail centres. Opened more than 600 new investigations and issued more than 200 search warrants. While results are still coming in from countries, enforcement actions have already disrupted the activities of at least 36 organized crime groups. “Selling counterfeit or illicit medicines online may seem like a low-level offence, but the consequences for victims are potentially life-threatening,” said INTERPOL Secretary General Jürgen Stock, “The illicit supply chains and business models behind the counterfeit medicine trade are inherently international, meaning that law enforcement has to work together across borders in order to effectively protect consumers.” Cross-border crimes Nearly half (48 per cent) of the packages inspected by law enforcement during the operation were found to contain either illicit or falsified medicines. Counterfeit or unauthorized erectile dysfunction medicines comprised roughly 40 percent of all products seized. Law enforcement in Australia, Argentina, Malaysia and the United States also seized more than 317,000 unauthorized COVID-19 test kits. The US seizures alone are estimated to be worth nearly US$ 3 million. The trade in illicit medicines extends far beyond any one country’s borders and is a significant global threat. Often, products are manufactured in one country and shipped to another, while advertisements for the medicines are hosted on websites based in many different countries. In Malaysia alone, law enforcement identified more than 2,000 websites selling or advertising counterfeit or illegally-obtained pharmaceuticals. Social media networks and messaging apps are also used to advertise counterfeit and illicit medicines, with Operation Pangea XV identifying more than 1,200 such ads across all major platforms. “Two decades worth of experience has shown criminals will stop at nothing to make a profit, including selling counterfeit pharmaceuticals and medical devices despite dangers they cause,” said Jim Mancuso, Director of the National Intellectual Property Rights Coordination Center in the United States, “The US is committed to working closely with our international law enforcement partners and the private sector to keep counterfeit pharmaceuticals and medical devices out of the global supply chain, as well as taking down transnational criminal organizations who profit from these scams. The results of Operation Pangea XV are a warning to transnational criminal organizations that law enforcement agencies around the world will do whatever it takes to protect public health and safety.” Within the framework of Operation Pangea XV, INTERPOL was supported by Europol, the UNODC-WCO Container Control Programme, health regulatory agencies and the Pharmaceutical Security Institute. INTERPOL’s Illicit Goods and Global Health Programme works with partners to dismantle criminal networks and reduce the risk that fake and illicit pharmaceuticals pose to public health.  

Read More

Security Aspects of Soft and Vulnerable Targets

By Colonel B S Nagial (Retd) The concepts of soft and vulnerable targets, hard targets, and crowded public places have recently come into daily use in the counter-terrorism platform. These concepts are not included in any international legal framework. Soft and vulnerable targets such as sports complexes, shopping sites, schools and education institutions, and transportation systems, are easily reachable to large numbers of people and have limited security or protective measures in place, making them vulnerable to terrorist attacks. By attacking these targets, they (terrorists) can cause maximum destruction to life and property without much going into the detailed planning, training and mobilisation of resources. Terrorists want the maximum media attention should be drawn to such incidents. To a greater extent, the concept of ‘soft-targets’ overlaps with that of crowded public places, wherein the high density of the population gathers temporarily or permanently. This high density of the people in a place acts as a specific factor of vulnerability or attractiveness of inimical elements in society. Soft-target is usually differentiated from the critical infrastructure, which may be soft or hard target, secured or unsecured. But the disruption of critical infrastructure can potentially cause extensive negative impacts on the security and social-economic wellbeing of the society/ community. Critical infrastructure must be protected by the country’s security and law enforcement agencies. Therefore it is indispensable to distinguish between critical and non-critical infrastructure based on the severity, duration, geographical scope and economic consequences of disruptive events. The needs of site operators predict the protection of critical infrastructure and soft targets, and public authorities must follow the risk and crisis management approaches. The interplay between critical infrastructure and soft targets is a multidimensional area which needs policy, institutional and operational coordination. Threats envisaged The presence of persistent terrorist threats against places where a large number of people gather is generally highlighted by the country’s security and law enforcement agencies. So that the public is made conscious of such vulnerabilities, terrorists may shift their attention to soft targets if the security of hard targets is heightened to make them more secure and protected. For example, as the civil aviation sector responded to the threat of terrorists by adopting pre-board security measures, the terrorists shifted their attention to surrounding places. Similarly, there has been an increase in knife and heavy vehicle attacks, breaking away from the use of armed individuals or teams of gunmen accepting lesser casualties. The possibility of terrorists seeking to employ lethal weapons to cause significant destruction on soft targets can’t be ruled out. The best examples of using lethal weapons are the sarin gas attack on the Tokyo subway in the Air India Flight attack in 1985, 1995, 9/11, Mumbai 26/11 attack, etc. Another reason for terrorist attacks against soft targets is to take hostage of people to press their demands. The nature and level of threats against soft targets are influenced by local factors and the intent of terrorists to inflict damage to life and property. The choice of terrorists depends upon personal grievances, the site’s perceived threats, the crowd’s presence, security measures in place and the target’s proximity to their operational area. An analysis of past terrorist attacks worldwide has indicated the following significant forms of terrorist attacks. All these need to be considered and addressed if we want to design an efficient security system for the protection of soft targets against terrorist attacks in future: Exploding a bomb. Suicide bombing attacks. Bomb delivered by mail. Bomb in a parked unattended vehicle. Car bomb driven by a suicide attacker running into the target. Arson. Gun attack. Hostage and barricade situation. Attack with a knife. Crowd attacking a soft target. Vehicle running into the target. Soft targets face threats of numerous types by individuals or groups driven by various motives. To create an efficient and secure environment, it is imperative to deal with the threats thoroughly and consider the available security measures to blunt the attackers’ modus operandi. Protection of soft targets Soft targets comprise a vast and diverse group of subjects. The fundamental principle for protecting soft and vulnerable targets against terrorist attacks lies in the coordinated security planning by all the stakeholders at the national and local levels. United Nations for Disaster and Risk Reduction (UNDRR) describe ‘risk management’ as a systematic approach to managing uncertainty and minimising loss. While forming a security system for a particular soft target, the first step is to make clear what is to be protected. Consequently, we initiate the process by defining the entities we value and do not wish to lose or get them harmed. Secondly, it is necessary to define the likely sources of threats to soft and vulnerable targets. To do so, we need to analyse earlier such incidents. Thirdly, then it is imperative to forecast the possible forms of the attacks. Without sound analysis of potential dangers, the security system will not be effective and may lead to wasting prime resources at disposal. All incidents in question need to be handled in three stages – Before, During and After the incident. Before Incident Take preemptive measures to diminish the likelihood of an attack, enhance the rapidity and intensity of the response, reduce the seriousness of impact and facilitate recovery. Use tools to deter attackers and create ways and means to divert the attack if it can’t be avoided. Use communication to de-escalate and calm down a threatening situation and minimise conflict. During incident Early detection of objectionable activity or transgression of restricted zones, ideally before the attack has begun. The quick response of the ‘Security Personnel’ or other members of the security system, preferably following a Standard Operating Procedure(SOP).’ After incident The management deals with the situation as described in the pre-defined coordinated plan as per the SOP, with clearly defined priorities for each post-incident phase. Fast recovery from the occurrence. Particular attention should be paid to a method known as DDRMI (Deter-Detect-React-Mitigate Impact). This is a unique tool to assess the efficiency of security measures adopted. Prevention…

Read More

INSTITUTIONALIZING NATIONAL SECURITY CULTURE IN INDIA: A Mission to Leverage the Strength of Diversity of India

National security is the bedrock of a sovereign state’s stability and development. For India, a country with a vast population and a rich tapestry of diversity, achieving a robust national security culture is not only paramount, but a strategic necessity and an existential imperative. A nation characterized by its vast diversity in culture, religion, caste, creed, and community, stands as a testament to unity in diversity. However, this very diversity makes India highly vulnerable to internal and external threats, particularly from deep state actors seeking to exploit these differences. Building a robust national security culture is crucial for safeguarding India’s ethnic integrity and sovereignty. This is the sole reason why fostering such a culture is essential to eliminate and marginalize such elements who create fissures within the social framework. “A nation’s security is fortified by its internal cohesion and the ability to embrace diversity as a strategic advantage” –– Chanakya

Read More

Hikvision Obtains CC EAL3+ Certificate for Network Cameras

Hikvision announced that its network camera product series, DS-2CD5, DS-2CD7 and PTZ version 1.1 (nearly a hundred product models), have achieved the Certificate of Common Criteria for Information Technology Security Evaluation (abbreviated as Common Criteria or CC) with assurance type EAL3 augmented with ALC_FLR.2 (EAL3+). The Common Criteria certification is mainly applicable to evaluating security and reliability of information technology products or solutions, but it also focuses on the protection of private information. The CC EAL3+ Certificate represents the highest level of security certification granted to products in the video security category. As one of the most widely recognized international standards (ISO/ IEC 15408) in information technology security, the Common Criteria certification is recognized by the National Information Assurance Partnership (NIAP) under the Department of Defense in the United States. Government organizations or agencies from 31 countries, including the US, the UK, and Canada, have participated in the Common Criteria Recognition Arrangement (CCRA). Therefore, it serves as an important basis for evaluating security of information technology. As part of the required process to achieve the Common Criteria certificate, Hikvision successfully passed the rigorous evaluation performed by the globally-recognized evaluation institution SGS Brightsight laboratory. SGS Brightsight Chief Operation Officer Asia, Kai-Fan CHANG said, “We were pleased to carry out continuous Common Criteria security evaluation cooperation from EAL2 to EAL3 with Hikvision, which we started in 2018. The EAL3 certification of large-scale product models not only fully demonstrates that Hikvision’s technical expertise in the field of information security is widely recognized by the international community, but also marks that Hikvision has the ability to manage the supply chain to ensure the daily use of information security and provide customers with more secure services.” Hikvision has always attached great importance to security and has proactively taken measures to improve the security of its products and systems. The company is committed to enabling its customers to secure their personal information with cutting-edge technology in security and privacy protection, and protecting user data through a holistic range of approaches. Visit the Cybersecurity Center for more information about Hikvision’s cybersecurity strategy and practices.  

Read More

Protecting People and the Environment with Intelligent Video Technology

Waste management and recycling have long since become an important industry. According to forecasts, the waste and recycling industry will grow worldwide in the medium term. In Germany, for example, waste management sales are expected to rise from 40.8 billion euros (2020) to 42.5 billion by 2025*. A wide variety of materials, bulk materials, hazardous and recyclable materials have to be deposited, sorted, separated, processed, stored and recycled. In the process, the companies – whether landfills or incineration plants, recycling and processing companies, recycling centers, or inhouse waste and recycling points – perform various tasks associated with numerous hazards and risks. MOBOTIX is already proving in multiple waste and recycling companies how its intelligent video technology protects people and the environment, increases operational safety, and prevents damage of many kinds. MOBOTIX has always supported endof-life management, i.e., the consideration of the entire life cycle of a product, and continues to drive this forward. Thus, solutions that further optimize the circular economy fit perfectly into the MOBOTIX corporate strategy. Fire protection: MOBOTIX now has VDScertified thermal radiometry solutions The many different materials that come together in the waste and recycling industry pose a risk, as they may react chemically with each other. Waste, stored in large halls or even on outdoor premises, can cause fires due to environmental and weather influences. For example, organic waste can – due to fermentation processes – quickly lead to considerable damage. In particular, electrical waste and used batteries are a fire hazard here. Therefore, round-the-clock monitoring is essential, and MOBOTIX offers a VdS**-certified solution. Thermal Radiometry (TR) cameras from MOBOTIX with calibrated thermal image sensors measure thermal radiation in the entire image area and trigger a so-called ‘event’ when limit values are exceeded. This can be an alarm, a network message, or the direct initiation of a fire extinguishing system. The sophisticated MOBOTIX video technology thus detects fire sources by capturing critical temperature thresholds before they occur. This way, the spread of fires can be effectively fought, and in some cases, even prevented. Perimeter protection and occupational safety with MOBOTIX Waste, primarily recyclable and recycled materials, now have an enormous value that attracts thieves. Therefore, landfills and collection points must be guarded and secured around the clock to prevent the theft of recyclable materials. In addition, security regulations for employees and visitors apply on the grounds of waste and recycling operations and must be observed at all costs. Where security and surveillance personnel used to be deployed here, MOBOTIX provides a reliable and cost-effective solution. MOBOTIX video systems for perimeter protection help detect intruders – day and night and in all weathers. MOBOTIX can even help with occupational safety. For example, the cameras can detect when helmets or vests are worn and automatically issue appropriate notices. Supporting processes: MOBOTIX controls traffic and levels MOBOTIX video technology can also help to improve processes and thus make operations more economical. For example, intelligent video analysis can automatically detect fill levels of pouring pits or containers. This reduces the workload of personnel or can provide valuable information for optimizing the site (if, for example, particular areas are not being fully utilized). Access control and documentation of vehicles can also be simplified and optimized using automatic license plate recognition. Robustness and reliability predestine MOBOTIX Environmental conditions are particularly harsh in waste management. Dust, dirt, weather influences, and changing light conditions require highly robust and reliable video systems. The housings of MOBOTIX cameras protect against moisture, corrosion, and pollutants. Highly sensitive optics, thermal sensors, and intelligent apps master even the most challenging optical conditions. The failure-free service life (MTBF) of MOBOTIX cameras is more than nine years. Conclusion “ MOBOTIX has defined waste management as a significant market for many years. Here, it is not only a matter of protecting people and recyclable materials. The waste and recycling industry is of utmost importance for our environment and the sustainable handling for our future,” said Thomas Lausten, CEO of MOBOTIX AG, “Whether it’s fire protection, site protection, occupational safety, or process optimization – our entire range of video technology solutions is used in the waste management industry. Developments we achieve here with our innovations always find a practical application in other industries, which is why Waste Management is a key market for MOBOTIX,” Lausten continued, “And companies in the waste and recycling industry can therefore be sure that with MOBOTIX, they are using a solution that is not only state-of-the-art but also so technically mature that it will be able to master future challenges that cannot even be foreseen yet, thanks to app and software updates.” Sources include Branchenanalyse Abfallwirtschaft, Hans Böckler Stiftung & Trends in Solid Waste Management der Weltbank und Statista Branchenreport. VdS Schadenverhütung GmbH is Europe’s largest institute for corporate security  

Read More