securitylinkindia

MassMediaLink India LLP SecurityLink India

interpol

INTERPOL Digital Security Challenge

Do you know how to protect your webcam from being hacked? Would you know if a cybercriminal was using your printer to carry out cyberattacks? While most of us are aware of the dangers that cybercriminals can pose to our computers and mobile phones and take steps to protect them, we seldom consider how these threats can affect the growing number of Internet vc connected devices we use in our daily lives. The ‘Internet of Things’ All devices which can connect to the Internet – collectively called the ‘Internet of Things’ or IoT – are potentially at risk of a cyberattack. Everyday personal items like video cameras, refrigerators and televisions can be used by cybercriminals for malicious means. Cyberattacks targeting or using IoT devices have increased significantly in the past two years, according to several reports from the private cybersecurity industry. An example was the Mirai botnet, which in 2016 infected tens of thousands of devices, mostly Internet routers, with weak password security. These were then used in coordinated distributed denial of service (DDoS) attacks against websites worldwide including a university and several media sites. In the world of cybercrime, the number of IoT devices a criminal has access to is seen as a sign of their status. Although police around the world are developing the skills necessary to forensically examine computers and mobile phones, they are often not aware of how to collect evidence from other connected devices. The latest edition of the INTERPOL Digital Security Challenge tackled this threat, with 43 cybercrime investigators and digital forensics experts from 23 countries investigating a simulated cyberattack on a bank launched through an IoT device. “Cybercrime investigations are becoming more and more complex and operational exercises such as the Digital Security Challenge, which simulate some of the hurdles that investigators face every day, are vital for the development of our capacities,” said Peter Goldgruber, Secretary General of the Austrian Ministry of the Interior. Meeting the challenge I n the scenario, cybercriminals attacked a bank in an attempt to steal large sums of money. The investigators analysed the bank’s computers to identify the date, time and files where the malware installed by the criminals. Through this digital forensic examination, the teams discovered the malware was contained in an e-mail attachment sent via a webcam which had been hacked, and not directly from a computer. This is an emerging modus operandi, as it is more difficult to identify the source of the attack. Once the teams accessed the digital data held by the compromised webcam, they identified the command and control server being used to remotely control the device to conduct the cyberattack. Further evidence led to the identification of a second command and control server, and the investigators identified technical vulnerabilities of the servers which could be used to prevent further attacks. Noboru Nakatani, Executive Director of the INTERPOL Global Complex for Innovation said the scenario provided a learning experience on how to conduct real-world investigations more effectively. “The ever-changing world of cybercrime is constantly presenting new challenges for law enforcement, but we cannot successfully counter them by working in isolation. “A multi-stakeholder approach which engages the expertise of the private sector is essential for anticipating new threats and ensuring police have access to the technology and knowledge necessary to detect and investigate cyberattacks,” said Mr Nakatani.   Tips for safeguarding IoT devices: Change the factory default passwords – these can be the same for hundreds or thousands of devices, making it easy for criminals to hack; Regularly update all software; Disable features which allow the device to be accessed remotely; Take extra care when buying used devices – you don’t know what the previous owner installed on the device.   Sharing expertise Conducted annually, INTERPOL’s Digital Security Challenge helps police worldwide develop the skills necessary to tackle the latest cybercrime threats. The first two events in 2016 and 2017 simulated cyber blackmail involving bitcoin and a ransomware attack. This year’s three-day (19-21 February) event was organized in close I n the Americas, hurricanes, tornadoes and earthquakes are occurring more frequently, so unimpeded mass communication during these events is critical. MNS software is often employed so companies can communicate with their employees, federal agencies, university students and the general public. More channels of communication available in these types of events, means more people can reach safety faster and more lives can be saved. In Western Europe, the second-largest market for MNS software, weather-related incidents occur less often, How Catastrophic Events are Changing Mass-Notification System Market By Robert Brooks – Analyst, Security and Building Technologies, IHS Markit cooperation with the INTERPOL National Central Bureau in Vienna and private sector partners NEC Corporation and Cyber Defense Institute. “NEC has contributed as a strategic partner to INTERPOL’s commitment to improve the cybersecurity skills of investigators throughout the world. For the third year, NEC is honored to have helped develop the Digital Security Challenge by providing our expertise at this cutting-edge event,” said Kozo Matsuo, Vice President of NEC Corporation’s Cyber Security Strategy Division.’ Training sessions to develop participants’ practical knowledge on IoT device analysis and the latest trends in malware-related crime were delivered by specialists from NEC Corporation, InfoSec, Meiya Pico, SECOM, Kaspersky Lab and Trendso the need for MNS software is lower than in the Americas. While individual countries might deal with specific weather threats – like blizzards and freezes in Sweden and flooding in the UK – in 2017 the United States alone experienced four major hurricanes. Mass-notification system (MNS) software used in emergency communication, the primary segment used during a catastrophic event, is expected to grow in the Americas at a compound annual growth rate (CAGR) of 6.8 percent from 2017 to 2021, reaching $293.1 million in 2021. Micro. Support was also provided by the UN Office on Drugs and Crime (UNODC). Kenji Hironaka, President of Cyber Defense Institute said, “We are proud to have provided forensic content and technical support during all three INTERPOL Digital Security Challenge events. We will…

Read More
nist

Security Considerations for Code Signing

Recent security-related incidents indicate the need for a secure software supply chain to protect software products (also referred to as code) during the development, build, distribution, and maintenance phases. Of particular concern is provisioning and updating software that plays a critical role in platform security. A wide range of software products including firmware, operating systems, mobile applications, and application container images must be distributed and updated in a secure and automatic way to prevent forgery and tampering. An effective and common method of protecting software is to apply a digital signature to the code. Digitally signing code provides both data integrity to prove that the code was not modified, and source authentication to identify who was in control of the code at the time it was signed. When the recipient verifies the signature, he is assured that the code came from the source that signed it, and that it has not been modified in transit.   “NIST plans to develop further guidance to help organizations evaluating, deploying or managing code signing systems. The high-level recommendations described in this document are expected to form the basis for more detailed recommended practices for code signing”   This white paper targets software developers and product vendors who are implementing a code signing system or reviewing the security of an existing system, with the goal of achieving improved security and customer confidence in code authenticity and integrity. System integrators and administrators who are concerned about the trustworthiness of the applications that are installed and run on their systems will learn the properties they should expect from a code signing solution to protect their software supply chain. This white paper describes features and architectural relationships of typical code signing solutions that are widely deployed today. It defines code signing use cases and identifies some security problems that can arise when applying code signing solutions to those use cases. Finally, it provides recommendations for avoiding those problems, and resources for more information. Properly applied, these recommendations will help to ensure that the software supply chain is resistant to attack. NIST plans to develop further guidance to help organizations evaluating, deploying or managing code signing systems. The high-level recommendations described in this document are expected to form the basis for more detailed recommended practices for code signing. The basics of code signing This section provides high-level technical details about how this process works. There are multiple roles in the process: developer, signer and verifier. Developer The developer is the entity responsible for writing, building, and/ or submitting the code that will be signed. This entity maintains a secure development environment, including the source code repository, and will submit code to the signer after it has completed the organization’s software development and testing processes. Signer The signer is the entity responsible for managing the keys used to sign software. This role may be performed by the same organization that developed or built the software, or by an independent party in a position to vouch for the source of the code. The signer generates the code signing private/ public key pair on a device that is sufficiently protected, as the security of this process relies upon the protection of the private key. In many cases, the signer then provides the public key to a certification authority (CA) through a certificate signing request. The CA will confirm the signer’s identity and provides a signed certificate that ties the signer to the provided public key. Anyone can use the public key associated with this certificate to validate the authenticity and integrity of code signed with this key pair. If no CA is used, the public key must instead be distributed using a trusted, out-of-band mechanism. The signer ensures through technical and procedural controls that only authorized code is signed. When code is submitted by developers for signing, the signer verifies their identities and their authority to request a signature. The signer may also take additional steps to verify the code is trustworthy. Ultimately, two or more trusted agents of the code signing system may be needed to approve the request and generate a digital signature. In some cases, the signed code may also be provided to a time stamp authority to indicate when the code was signed. Verifier The verifier is responsible for validating signatures on signed code. The verifier may be a software component provided by the same developer as the signed code (e.g., for a signed firmware update), or it may be a shared component provided by the platform (e.g., the operating system). Architectural components The code signing architecture is composed of a set of logical components that are responsible for different aspects of the code signing process. The code signing/ verifying architecture represented in Figure 1 potentially has four distinct components: the code signing system (CSS), the certification authority (CA), the time stamp authority (TSA), and the verifier(s). Code signing system (CSS) The first component, the CSS, receives code submitted for signing, authenticates and authorizes the submitter, and generates the signature. To generate these signatures the CSS has one or more private signing keys, which need to be carefully protected from extraction or unauthorized use. Certification authority (CA) Typically, a CSS utilizes a CA to enable authenticating the identities of signers. CAs issue certificates to signers in accordance with certificate policies, which specify the security controls and practices the CA follows when issuing certificates, and impose requirements on the subjects of the certificates. NIST Interagency Report 7924 is a reference certificate policy that specifies most of the requirements for a CA that issues code signing certificates. There are also industry groups such as the CA/ Browser Forum and the CA Security Council, that have published requirements documents for the issuance of code signing certificates. Time stamp authority (TSA) Some code signing architectures use a TSA to demonstrate when a particular piece of code was signed. When a TSA is used, signatures are sent to the TSA which applies its own signature and signing time to the package….

Read More
coment

Traditional Switch Port Security

With Cybersecurity becoming an increasingly important factor in designing modern Ethernet networks, ComNet have launched an industry first edge security feature that is both simple, secure and easy to configure and use. The ComNet exclusive Port Guardian feature has the capability to physically disable a port if unauthorized access is detected. The value in Port Guardian comes in situations where network intrusion is attempted by disconnecting an IP addressable device at the edge to connect to the network. When Port Guardian senses this disconnect, an SNMP notification is sent to the head end and the affected port is physically locked out, preventing access. The network administrator can re-enable the port once the threat is eliminated. This feature also thwarts access through ‘Spoofing’ by disabling the port as soon as an interruption is sensed. Layer 2 managed switches can typically implement port security which consists of checking incoming packets for a matching MAC address. If a packet with a valid MAC address is received on a particular port then the switch will allow that packet to pass through the switching fabric of the switch as normal. If a packet with an invalid MAC source address is received on the switch port then that packet is dropped by the switch and is not allowed to proceed any further and therefore, this provides a basic level of security as only traffic from the user defined MAC address is allowed on that port. With this method it is therefore possible to easily implement basic port security against a potential intruder from removing the original device and replacing it with a device designed for network intrusion or from cutting the cable that went to the original device and connecting this cable to their own network intrusion device to gain access to the network. This level of protection is common amongst most layer 2 managed switches on the market today and indeed all ComNet managed switches support this capability as standard. This feature is referred to by many names including (but not limited to) the following: Port locking. MAC locking. Port security. MAC filtering. What’s wrong with traditional switch port security? The issue with the traditional Layer 2 MAC filtering/ locking as previously described is that it can be defeated with relative ease in a matter of minutes by using readily available software which can artificially alter the MAC address of the sender to match whatever the potential intruder wants. In the example below the intruder will alter the MAC address of their laptop to use the same MAC address of the authorised camera and gain access to the network. How would the intruder know what MAC to spoof? So how would a potential intruder know the MAC address of the camera (in this example) in order to be able to spoof that address from their laptop and gain network access? This could be done in several ways but one simple way could be to use a low cost network tap device so the camera is briefly unplugged and then connected to the tap and then quickly re-connected to the network again. The operator would see video loss for some seconds but would unlikely put this down to a potential intruder if it was even noticed at all. How does port guardian prevent such intrusions? At the basic level Port Guardian works as a layer 1 protection system so the actual data being sent on the port is not important and the switch does not need to know anything about it. Port Guardian constantly monitors the enabled ports and as soon as it detects that a cable has been unplugged or there is a link down event that port will be immediately disabled and the network administrator notified via an SNMP alert (and optionally by a local contact relay if supported on the particular switch model) to the potential intrusion. What happens after Port Guardian locks out a port? Once Port Guardian has been triggered on a certain port then that port is in a permanent lock out condition and will appear to be dead to the potential intruder (no LEDs or anything will work on that port). The port will remain in this lock out condition even if the original legitimate device is re-connected. The lock out state can only be cleared by the network administrator through one of 4 possible methods as outlined below SNMP reset command issued. Reset via Web GUI. Port Guardian reset command issued from the local USB serial port CLI. A contact input is closed (only available on models that have contact inputs). The contact input method is user configurable and is not enabled by default. What about cycling power to the switch? This is another user configurable option. The port lock out states can be set to clear on a power cycle or they can be set to go into lock out condition in the event of a power cycle (this would be the most secure option). So how can Port Guardian be used in networks? There are really two distinct ways to use the Port Guardian feature and the correct implementation depends on how secure the location is where your remote ComNet edge switch (with Port Guardian feature) is located. An outline description and visual example of both scenarios follows. Edge switch in secure location scenario I f the ComNet edge field switch is installed within a secure location then there is no concern about an intruder gaining access to the physical switch itself so one could enable Port Guardian just on the ports where he has edge devices connected that are physically located outside of the secure location and not enable Port Guardian on the uplink port(s) which are part of the secure network. In this scenario one could also set the option to have a power cycle clear any locked out ports as again he would not be as concerned with a potential intruder being able to power cycle the switch itself. Edge switch in…

Read More
synology

Synology Strengthening NAS Portfolio in India

Synology® the global leading provider of network attached storage (NAS), IP surveillance and network equipment solutions, forays into India market with the rollout of its cutting-edge series of NAS solutions in the country. With a proven history of transforming the way users manage data, perform surveillance, and manage the network in the cloud age, Synology has set new benchmarks in the enterprise IT space, leveraging latest technologies and unprecedented innovation coupled with an exceptional customer service. The company has announced strategic partnerships with both online as well as offline channels to make its solutions available in the country. Synology’s offline distributors in India include Supertron, EBM, while Amazon will serve as the company’s online retailer. Four complete product lines of industry-leading NAS that are designed to meet different requirements and needs from personal users, small offices, SMBs, and enterprises (including XS/XS+ series; Plus series; Value series and J series) provided by the company are now available in India. The company will also be unveiling the latest DiskStation Manager 6.2 (DSM6.2) OS update along with new applications and services in the country soon. The company has registered a historic 30 percent CAGR growth in India since the year 2015 with SMBs contributing to a major chunk of this growth. Synology will also ink new partnerships in the country in the year 2018 along with organizing reseller events and trade shows as well as studying consumer behavior to ensure last mile market presence in the ongoing year. Synology creates network attached storage, IP surveillance solutions, and network equipment that transform the way users manage data, conduct surveillance, and manage network in the cloud era. By taking full advantage of the latest technologies, Synology aims to help users centralize data storage and backup, share files on-the-go, implement professional surveillance solutions, and manage network in reliable and affordable ways. Synology is committed to delivering products with forward-thinking features and the best in class customer services.     “India is aggressively marking its presence as a growth engine in the global economy, owing to an unparalleled growth in the SMB segment as well as ambitious government initiatives like Smart City Programme. We at Synology are committed to aiding this growth in the country with our industry-leading NAS solutions which help organizations gain more agility and streamline their work processes” – Mike Chen Marketing Director, Synology  

Read More

INTERPOL Facial Recognition Nets Most Wanted Murder Fugitive

Police in Buenos Aires have arrested an internationally wanted murder suspect after his image was identified as a likely match by INTERPOL’s facial recognition unit. Kristian Danev, a Slovak national aged 33, is wanted internationally by Czech authorities under an INTERPOL Red Notice following a murder ten years ago. As part of an investigation by police in Argentina, INTERPOL’s National Central Bureau in Buenos Aires submitted images of the suspect to INTERPOL’s General Secretariat headquarters for comparison against records in its facial recognition database. After the search result came up as a potential match, police in Argentina detained the suspect for further questioning, resulting in the suspect confirming his identity. “In less than 48 hours, INTERPOL’s global police cooperation platform helped locate, identify and arrest an international fugitive who had evaded justice for a decade,” said Harald Arm, Director of Operational Support and Analysis at INTERPOL. “This illustrates the fundamental role of INTERPOL’s policing capabilities and forensic data in international police investigations. We need to ensure that vital information moves faster than fugitives,” added Mr Arm. INTERPOL’s Fugitive Investigative Support unit was supported by its Command and Coordination Centre and its regional bureau in Buenos Aires. They worked closely together with the INTERPOL National Central Bureaus in Bratislava, Buenos Aires and Prague to ensure the quick exchange of information on the case. INTERPOL launched its facial recognition biometric service in November 2016. It already contains more than 44,000 images from 137 countries. Police forces across the globe use INTERPOL’s facial recognition tool daily to make connections between criminals and crime scenes, identify fugitives and missing persons or to compare mugshots.

Read More
Elbit Systems of America_Fixed Tower (IFT) border security system deployed

Elbit Deploys Border Security System

U.S. Customs and Border Protection (CBP) accepted the latest Integrated Fixed Tower (IFT) border security system deployed by Elbit Systems of America, LLC. This IFT system, located in the Sonoita, Arizona, Area of Responsibility (AoR), marks the company’s third successful deployment of the system. Other previous deployments of IFT accepted by CBP were for the Douglas and Nogales, Arizona AoRs. “Our advanced technologies provide U.S. Customs and Border Protection with trusted border security capabilities,” said Raanan Horowitz, President and Chief Executive Officer of Elbit Systems of America, “America’s Border Patrol agents rely on our operationally proven solutions for greater situational awareness and enhanced safety.” As the system integrator, Elbit Systems of America furnishes the sensor towers with radar, day/ night cameras, and command and control software that combines data into a single operating picture. Information from all the towers is networked into Border Patrol Station command and control centers, which increases situational awareness for Border Patrol Agents. IFT has proven to be a reliable system and provides CBP with 24/7 surveillance coverage. The system also provides CBP with a platform to integrate existing and future sensors to further improve border protection and agent safety. On the path to system acceptance, significant milestones must occur. Several months of construction, integration, test activity, and system verification ensure each IFT meets performance requirements. Each system must detect, track, identify, and classify border activity. Elbit Systems of America continues to meet customer performance and schedule requirements, as well as adhering to cost goals for this program.

Read More

FAU Secures College of Medicine with C•CURE 9000

Florida Atlantic University, based in Boca Raton, Fla., has selected the Software House C•CURE 9000 security and event management platform to secure a new building that is part of the Charles E. Schmidt College of Medicine, a facility which houses research, administration, and a medical clinic. Florida Atlantic University is one of 12 schools that is part of the state’s university system. The Boca Raton campus boasts 3,200 faculty and staff, providing educational services and support to 4,000 students. The College of Medicine, though small in size with 373 students, required a robust access control system that enabled the integration of video surveillance and the ability to partition access to specific areas of the facility. With C•CURE 9000, Florida Atlantic University can easily manage student access to classrooms and laboratories, which can range from 24-hour access to the building to limited facility access during examination time. In addition, the university needed to restrict access to medical record rooms, the pharmacy and other sensitive areas. The access control system is also part of the Florida Atlantic University’s Schmidt Biomedical building, with C•CURE 9000 providing coverage for all exterior entrances, research labs and elevators leading to animal research floors and the anatomy labs. According to Patrick Garmon, Director of Security Technology for Florida Atlantic University, it was important to implement a system that enabled the university to manage student access to buildings by floor and room, not just to restrict overall building access. “Florida Atlantic University has harnessed the vast capabilities that C•CURE 9000 has to offer when it comes to security and access control management,” said Jason Ouellette, Global Product General Manager, Access Control, Building Technologies & Solutions, Johnson Controls, “Whether managing access to laboratories, the pharmacy or medical records, C•CURE 9000 provides flexibility to easily manage and adjust the system based on current needs.”

Read More

Motorola Solutions Advanced Technology for Rail Project in Malaysia

Motorola Solutions will help make daily rail transport in Malaysia safe, efficient C•CURE 9000 and reliable for the country’s first Klang Valley Mass Rapid Transit (MRT) line. The landmark rail modernisation project will bring significant benefits to Malaysia, including greatly improved transport services while reducing traffic congestion in the Greater Kuala Lumpur metropolitan area. As a technology partner to the APLG consortium, Motorola Solutions will deliver a highly secure and reliable TETRA two-way radio communications network for the project. The 51 kilometre SBK line comprises 31 stations including seven underground stations. It is part of an integrated mobility project that will provide seamless urban transportation for 1.2 million residents in the Greater Kuala Lumpur and Klang Valley region. Modern rail transportation systems are vital to economic growth. According to professional services firm PwC, transport infrastructure investment will grow by around 5 percent globally to 2025 with Asia Pacific being the largest transport infrastructure market. Byung Il Park, Project Director for the APLG consortium said, “Cooperating with Motorola Solutions enables our companies to combine their local and global expertise. Working together, we will deliver a highly-customised communication system providing timely and secure transportation services for the Malaysian public.” Datuk Mohd Rauf Nasir, Country President, Motorola Solutions Malaysia said, “Resilient and reliable communication will ensure the Klang Valley Mass Rapid Transit (MRT) line project is delivered without compromising the safety of commuters and rail workers.” “Throughout the project’s four-year construction and into its daily operational use, our communication network will provide security, safety and convenience for workers and users of the urban transportation system,” said Datuk Mohd Rauf. Motorola Solutions will supply, design and install the complete, digital two-way radio communications network for the new MRT line, including more than 500 TETRA radio devices and base stations. “Motorola Solutions has a strong track record of innovation and exceptional engineering talent in Malaysia. This is the first time that our all Malaysia-based team of engineers will manage an entire metro rail project from end-to-end,” said Datuk Rauf. Public rail transportation represents a key part of Malaysia’s economic development program in the Kuala Lumpur and Klang Valley area with two additional MRT lines proposed under the Klang Valley MRT project. Line 2 is expected to be completed by 2022.  

Read More
UruguayU_MS_bldgTower

Milestone Secures University in Uruguay

When moving to a new headquarters four times larger, the School of Information and Communication of the University of the Republic of Uruguay in Montevideo needed to implement a video monitoring system that provides high performance and reliability. The University is a structure of 8,500 square meters and four floors that now house nearly 4,000 students, 200 teachers and 80 administrative and logistics staff on a daily basis. As Yonathan Benelli, IT Manager at Udelar states, “The new headquarters greatly increased the vulnerability points for security. Without a video system like the one now implemented, it would be unfeasible to maintain an acceptable level of security.” Benelli adds that despite the need for a professional video surveillance system for the educational institution, it was unthinkable to carry out a traditional CCTV installation with coaxial cabling, due to its high cost. Therefore, the installation of a Milestone IP video management system within the existing IT network infrastructure versus performing a coaxial interconnection resulted in a very significant cost reduction. The savings were not only in technology acquisition, but also in hardware and human resources. “We estimate that without this system, we would have needed at least four added employees dedicated to surveillance. Also, we took advantage of existing hardware,” said Benelli. A custom-made solution Foxsys, the company managing the technology integration for this project, proposed the implementation of the XProtect Professional solution from Milestone Systems. It is an open interface application designed for IP network video management software with easy, intuitive and powerful functions. The XProtect Smart Client interface has advanced search tools that combine with an easy-to-navigate video timeline, allowing users to quickly and accurately examine events. It also offers sophisticated export options, including the Storyboard feature, which helps consolidate relevant video evidence to gain a complete view of incidents. According to Juan Martín González, Commercial Director of the Foxsys Integrating Firm, “The XProtect Professional software was selected because of the system’s alarm notifications which were important in this application.” He said the solution was complemented by two virtual machines that operate on an HP server and are managed by the software Promox, which proved highly reliable. Digital Watchdog and Hikvision cameras were used. “In particular, the DW cameras allowed us to have a 180-degree panorama of some specific areas and the HK cameras were extremely useful because Milestone recognizes the video analytics’ algorithms of crossing a perimeter line that run in the camera. A data network was implemented on Cat 6 UTP and HPE PoE 1920 switches. In terms of storage, we used the NAS QNAP brand with eight bays of 4TB each, implementing a RAID 5 for more protection and data writing speed. We were surprised how well Milestone worked on a Proxmox virtual machine,” says Gonzalez. Advantages and high satisfaction “ The implementation was a success in every sense, not only from the point of view of the service provided by the system, but also by the guidance, suggestions and labor that the company provided beyond the installation and configuration, in which all the required and additional goals were met,” concluded Benelli.

Read More
forensic_to_real-time

Axis for UK Public Transport Security

A move away from legacy analogue CCTV technology to IP video solutions will enable critical transport networks to effectively deter, detect and delay threats to ensure passenger safety. More than 85% of transport networks across Western Europe are planning to install IP cameras in the near future. That’s according to a recent survey commissioned by Axis Communications, the leading provider of network video and audio technology, in partnership with the global public transport organisation The Union Internationale des Transports Publics (UITP). Globally, the transport industry has led the way in using network video for both security and commercial applications. IP video surveillance is also increasingly playing a crucial role in the smooth and efficient running of significant parts of the UK’s rail network, highlighted by the successful deployment of network camera technology at Canary Wharf Station. This helped the station facilitate 24-hour rail operations and improve passenger safety. The shift to IP video surveillance is helping operators utilise real-time analytics to enhance decision making, ranging from common platform changes to the more infrequent critical scenarios such as a station clearance in response to a security threat or other emergency. For example, machine learning technology is helping turn vast transport surveillance infrastructures into live monitoring systems. This software identifies what is ‘normal’ activity within a scene, automatically creating an alert if ‘abnormal’ activity is recognized. However, despite this migration trend, the UK has struggled to keep pace with developments in such technologies. Although 97.3% of survey respondents said they had some degree of video surveillance installed, 66% cited either other priorities, funding difficulties, or no clear business case as the main barriers for not investing in more innovative IP technology. Interestingly, approximately 75% of those who responded no clear business case relied on outdated analogue technology to meet their surveillance needs. Lucas Young, Business Development Manager, Transportation, Axis Communications states, “These results are incredibly important. The perceived lack of a business case highlights that many transport operators are unaware of the security and efficiency benefits realtime video surveillance can offer. To respond to security events as and when they happen; a proactive rather than reactive approach is required. That just isn’t possible with legacy CCTV equipment. “When analysing security footage in real-time with advanced IP technology, operators are faced with hundreds of live feeds. This may seem daunting, but automated alerts can assist in managing the increased amount of data real-time video creates, helping to identify potential threats as they happen, preventing them from becoming security incidents. This is also freeing up staff time, so they can concentrate on improving the passenger experience.” Lucas Young continues, “While the benefits of connecting once offline technologies to a network creates an array of benefits for transport networks, it is also important to note that all devices connected to the internet are potentially vulnerable to cyber-attack. Cybersecurity is a huge issue for the transport industry and could prove a costly oversight if technology is not implemented correctly. We aim to protect our transport networks not only from physical threats, but also online ones.”  

Read More