securitylinkindia

Emerging Trends in CCTV Technology: Revolutionizing Surveillance in 2024 and Beyond

Introduction In the ever-evolving landscape of security and surveillance, CCTV technology continues to play a pivotal role in safeguarding our homes, businesses, and public spaces. As we proceed towards the second last quarter of 2024, a host of exciting trends are reshaping the CCTV industry, offering unprecedented levels of intelligence, efficiency, and accessibility. In this article, we explore the upcoming CCTV trends that promise to revolutionize the way we monitor and protect our environments. AI-powered Analytics at the Edge Redefining Surveillance: Computing for Real-time Analysis Artificial Intelligence (AI) is at the forefront of the next-generation CCTV revolution. By harnessing the power of machine learning algorithms, modern CCTV cameras can now analyze video feeds in real-time. Advanced AI-powered analytics enable features such as facial recognition, object detection, and behavior analysis. This not only enhances security but also facilitates proactive decision-making and anomaly detection. Infinova has already introduced Edge based AI solutions, thereby directly making Metadata accessible for quick analysis and action. Edge computing is rapidly emerging as a transformative trend in the CCTV industry. With increased processing power at the device level, cameras can perform advanced analytics and decision-making locally, reducing the need for continuous data transmission to central servers. This not only minimizes bandwidth usage but also enhances response times and real-time event detection. Infinova has evolved its AI solutions from simple loitering, tripwire and motion detection to include various categories like video anomaly, behaviour analysis, sound detection, statistics detection, optimum selection, face capture, video structurization, person and vehicular attributes a transformative trend in the CCTV industry. With increased processing power at the device level, cameras can perform advanced analytics and decision-making locally, reducing the need for continuous data transmission to central servers. This not only minimizes bandwidth usage but also enhances response times and real-time event detection. Infinova has evolved its AI solutions from simple loitering, tripwire and motion detection to include various categories like video anomaly, behaviour analysis, sound detection, statistics detection, optimum selection, face capture, video structurization, person and vehicular attributes “In the ever-evolving landscape of security and surveillance, CCTV technology continues to play a pivotal role in safeguarding our homes, businesses, and public spaces. As we proceed towards the second last quarter of 2024, a host of exciting trends are reshaping the CCTV industry, offering unprecedented levels of intelligence, efficiency, and accessibility” High-resolution and 4K Cameras for Unmatched Clarity As demand for clearer, detailed footage grows, CCTV manufacturers are increasingly adopting high-resolution and 4K cameras. These cutting-edge devices provide an unmatched level of image clarity and precision, enabling more accurate identification of suspects and critical details. As the costs of 4K technology continue to decrease, and Infinova have been one of the first company to introduce it in Indian market, the first 4K CCTV camera device we sold in India in 2017, and over the period there have been many improvements in product design, capabilities and encoding which has been a game changer in exceptance of these solutions, we expect to see a broader adoption across various surveillance applications and verticals. Cloud-based Storage and Remote Access The paradigm of CCTV storage is shifting towards the cloud. Cloud-based storage solutions offer numerous advantages, including cost-effectiveness, scalability, and easy remote access. Users can now securely access footage from their CCTV cameras through mobile devices or web interfaces, regardless of their physical location. This trend is set to democratize surveillance, empowering users with greater control over their security systems. Though in our Indian market context, homes and small businesses have started experimenting with it; however, major critical industries and Government entities are still to find a way to come to acceptance amongst the hurdles of safety and data protection. Thermal Imaging and Enhanced Night Vision In the quest for comprehensive surveillance, thermal imaging and enhanced night vision capabilities are gaining prominence. CCTV cameras equipped with thermal sensors can detect heat signatures, enabling efficient monitoring in challenging low-light or dark environments. By incorporating cutting-edge night vision technologies, surveillance systems can deliver clear, actionable footage even in the darkest hours. Infinova has aligned interests in this segment and have included thermal product range in our kitty offering various dual sensor solutions for fixed and PTZ deployments capable of identifying heat signatures over large distances incomprehensible by standard optic sensor based cameras. Privacy Enhancements for Ethical Surveillance With public awareness about privacy concerns growing, the industry is prioritizing privacy enhancements. There is growing emphasis on privacy features like on-device processing for certain analytics, ensuring compliance with privacy regulations. CCTV manufacturers are developing technologies that enable on-device processing for specific analytics, safeguarding individuals’ privacy while still providing effective surveillance solutions. By adhering to ethical practices, the industry seeks to strike a balance between security and individual rights. Infinova has achieved OWASP Security Audit Clearance for all its products by government empanelled CERT-IN affiliated agency. “As demand for clearer, detailed footage grows, CCTV manufacturers are increasingly adopting high-resolution and 4K cameras. These cutting-edge devices provide an unmatched level of image clarity and precision, enabling more accurate identification of suspects and critical details. As the costs of 4K technology continue to decrease, and Infinova have been one of the first company to introduce it in Indian market, the first 4K CCTV camera device we sold in India in 2017, and over the period there have been many improvements in product design, capabilities and encoding which has been a game changer in exceptance of these solutions, we expect to see a broader adoption across various surveillance applications and verticals” Integration with Smart Home Devices Seamless integration with smart home systems is becoming a norm for modern CCTV cameras. Users can now control and access their surveillance feeds through voice commands and dedicated mobile applications. This integration not only enhances user experience but also unlocks possibilities for intelligent automation and customization of security settings. Conclusion As we move further into 2024, the CCTV industry continues to evolve rapidly, driven by the relentless pursuit of innovation. AI-powered analytics, high-resolution cameras, cloud-based storage, and privacy enhancements are just…

Read More

Harnessing the Collective Defense with Intelligence Sharing and Continuous Threat Exposure Management

Prashant G JCEO, Technobind As technology advances, cybercriminals continually refine their methods, creating an ever-evolving challenge for security professionals. Traditional cybersecurity measures often fall short, unable to keep pace with modern cyber threats’ sophistication and speed. This has prompted the rise of Continuous Threat Exposure Management (CTEM) and Collaborative Defense Strategies, where organizations proactively share information and insights about potential and ongoing cyber threats. By pooling threat intelligence—data about emerging threats, attack patterns, vulnerabilities, and indicators of compromise (IOCs) – organizations can leverage the collective wisdom of the cybersecurity community. This dynamic, proactive approach is essential for staying ahead in the ever-evolving cyber battleground, ensuring defenses are always aligned with the current threat landscape. The power of collective defense Cyber Threat Intelligence (CTI) sharing is a strategy that allows organizations to pool their knowledge of threats and vulnerabilities. By collaborating, businesses can gain a more comprehensive understanding of the threat landscape, anticipate potential attacks, and respond more effectively. This collective defense mechanism is essential in an era where cyber criminals are increasingly sophisticated and well-funded. Recent statistics underscore the importance of CTI sharing. According to a report by Cybersecurity Ventures, global cybercrime costs are predicted to reach $10.5 trillion annually by 2025, up from $3 trillion in 2015. This exponential rise in cybercrime highlights the urgent need for organizations to work together to combat these threats. Furthermore, a study found that companies with a well-integrated CTI sharing program save significantly on breach costs compared to those without such programs. Continuous threat exposure management: A proactive approach While CTI sharing provides a broad understanding of the threat landscape, Continuous Threat Exposure Management (CTEM) focuses on the specific vulnerabilities within an organization. CTEM involves continuously identifying, assessing, and mitigating threats to minimize exposure and enhance overall security posture. This dynamic approach ensures that organizations are not just reacting to threats but are proactively managing them. Gartner forecasts that by 2026, organizations that align their security investments with a CTEM program will experience a two-thirds decrease in breaches. This significant adoption trend reflects the growing recognition of CTEM’s value in maintaining a robust cybersecurity framework. Additionally, organizations employing CTEM have reported a 40% reduction in vulnerability exposure time, significantly decreasing the window of opportunity for cybercriminals. The combined impact of CTI and CTEM The integration of CTI sharing with CTEM creates a synergistic effect, enhancing the overall security strategy of an organization. While CTI sharing provides the necessary intelligence to understand external threats, CTEM ensures that internal vulnerabilities are continuously monitored and addressed. This combination not only strengthens the immediate security posture but also builds resilience against future attacks. A recent survey found that 75% of organizations that combined CTI sharing with CTEM reported a significant improvement in their ability to detect and respond to cyber threats. This statistic underscores the effectiveness of a unified approach to cybersecurity, where information sharing and proactive management work hand in hand. In conclusion, harnessing the collective defense potential through Cyber Threat Intelligence sharing and Continuous Threat Exposure Management is pivotal in the fight against cybercrime. By embracing these strategies, organizations can stay ahead of adversaries, protect their assets, and contribute to a safer digital ecosystem. As cyber threats continue to evolve, so must our approaches to defending against them – collaboration and continuous improvement are key. * Views expressed in the article are solely of the Author

Read More

INSTITUTIONALIZING NATIONAL SECURITY CULTURE IN INDIA: A Mission to Leverage the Strength of Diversity of India

Introduction National security is the bedrock of a sovereign state’s stability and development. For India, a country with a vast population and a rich tapestry of diversity, achieving a robust national security culture is not only paramount, but a strategic necessity and an existential imperative. A nation characterized by its vast diversity in culture, religion, caste, creed, and community, stands as a testament to unity in diversity. However, this very diversity makes India highly vulnerable to internal and external threats, particularly from deep state actors seeking to exploit these differences. Building a robust national security culture is crucial for safeguarding India’s ethnic integrity and sovereignty. This is the sole reason why fostering such a culture is essential to eliminate and marginalize such elements who create fissures within the social framework. “A nation’s security is fortified by its internal cohesion and the ability to embrace diversity as a strategic advantage” – Chanakya Concept of national citizen security culture National security culture refers to the collective mindset, practices, attitudes and behaviors of a nation’s citizens, institutions, and government towards safeguarding national interests and sovereignty. It encompasses actions that prioritize the protection of the nation from external aggression and internal destabilization. For India, with its unique socio-cultural fabric, establishing a national security culture is crucial given its strategic geographic location, geopolitical significance, and diverse socio-cultural landscape. It must be inclusive, resilient, and adaptive to both conventional and unconventional threats. Barriers to national security culture in India a) Deep States and Institutional Challenges The concept of a ‘deep state’ involves clandestine networks of power within the government and its institutions that operate independently of elected officials. In India, this phenomenon manifests through entrenched bureaucracies, intelligence agencies, and political factions that often work at cross purposes. These entities can undermine national security efforts by prioritizing their interests over collective goals. For example, bureaucratic red tape can delay critical security decisions, while competing intelligence agencies may withhold crucial information. This lack of coherence and coordination hampers the development of a unified national security strategy. b) Regional Politics and Aspirations India’s federal structure grants significant autonomy to its states, fostering regionalism. While this decentralization is vital for governance, it can also lead to conflicting interests between the central and state governments. Regional parties, driven by local aspirations and political gains, sometimes adopt positions that contradict national security imperatives. Instances of states refusing to cooperate with central security directives or engaging in separatist rhetoric illustrate the friction between regional and national priorities. Such discord weakens the overall security apparatus and creates vulnerabilities that can be exploited by adversaries. Our nation’s strength lies in its diversity. By uniting our varied cultures and traditions under a common cause of national security, we build an unbreakable security shield for our country – Sardar Vallabhbhai Patel c) Exploitation of Diversity by Internal Adversaries India’s diversity is a source of strength but also a potential vulnerability. Religious, linguistic, caste, and community differences are often manipulated by internal adversaries to foment discord. These adversaries can be political entities, extremist groups, or foreign agents aiming to destabilize the nation. For example, communal riots, caste-based violence, and regional insurgencies have been fueled by narratives that exploit these differences. The proliferation of misinformation and propaganda through social media exacerbates these tensions, making it challenging to foster a unified national security culture. Strategies for institutionalizing national security culture a) Strengthening Institutional Coordination To mitigate the influence of deep states, it is imperative to enhance coordination among various security institutions. This can be achieved through: b) Bridging the Center-State Divide Reconciling regional and national interests requires a nuanced approach: c) Leveraging Diversity for National Unity Rather than viewing diversity as a liability, it can be harnessed to strengthen national security: d) Enhancing Public Awareness and Participation A national security culture requires active participation from the citizenry: “In a land as diverse as India, the British must act as the glue that binds various regions and communities together, ensuring stability and preventing the rise of dissent“ – Lord Wellesley e) Case Studies and Global Perspectives Examining successful models from other nations can provide valuable insights: The evolving security landscape Today, we stand at a critical juncture where the role of the private security industry extends beyond its traditional boundaries just short of becoming an integral part of our national security architecture. As we navigate through an increasingly complex and volatile global environment, the nature of threats we face has evolved. Conventional military threats are now supplemented by hybrid threats, including subversion, sabotage, misinformation campaign and propaganda, which aim to undermine our national integrity and societal cohesion. British who ruled India for 100 years had analyzed the weaknesses of India and designed their policies to exploit it. Quotes of Lord Wellesley and Lord Mountbatten are true testimony to it. This diversity still lends itself for exploitation and breaking the country into fragmentation. In this context, the private security industry has a pivotal role to play as a second line of defense, reinforcing our national security culture. In this context, the private security industry has a pivotal role to play as a second line of defense, reinforcing our national security culture. a) Enhanced Surveillance and Intelligence Gathering Private security personnel are often the first responders in various sectors, including corporate, industrial, and residential areas. On-ground presence and vigilance can be crucial in identifying and reporting suspicious activities, thereby acting as a vital extension of our national intelligence apparatus. “The challenge of governing India lies in its immense diversity. Our task has been to maintain order and unity in a land where differences could easily lead to discord“ – Lord Mountbatten b) Protection of Critical Infrastructure The safeguarding of critical infrastructure such as power plants, communication networks, and transportation hubs is essential for national security. Private security firms can complement public security forces by providing specialized protection services, ensuring these vital assets are secure from sabotage and attacks. c) Cybersecurity and Information Protection In the digital age, cyber threats are a significant…

Read More

From Embezzlement to Executive Frauds: How Private Investigators Can Help

Lt Col Vipin Bhatia (Retd) CEO, Hatfield In contemporary times, there have been countless instances where individuals or businesses encounter various malicious activities in their daily lives, often catching them off-guard and leaving them feeling utterly helpless. These incidents significantly disrupt their peace of mind and productivity, creating a profound sense of betrayal. Such incidents encompass a wide range of offences including theft, digital and financial fraud such as credit card scams and online frauds, asset misappropriation, identity theft, and numerous others. Hatfield Investigation & Consulting, a leading investigation firm, has a track record of assisting individuals and industries in effectively resolving such incidents. We have successfully investigated and exposed numerous fraudsters, providing resolutions directly or in collaboration with internal investigation teams. Over the years, we have been privileged to contribute to resolving cases across various sectors including steel, oil & gas, logistics, manufacturing, hospitals, and more. This article marks the beginning of a series where we highlight a case from the hospital sector and two cases from the financial industry, showcasing our experience in uncovering and investigating fraudulent activities. We will also include ‘Additional Bytes,’ on common points to safeguard against thefts/ frauds/ cyber crimes etc. Major Hospital Medicine Theft Case In a high-stakes theft at one of the largest hospitals in New Delhi, medicines worth Rs.27 Lakhs were stolen from the pharmacy department. Detective Ajit Singh played a pivotal role in unravelling the mystery of the stolen medicines, valued at Rs.27 Lakhs. Faced with 200 employees, Singh methodically narrowed the suspects to 20 through meticulous analysis. After implementing intensive surveillance, the list was reduced to 10 suspects in a week, and finally to 5 individuals. Coordinating with law enforcement, three out of the five suspects were apprehended, recovering medicines worth Rs. 5 Lakhs. Multiple surveillance and discreet investigation teams were instrumental in building a strong case. The conviction was very strong, with the first accused granted bail after 11 months. Ajit Singh was honoured with the ‘Private Investigator of the Year Award’ for his exceptional achievements in solving the theft case. Financials Frauds (Huge Digital Loots) Digital payments have become the norm of the hour. Goods are being dropped at the doorstep and numerous modes of payment are available. Customer is put into huge comfort. With the digital revolution, India is probably the only country where even a roadside cart puller can pull off digital payments. India has become the hub of financial frauds via various digital modes of payment. Every day, news on fraud coming out in the open has become normal. In India, digital payment frauds are now at an all-time high at INR14.57 billion in the first six months of the financial year 2024. Pune WhatsApp Case (2.45 Cr loss) Cyber criminals added two brothers to a WhatsApp group and enticed them with promises of substantial earnings through a ‘share trading account.’ Both brothers, who were IT professionals, were manipulated by a tech-savvy fraudsters using deceptive software that falsely displayed significant profits in their investment portfolio. Instead of withdrawing their funds, they continued to invest as instructed based on tips from the group. The fraudsters transferred money to various bank accounts, leading the brothers to believe their investments were being traded in the stock market. They were misled into thinking their initial 2 crore investment had grown to 8 crores. In March 2024, when they attempted to withdraw their supposed earnings, they were informed that SEBI (Securities and Exchange Board of India) had frozen the account due to surveillance concerns. How to Safeguard against such scam Visakhapatnam Fake Customs Official Case (5.92Cr loss) Fraudsters impersonating customs officials or law enforcement agencies contact individuals, claiming parcels addressed in their name have been seized due to allegations involving narcotics, counterfeit passports, or illicit weapons. They coerce victims into participating in video calls where they appear in police uniforms, and brandish government IDs like Aadhaar cards submitted during courier deposits, lending credibility to their claims. They fabricate convincing narratives and eventually request small sums of money, disguised as public fines or legal fees, to resolve the supposed legal issues. In Visakhapatnam alone, by May 2024, 12 instances of courier fraud were reported, amounting to a staggering loss of 5.92 crore rupees, where victims were coerced into depositing large sums as ‘resolution fees.’ How to Safeguard against such courier frauds/ scam Additional Bytes How to protect yourself against cyber crimes * Views expressed in the article are solely of the Author

Read More

Breaking Through with Large Models: Future Trends in Night Vision Technology

Hardware keeps improving, but the benefits to image quality are decreasing In the AIoT industry, image quality has always been the core goal for IP cameras. Therefore, the key components of IP cameras have been continually upgraded in recent years. Lens apertures have increased from F1.6 in the first generation to F1.0 today, and sensors have advanced from 2013’s FSI to 2018’s 1/ 1.8 BSI sensors. Despite these improvements, we see signs that hardware development is reaching its limits. Issues like motion blur and detail loss in complex environments still persist. Further hardware upgrades are costly and face the challenge of production quality. To achieve breakthroughs in image quality, many people are looking for solutions with fill lighting. However, even with color temperature, the improvements are subject to diminishing returns: costs rise, but the enhancements become minimal. We need to seek new technological breakthroughs. When hardware reaches the limit of image quality improvement, what is the next technological breakthrough? The answer lies in Wise-ISP technology based on UNV large model. Uniview is the first in the industry to apply large models to image processing, achieving significant improvements in night vision through deep integration of image technology and algorithms. Redefining image capabilities with UNV large model Large models have found widespread application and attention in various fields. From ChatGPT’s success in language processing to Midjourney and Sora’s advancements in text-to-image and video generation, the potential of large models is undeniable. In AIoT field, UNV large model shows strong application prospects. UNV large model focuses on multiple aspects of the AIoT field, including vision, natural language, multimodal, and image processing, with core advantages. Additionally, the large model redefines scene coverage, with over 200 detailed scenarios achieving all-time, all-weather coverage. Uniview invested in over 200 people in the development stage, 80% of whom hold master’s degrees or higher, leading to comprehensive improvements in image technology across models, scenarios, and productization. This resulted in the unique fifth-generation night vision technology, Wise-ISP. Game-changing improvement in image quality Based on UNV large model, Wise-ISP night vision technology surpasses traditional limits, easily handling ultra-dark scenarios and meeting diverse needs. To ensure product consistency, Uniview established an objective image evaluation system to rate camera performance in complex lighting conditions. This system looks at eight major indicators and over 1,000 image factors, optimizing each grade. To further enhance image quality, a new automated image professional lab was built to simulate various angles, brightness levels, and color temperatures, challenging cameras in low light, ultra-wide dynamic, strong light, and complex white balance environments. The vast data generated by automated testing feeds back into Uniview’s large model, helping Wise-ISP’s model training. Through continuous software and algorithm optimization, Uniview is leading the future of night vision technology. This is not just technological progress but a redefinition of industry development. UNV large model and Wise-ISP technology show our commitment to future image processing technology. We believe that through sustained innovation and technology growth, Uniview will continue to lead industry development, providing users with higher quality image experiences. In the AIoT field, hardware setup determines cost, software and algorithm tuning determine image quality, and price dictates market choice. The Owlview series cameras, equipped with Wise-ISP technology, have become the top choice for night vision cameras. In the future, we will extend Wise-ISP technology to more product series, so stay tuned. * Views expressed in the article are solely of the Author

Read More

Emerging Trends in CCTV Technology: Revolutionizing Surveillance in 2024 and Beyond

Introduction In the ever-evolving landscape of security and surveillance, CCTV technology continues to play a pivotal role in safeguarding our homes, businesses, and public spaces. As we proceed towards the second last quarter of 2024, a host of exciting trends are reshaping the CCTV industry, offering unprecedented levels of intelligence, efficiency, and accessibility. In this article, we explore the upcoming CCTV trends that promise to revolutionize the way we monitor and protect our environments. AI-powered Analytics at the Edge Redefining Surveillance: Computing for Real-time Analysis Artificial Intelligence (AI) is at the forefront of the next-generation CCTV revolution. By harnessing the power of machine learning algorithms, modern CCTV cameras can now analyze video feeds in real-time. Advanced AI-powered analytics enable features such as facial recognition, object detection, and behavior analysis. This not only enhances security but also facilitates proactive decision-making and anomaly detection. Infinova has already introduced Edge based AI solutions, thereby directly making Metadata accessible for quick analysis and action. Edge computing is rapidly emerging as a transformative trend in the CCTV industry. With increased processing power at the device level, cameras can perform advanced analytics and decision-making locally, reducing the need for continuous data transmission to central servers. This not only minimizes bandwidth usage but also enhances response times and real-time event detection. Infinova has evolved its AI solutions from simple loitering, tripwire and motion detection to include various categories like video anomaly, behaviour analysis, sound detection, statistics detection, optimum selection, face capture, video structurization, person and vehicular attributes etc., catering to a plethora of combinations which can be simultaneously run on cameras. As the use cases change there is always a demand for something new and with AI at the helm, nothing but ‘Change is Permanent.’ “In the ever-evolving landscape of security and surveillance, CCTV technology continues to play a pivotal role in safeguarding our homes, businesses, and public spaces. As we proceed towards the second last quarter of 2024, a host of exciting trends are reshaping the CCTV industry, offering unprecedented levels of intelligence, efficiency, and accessibility” High-resolution and 4K Cameras for Unmatched Clarity As demand for clearer, detailed footage grows, CCTV manufacturers are increasingly adopting high-resolution and 4K cameras. These cutting-edge devices provide an unmatched level of image clarity and precision, enabling more accurate identification of suspects and critical details. As the costs of 4K technology continue to decrease, and Infinova have been one of the first company to introduce it in Indian market, the first 4K CCTV camera device we sold in India in 2017, and over the period there have been many improvements in product design, capabilities and encoding which has been a game changer in exceptance of these solutions, we expect to see a broader adoption across various surveillance applications and verticals. Cloud-based Storage and Remote Access The paradigm of CCTV storage is shifting towards the cloud. Cloud-based storage solutions offer numerous advantages, including cost-effectiveness, scalability, and easy remote access. Users can now securely access footage from their CCTV cameras through mobile devices or web interfaces, regardless of their physical location. This trend is set to democratize surveillance, empowering users with greater control over their security systems. Though in our Indian market context, homes and small businesses have started experimenting with it; however, major critical industries and Government entities are still to find a way to come to acceptance amongst the hurdles of safety and data protection. Thermal Imaging and Enhanced Night Vision In the quest for comprehensive surveillance, thermal imaging and enhanced night vision capabilities are gaining prominence. CCTV cameras equipped with thermal sensors can detect heat signatures, enabling efficient monitoring in challenging low-light or dark environments. By incorporating cutting-edge night vision technologies, surveillance systems can deliver clear, actionable footage even in the darkest hours. Infinova has aligned interests in this segment and have included thermal product range in our kitty offering various dual sensor solutions for fixed and PTZ deployments capable of identifying heat signatures over large distances incomprehensible by standard optic sensor based cameras. Privacy Enhancements for Ethical Surveillance With public awareness about privacy concerns growing, the industry is prioritizing privacy enhancements. There is growing emphasis on privacy features like on-device processing for certain analytics, ensuring compliance with privacy regulations. CCTV manufacturers are developing technologies that enable on-device processing for specific analytics, safeguarding individuals’ privacy while still providing effective surveillance solutions. By adhering to ethical practices, the industry seeks to strike a balance between security and individual rights. Infinova has achieved OWASP Security Audit Clearance for all its products by government empanelled CERT-IN affiliated agency. Integration with Smart Home Devices Seamless integration with smart home systems is becoming a norm for modern CCTV cameras. Users can now control and access their surveillance feeds through voice commands and dedicated mobile applications. This integration not only enhances user experience but also unlocks possibilities for intelligent automation and customization of security settings. “As demand for clearer, detailed footage grows, CCTV manufacturers are increasingly adopting high-resolution and 4K cameras. These cutting-edge devices provide an unmatched level of image clarity and precision, enabling more accurate identification of suspects and critical details. As the costs of 4K technology continue to decrease, and Infinova have been one of the first company to introduce it in Indian market, the first 4K CCTV camera device we sold in India in 2017, and over the period there have been many improvements in product design, capabilities and encoding which has been a game changer in exceptance of these solutions, we expect to see a broader adoption across various surveillance applications and verticals” Conclusion As we move further into 2024, the CCTV industry continues to evolve rapidly, driven by the relentless pursuit of innovation. AI-powered analytics, high-resolution cameras, cloud-based storage, and privacy enhancements are just a few trends shaping the future of surveillance. These advancements promise to redefine the way we approach security and surveillance, making it more intelligent, accessible, and effective than ever before. As the technology matures, the possibilities for safer environments and streamlined operations become more apparent, heralding…

Read More

Hacktivism Soars in 2023: India Emerges as a Major Target

Nikhil Karan TanejaVice President and Managing Director forIndia – The Middle East and South AsiaRadware Hacktivism reached new heights in 2023. It was a year where new hacktivists appeared on the threat scene and became more visible through Telegram, a popular social media platform leveraged by many threat actors. India was certainly not immune to this hacktivist activity. In fact, according to Radware’s recent Global Threat Intelligence Analysis, India was the second most targeted country for hacktivist activity in the world in 2023 with 1242 claimed attacks – second only to Israel with 1480 claimed attacks. By learning more about these regional hacktivist trends, evolving attack tactics, and cyber targets, and the bad actors shaping them, organizations can make more informed decisions about their security defenses and respond faster to current threats. Hacktivist tactics and targets Hacktivism is a complex phenomenon that can be motivated by various factors, including religious and political beliefs. While hacktivists may have different motivations and methods, they all share a desire to use technology to advance their cause and to challenge those they believe are acting against it. Hacktivists use a variety of tactics to achieve their goals, and the specific tactics they use depend on their motivations and the resources they have at their disposal. Their methods are constantly evolving as new technologies and platforms emerge. While some tactics may be illegal or unethical, hacktivists argue that they use their skills to promote social or political change and hold powerful organizations and governments accountable for their actions. Some common tactics used by hacktivists: DDoS attacks are not only surging in volume and frequency but are also getting more sophisticated. According to Radware’s threat intelligence report, the number of attacks in the first quarter of 2024 in India alone rose 121%, compared to the fourth quarter of 2023. Some of the latest threat intelligence also shows a global shift in DDoS tactics as attacks progress from Layers 3 and 4 to Layer 7. Layer 7 attacks target not just online applications and their APIs, but also essential infrastructure such as the Domain Name System. In India, the top targeted website category during the first quarter of 2024 was government with 45 claimed attacks. Education and financial services ranked second and third with 35 and 16 attacks respectively. These high-value targets attract malicious actors because of publicity they generate when targeted, and the tactical advantage they serve in hybrid warfare Media campaigns: Hacktivists use social platforms like Telegram, Twitter, and Facebook to spread their message and raise awareness for their cause. They create viral campaigns or use hashtags to amplify their message and reach a wider audience. DragonForce Malaysia has proven to be highly effective in their communications and moved part of their private forum to a public Telegram channel to increase their visibility. Most active attacker groups Hacktivist campaigns targeting India have been on the rise due to negative sentiments spread through social media campaigns like ‘Islamophobia_in_India’ and ‘SaveIndianMuslims.’ These campaigns often involve the sharing of fake content by people in India and abroad who have strong ideological biases. This fake content provokes hacktivist groups to misunderstand the actual social and political situation in India and take action. So, who were the bad actors with their sights set on India? Between January and March of 2024, India was the target of multiple cyber gangs. Ketapang Grey Gat Team and Sylhet Gang were among the most active hacktivist groups targeting India, ranking first and second respectively. Ranking third was Channel DDoS-V2, a DDoS-as-aService provider also known as booter or stresser service. Channel DDoS-V2 sells subscriptions to their DDoS attack infrastructure and allows anyone that pays a subscription to perform attacks on any target. In some cases, the allowed attack activity can be restricted from targeting certain countries. For example, Russian-based stresser services do not allow attacks against Russian targets. Stressers like Channel DDoS-V2 regularly target high profile organizations as a form of advertisement and proof of their capabilities. The technological race between good and bad actors has never been more intense and shows no signs of abating in the future. Going forward, look for hacktivists to become even more proficient and more emboldened with advancements like Generative AI at their fingertips. In addition, look for attack numbers to continue to climb and attack patterns to further evolve. One constant you can count on is the commitment among the hacktivist collectives to use cyber attacks to not only advance their political and religious agendas, but also capitalize on the publicity. * Views expressed in the article are solely of the Author

Read More

Surveillance Redefined: CP PLUS Envisions a Safer, Smarter India

Strategic partnerships and a customer-centric approach are strengthening CP PLUS’ position as a trusted ally in India’s journey towards a safer, smarter future. As India’s leading manufacturer of surveillance products, CP PLUS is redefining security and electronic surveillance with the industry’s most extensive portfolio. Realizing the importance of technology in shaping the future, CP PLUS aims to make security accessible to enrich lives nationwide. CP PLUS is dedicated to spreading a sense of security to every corner of India. With a deep understanding of the evolving security needs, CP PLUS offers customized solutions for corporates, public enterprises, educational institutions, governments and entire smart cities. Capitalizing on market growth “We see a growing need for tailored solutions that address industry-specific challenges,” Mr. Khemka says, “Our AI-driven products and advanced analytics capabilities allow us to provide highly effective and efficient security solutions.” As the demand for reliable security solutions is increasing across various sectors, CP PLUS has been playing a pivotal role in making advanced security and surveillance solutions readily available. They cater to diverse project requirements, such as oil & gas, banking, transport, law enforcement, healthcare and retail, and more developing specific products and integrated solutions for each sector. Their industry-specific solutions include facial recognition, heat-mapping, people counting, and point-of-sale features for retail, showcasing their ability to meet diverse security needs. They also offer mobile NVRs, dash cameras, video door phones, Guard+ series of advanced cameras that provide full-color video feed even in the dark, body-worn cameras, ANPR cameras, and AI-based analytical solutions. CP PLUS developed a VMS-integrated software platform for managing these systems and launched EVMS Pro to enhance scalability and flexibility. Command and Control Centres (CCCs) require high-end storage solutions, leading them to develop NAS storage solutions for long recordings and videowall solutions for efficient monitoring. Expanding into Tier-III and Tier-IV cities “We are deeply committed to democratizing access to advanced surveillance technology,” says Mr. Khemka, “Our expansion into Tier-III and Tier-IV cities is a crucial part of this mission, ensuring that even the most remote areas benefit from enhanced security.” Recognizing the growth potential in these new frontiers, CP PLUS is developing many indigenized solutions including 5G/ 4G cameras to empower remote areas. Their mission is to make cutting-edge CCTV cameras more and more affordable and accessible, spreading security across India. They opened 7 CP PLUS World Experience Centers and over 35 CP PLUS Galaxy Stores in the last financial year, making their security solutions readily available nationwide. Hundreds of more Galaxy Stores are set to open in Tier-II, III, and IV towns this year. Their profound commitment to partner and channel growth through streamlined go-to-market strategies is the key. This Galaxy Stores initiative transcends business expansion, fostering self-reliance and innovation across sectors. By expanding in smaller towns, CP PLUS nurtures local talent and entrepreneurship, offering communities access to state-of-the-art security solutions. Commitment to ‘Made-in-Bharat’ CP PLUS champions the ‘Made-in-Bharat’ ethos, harnessing India’s capabilities to take the nation onto the global stage. Producing to meet the needs of the growing India, CP PLUS has set up one of the largest manufacturing facilities for surveillance products. With a total capacity of more than 2.5 Million units per month, this facility can be further expandable up to 5 Million to cater to global security demands. The CP PLUS manufacturing facility in Kadapa, Andhra Pradesh has been integrated with state-of-the-art equipment, an air-conditioned and dust-free manufacturing area with ESD flooring, multiple advanced and Fuji-made high-speed SMT lines, camera assembly lines, packaging lines, MI and DVR FA lines and a myriad of testing equipment. In order to accomplish the PM’s initiative for Atmanirbhar and to make India truly self-reliant, CP PLUS is on its way to adopt further backward integration of all components of cameras and recorders by producing Housing parts, adapters, cables, bare PCBs, etc. locally in India. Smart cities: pioneering the future “Smart cities represent the future of urban living,” says Mr. Khemka, “Our goal is to provide the technological backbone that supports efficient, safe, and sustainable urban environments.” CP PLUS is the leading player in AI-powered, data-driven video analytics, helping cities meet sustainability goals while enhancing security. Their smart security solutions empower cities like Gurgaon Metropolitan and Noida Smart City, integrating IoT to improve city operations and management. Smart cities use digital technology to improve residents’ quality of life and manage resources better. Their surveillance systems, coupled with video analytics, enhance traffic management and urban mobility. Ensuring safety is crucial for livability and attracting investments, their customized solutions help do that by deterring crime and improving public spaces. Building trust: Channel ecosystem “Building trust is about more than just delivering products; it’s about delivering value and ensuring our partners’ success,” Mr. Khemka emphasizes, “We prioritize transparency, fairness, and consistent support.” Leading the charge to improve and educate the security workforce, CP PLUS has also been organizing technology shows across the country on a regular basis. With thousands of participants excited to learn about the marvelous technological advancements CP PLUS is bringing to their town, each show witnesses huge engagement, where distributors & system integrators join the brand to upscale themselves and be more technologically advanced. Investing in partner success “We are dedicated to our partners’ success,” Khemka asserts, “Our training programs are designed to ensure that our partners have the knowledge and skills they need to provide the highest level of service to their customers.” Through the Mission Tech program, CP PLUS provides comprehensive training and support, equipping partners to excel in the competitive security market. This includes training programs, workshops, and certification courses, enhancing customer satisfaction and building brand loyalty. Over the years, CP PLUS has successfully engaged over 50,000 partners across the country. Digital empowerment While physical stores bridge geographical divides, CP PLUS understands the growing importance of digital platforms. With an extensive network of over 30,000 partners, CP PLUS stands committed to delivering comprehensive partner support, and so the company has invested heavily in online initiatives. IntelliServe is enabling partners and end-users as a one-stop…

Read More

VMS WITH A VANTAGE: How Vicon Valerus VMS continues to be a game-changer 7 years after its release

Gaurav TaywadeDirector of Operations, Vicon As the security industry continues to evolve and new technologies emerge, it’s becoming increasingly important for security professionals to keep up with the latest advancements. One area that has seen significant innovation in recent years is video management solutions (VMS) – and when it comes to VMS, there are few companies with more heritage than Vicon Security, creators of the Valerus video management system. A History of Innovation Vicon Industries has been an industry leader for over 55 years, providing cutting-edge security solutions to tens of thousands of customers around the world. Vicon has seen the security industry go from analogue to digital, from physical to electronic, and from reactive to proactive. Throughout these changes, Vicon has been at the forefront of innovation, developing new products and services that have helped to shape the industry, from the first matrix switches that connected early analogue cameras to one another and made them easier to browse, to some of the first PTZ cameras that have since become an industry staple. They have been able to adapt to new technologies and new threats, and their experience has given them a deep understanding of what it takes to build effective security systems – and video management solutions are at the core of that. Vicon took its first steps into the world of VMS development in 2010 with ViconNet, a proprietary software platform for the management of analogue cameras that remains supported to this day. In 2016, Vicon launched its premier VMS solution for IP cameras – Valerus. The project was ambitious, but with such vast experience in the industry and key lessons learnt from the development of ViconNet, Vicon was quickly able to develop a strong foundation. Valerus has been developed entirely in India at their dedicated development center, showcasing their commitment to leveraging global talent and innovation. The power of Valerus Today, Valerus is a powerful VMS that provides end-to-end security solutions for a wide range of applications. With Valerus, security professionals can control not just their video feeds, but access control, automatic number-plate recognition (ANPR), vape detection, and more – all in one centralised platform. These features allow them to quickly and efficiently manage their security systems from a single pane of glass, ensuring the safety of their facilities and personnel without changing windows or systems, or undergoing any additional training. The system even allows for multi-site management, making it easy for security professionals to monitor and manage systems across multiple locations. With Valerus, security teams can centrally manage all their facilities, streamlining their security operations, and reducing costs. One of the key advantages of Valerus is its flexibility – and nowhere is this more true than in the alarm management suite. This robust, customisable platform can be tailored to suit the end user’s needs, helping them to quickly identify and respond to security incidents via real-time alerts and notifications. Users can even define procedures for each type of alert, helping the operator keep on top of what they need to do and when – from logging their findings on an audit trail to initiating site-wide or localised lockdowns. Valerus even goes above and beyond the call of duty with an in-built system health dashboard – providing proactive notifications to system administrators before a complete system failure, notifying them about potential system issues within seconds, making it an invaluable asset for addressing issues before they become problematic and costly. The power of A.I. Throughout its development, Valerus has always boasted a wealth of advanced video analytics capabilities, from object-based recording to motion sensing, line crossing, and loitering/ crowd detection. Combined with the VAX access control system and the robust alarm management suite, this has made automated security procedures a breeze and allowed operators to analyse video footage in real-time, detecting potential threats and alerting personnel before an incident occurs. This year, Vicon has bolstered that analytics package with one crucial addition – Artificial Intelligence. With Vicon’s AI-enhanced Roughneck camera range, users can utilise edge analytics to automatically classify individuals, vehicles, and animals, and set rules for each – such as recording at a higher resolution when a person comes into the frame to save on storage, or sending an alert to the operator when a vehicle enters out of hours. An AI-enhanced museum search within Valerus is also saving users valuable time. Now, investigations are as simple as selecting the area of interest, telling Valerus what you’re looking for (people, vehicles, animals etc.) and letting it find the crucial moment in time in seconds. To help reduce the total cost of ownership, all of this object classification happens within the camera itself – saving bandwidth, saving storage, and the total cost of ownership. Peace of mind In a world where technology seems to be evolving at an unfathomable rate, Vicon is keen on granting its customers stability and consistency wherever possible. By investing in an end-to-end system with VMS, cameras, and access control provided by Vicon, customers can take peace of mind in the knowledge that everything is designed to work together in harmony – and if it doesn’t, there’s only one number to call! For customers with an existing system, or users who want to create their own bespoke solution, Vicon proudly offers compatibility across a number of open platforms like Onvif to ensure their hardware plays nice with others. Cybersecurity is one of the biggest concerns for end-users of any IP security system. With the increasing frequency of cyber-attacks, it’s essential that security systems be secure and up-to-date. Valerus offers a perpetual licensing model, so customers don’t need to worry about their security system shutting down just because a card payment didn’t go through. In addition, Vicon provides firmware updates and bug fixes to Valerus users at no additional cost, ensuring that security systems are always up-to-date, security vulnerabilities are quickly identified and addressed, and the risk of cyber-attacks is minimized. Best in class VMS Thanks to these features and more, Valerus has been…

Read More

Sexual Harassment & PoSH Act

BY VEENA GUPTA, LL.B.Founder Seam Group Long bygone are the days when men used to be the sole bread winners of a family. Globalization has brought a radical change in the status of women worldwide. However, with the larger influx of women in the mainstream workforce of India, sexual harassment at workplace has assumed greater dimensions. Workplace sexual harassment is a form of gender discrimination which violates men/ women’s fundamental right to equality and right to life, guaranteed under Articles 14, 15 and 21 of the Constitution of India (Constitution). Workplace sexual harassment not only creates an insecure and hostile working environment for women but also impedes their ability to delivering in today’s competing world. Apart from interfering with their performance at work, it also adversely affects their social and economic growth and puts them through physical and emotional suffering. More than 40-60 percent of women face sexual harassment at workplace every year, and only a handful of them come out in the open and are brought to the notice of the Authorities. THE PoSH ACT India’s first legislation specifically addressing the issue of workplace sexual harassment – the Prevention of Sexual Harassment at Workplace (Prevention, Prohibition and Redressal) Act, 2013 (PoSH Act) was enacted on 9 December 2013. The Government also subsequently notified the rules under the PoSH Act titled the Sexual Harassment of Women at Workplace (Prevention, Prohibition and Redressal) Rules, 2013 (PoSH Rules). The year 2013 also witnessed the promulgation of the Criminal Law (Amendment) Act, 2013 (Criminal Law Amendment Act). PoSH Act aims to ensure the safety of women in the workplace and protect them against sexual harassment. Sexual harassment not only violates a woman’s fundamental right to equality as per articles 14 and 15 of the constitution but also infringes upon her right to live with dignity and the right to practice any profession or carry on any occupation or business, which are guaranteed under articles 21 and 19 respectively. Furthermore, the right to work with dignity and protection of women against sexual harassment are basic human rights that are universally recognized by international conventions such as the Convention on the Elimination of All Forms of Discrimination against Women (CEDAW). It is important to note that the PoSH Act has also been ratified by the government of India, emphasizing the commitment to upholding these rights and ensuring a safe working environment for women. #ME TOO ‘Me Too’ empowers those who have been sexually assaulted through empathy, solidarity, and strength in numbers, by visibly demonstrating how many have experienced sexual assault and harassment, especially in the workplace. Though there is much more work to be done, the #MeToo movement has helped create some progress in terms of accountability for sexual harassment at the larger institutional level in male-dominated industries and organizations, which we have already noticed in the past years. .Since then, the #MeToo movement’s legacy has broadened to encompass issues related to gender equality in the workplace and legal reforms to eliminate barriers that had prohibited victims from coming forward. History – CASE LAW – Vishakha vs. State of Rajasthan This is a landmark judgment that led to the enactment of the PoSH Act. It dealt with, for the first time, the evil of sexual harassment of female employees at the workplace. The case of Bhanwari Devi was a tragic incident that shed light on the challenges faced by women, especially those from marginalized communities, in seeking justice and protection from sexual violence. Bhanwari Devi’s courageous efforts to prevent a child marriage resulted in her facing brutal gang rape and subsequent mistreatment by both the community and authorities. The mishandling of her case by the police, delayed medical examination, and the acquittal of the accused due to lack of evidence highlighted systemic failures in addressing gender-based violence and ensuring justice for survivors. The subsequent protests and legal actions, including the filing of a writ petition by the women’s rights group Vishaka, underscored the importance of upholding basic human rights and constitutional protections for women in India. The momentous Vishaka case led to the Supreme Court issuing guidelines for the first time on the issue that emphasized the responsibility of companies to prevent sexual harassment in the workplace and establish mechanisms for addressing and resolving such incidents. This case and its aftermath have played a significant role in shaping laws and policies aimed at combating sexual harassment and promoting gender equality in India. The Vishaka Guidelines define sexual harassment to include unwelcome sexually determined behaviour such as: The court emphasized that sexual harassment can create a hostile work environment and may not necessarily involve physical contact. The guidelines aim to protect individuals from such behavior and ensure a safe working environment. It is important to note that reporting incidents of sexual harassment may require courage from the victim and should be addressed promptly by the compliance mechanism. Amendment Act 2024 (Latest) The Private Member Bill introduced by Dr. Sasmit Patra in February 2024 aims to amend the PoSH Act 2013. This bill seeks to enhance measures addressing sexual harassment and update existing laws to better align with the evolving needs of society. It is important to highlight that the Amendment Bill of 2024 has not yet undergone discussions or approval in both houses of parliament, nor has it received the necessary presidential assent to officially become an Amendment. Consequently, the bill remains pending, with the objective of modifying two sections of The Sexual Harassment at Workplace Act, 2013. The current Amendment Bill of 2024 seeks to prolong the established time limit of 3 (three) months for filing a sexual harassment complaint to 1 (one) year from the date of the incident, and in the case of a series of incidents, within 1 (one) year from the date of the last incident. PoSH Act, Gender Bias & Misuse of the Act The discussion of gender equality’s importance and the right to equality has highlighted society’s bias. In recent years this Act is being used as an…

Read More