Category: Feature

Cyber-Physical Convergence: A New Frontier in Risk Mitigation
BY ANIL PURI, CMD, APS GROUP A first generation serial entrepreneur, thought leader and an action catalyzer rolled into one – Anil Puri is a rare combination of a visionary, an innovator and a strategic thinker. He has used this combination to innovate and implement on-ground many new business ideas. His rich experience in various businesses has enabled him to nurture & mentor innovative ideas and scale them up. Introduction Cyber-physical convergence is reshaping the landscape of risk mitigation, integrating digital and physical security systems into a unified framework. As cyber threats increasingly impact physical assets and vice versa, security professionals must adopt a holistic approach to risk management. The rapid evolution of digital technologies and the increasing interconnectivity of physical infrastructure have given rise to a new era of cyber-physical threats. No longer confined to distinct domains, cyber and physical security have merged into a single, complex ecosystem where vulnerabilities in one realm can directly impact the other. From critical infrastructure and smart cities to industrial control systems and defense networks, cyber-physical systems now form the backbone of modern society. However, this interdependence has also expanded the attack surface, making security breaches more sophisticated, far-reaching, and potentially catastrophic. Cyberattacks targeting power grids, autonomous vehicles, healthcare facilities, and financial institutions highlight the growing risks associated with this convergence. As adversaries leverage AI-driven cyber intrusions, deepfake technology, and weaponized drones, the need for integrated security frameworks has never been more pressing and critical. The traditional siloed approach to cybersecurity and physical security is no longer viable – organizations must adopt a holistic, intelligence-driven strategy that ensures resilience against emerging threats. The evolution of cyber-physical security Proliferation of Internet of Things (IoT), Artificial Intelligence (AI), and cloud computing have necessitated their convergence. The increasing interconnectivity of security systems, from access controls to surveillance and industrial automation, has introduced both opportunities and vulnerabilities. Traditionally, physical security operated in isolation, relying on access control, surveillance, and manpower, while cybersecurity was confined to protecting digital assets from breaches. However, with the rise of Industry 4.0, IoT, AI, and cloud computing, the attack surface has expanded, making physical and digital threats inseparable. The proliferation of smart cities, automated industrial control systems (ICS), and connected supply chains has necessitated a holistic security model that integrates cyber risk management with traditional security protocols. Today, adversaries leverage cyber vulnerabilities to manipulate physical systems, causing disruptions in power grids, transportation networks, and critical infrastructure. The Stuxnet attack on nuclear facilities and ransomware targeting hospital equipment underscore the urgency for unified cyber-physical security architecture. In response, modern security frameworks emphasize real-time threat intelligence, predictive analytics, and AI-driven automation to preempt cyber-physical breaches. Zero-trust architecture, behavioral analytics, and digital twins are now deployed to simulate and mitigate threats before they manifest in rereal- world operations. Regulatory frameworks, including the NIST Cybersecurity Framework and ISO 27001, are evolving to integrate physical security considerations, ensuring a layered defense mechanism. Organizations are adopting Security Operations Centers (SOCs) with a cyber-physical focus, merging IT and OT (Operational Technology) security to enhance resilience against sophisticated threats. As AI-driven cyber-physical attacks become more prevalent, the future of security lies in adaptive, self-learning systems capable of neutralizing threats autonomously. This paradigm shift signifies that security is no longer just about preventing unauthorized access but ensuring the resilience of interconnected ecosystems where digital vulnerabilities can have catastrophic physical consequences. The convergence of cyber and physical security has evolved from a fragmented approach to an integrated, intelligence- driven framework, responding to the increasing interconnectivity of critical infrastructure, enterprises, and smart ecosystems. “The convergence of cyber and physical security is no longer a choice but a necessity in an era where digital threats can have real-world consequences” Emerging threats and risk adaptation The evolving threat landscape is increasingly characterized by hybrid risks, where cyber, physical, and geopolitical dimensions intersect, creating unprecedented security challenges. Emerging threats such as AI-driven cyberattacks, deepfake-enabled disinformation campaigns, quantum computing vulnerabilities, and autonomous weaponized drones are reshaping security paradigms. The rise of cyber-physical attacks on critical infrastructure, including power grids, transportation systems, and smart cities, demonstrates how interconnected digital ecosystems amplify vulnerabilities. Ransomware-as-a-Service (RaaS), supply chain disruptions, and state-sponsored cyber espionage further compound these risks, demanding a proactive and dynamic security posture. Moreover, the increasing reliance on AI and machine learning in decision-making raises concerns about algorithmic bias, adversarial AI, and the exploitation of automated systems. With the integration of 5G, IoT, and cloud-based architectures, the attack surface continues to expand, necessitating a shift from traditional defense mechanisms to predictive and intelligence-driven risk mitigation strategies. To adapt to these emerging risks, organizations and governments are embracing resilience-based security models, integrating cyber threat intelligence (CTI), zero-trust architectures, and real-time monitoring systems. Advanced encryption methods, including post-quantum cryptography, are being explored to counter the future risks posed by quantum computing. AI-powered Security Operations Centers (SOCs) are enhancing real-time threat detection and response, leveraging behavioral analytics to preemptively neutralize attacks. The adoption of digital twins for cybersecurity simulations enables organizations to stresstest their systems against evolving threats. Additionally, regulatory frameworks and compliance standards are evolving to address the convergence of cyber and physical threats, with increased emphasis on public-private partnerships for intelligence sharing. As adversarial tactics become more sophisticated, a paradigm shift toward adaptive security – where systems learn, predict, and autonomously respond to threats – is imperative. The future of risk adaptation lies in continuous innovation, strategic foresight, and the seamless integration of AI-driven security measures to safeguard interconnected ecosystems against both known and emerging threats. “In the cyber-physical domain, risk is no longer just a number; it is an evolving battlefield“ Dynamic risk matrix: A strategic framework A Dynamic Risk Matrix (DRM) helps organizations identify, assess, and prioritize risks based on real-time data. Unlike static models, DRM adapts to changing threat landscapes, integrating data from cyber and physical security domains. Risk Dimensions in Cyber-Physical Security Risk Type Cyber Impact Physical Impact Mitigation Strategies Data Breach Unauthorized access to sensitive data Compromised biometric authentication Multi-factor authentication, encryption System Hijacking…

The Smart Way in: Innovations in Vehicle Access Control Management
Vehicle access control systems are no longer just about security; they have become a cornerstone of modern urban living. As our cities grow and technology advances, the systems that manage vehicle access in residential complexes have continued to evolve. This blog explores the trends and necessities driving the update of these systems to meet the developing needs of urban communities. Urbanization and technological progress have forced us to reimagine security and convenience in modern living. This is particularly evident in the vehicle access control market, which is experiencing significant growth. According to MarketsandMarkets, the global vehicle access control market is going to surge from USD10.8 billion in 2020 to USD22.6 billion by 2027. One reason why traditional access methods are being forced to evolve is the rise in the number of vehicles per household. This creates a demand for robust systems that are able to manage entry and exit efficiently in order to reduce congestion and, therefore, resident frustration. But it’s not just about quantity – it’s also about quality. For example, a white paper from the Association for Smarter Homes & Buildings (ASHB), observed that residents today expect a frictionless living experience. Waiting in line to scan cards or having to buzz in guests individually no longer meets these expectations. What’s more, as MarketsandMarkets highlights, there is a growing need for streamlined operations that cater to residents and visitors alike, ensuring quick and secure access without manual intervention. Moreover, like many parts of society, residential complexes are under pressure to become more sustainable and reduce their carbon footprint. A US Department of Energy report reveals that personal-vehicle idling wastes about 3 billion gallons of fuel, generating around 30 million tons of CO2 annually in the US alone. Efficient access systems can help minimize idling and reduce energy consumption. Beyond the barrier: Innovations in vehicle access control The good news is that technological advancements offer effective solutions to these challenges, bringing efficiency, enhanced experience, and sustainability. Smart barrier gates integrated with ANPR cameras These combine Automatic Number Plate Recognition (ANPR) with intelligent barrier systems and radar sensors to accurately detect and control vehicle movements. ANPR cameras automatically recognize and verify vehicle number plates, allowing registered vehicles to enter without manual intervention. This accelerates traffic flow and lightens the workload for facility managers. These systems also provide valuable data collection capabilities, enabling better traffic flow optimization and enhancing the resident experience. Safety features such as anti-fall, anti-collision, and automatic lift functions ensure the safety of residents and their vehicles. Visitor management systems These enhance convenience and security by allowing residents and management to manage visitor access directly from their smartphones. Residents can remotely grant or deny access, simplifying visitor management and ensuring authorized access only. Centralized management platforms These integrate various access control systems into a single dashboard, enabling facility managers to monitor traffic, authorize entry, and generate reports with ease. This optimizes operational efficiency and supports data-driven decisions to improve resident satisfaction. Proven success: The Arboretto Residential Complex The real-world applicability of these solutions is demonstrated by the Arboretto Residential Complex in Bogotá, Colombia. Faced with access control challenges due to high vehicle and visitor traffic, Arboretto collaborated with Hikvision to overhaul its vehicle access system. Key improvements included the deployment of a dual- barrier setup featuring 4MP ANPR Intelligent Entrance Cameras (DS-TCG405-E) and 5 Series Straight-Arm DC Frequency-Conversion Barrier Gates (DS-TMG510-H). This configuration enhances security through license plate recognition and secondary driver authentication, ensuring seamless vehicle access control. The DC frequency-conversion technology ensures quiet and precise gate operations, while the Video Intercom Kit (DS-KIS602(B)) with an integrated indoor station and ID card reader facilitates efficient visitor management. Managed through HikCentral Professional, Hikvision’s integrated platform, the system offers real-time monitoring and data analysis, streamlining operations for all users. During high-traffic events, pre-registered guests receive QR codes for swift, secure entry, enhancing both security and efficiency. The new system significantly reduced access errors, bolstering security and lowering operational costs by minimizing manual labor. Residents experienced shorter wait times and heightened security, leading to increased satisfaction and a safer, more convenient environment. Read More

Certifying Trust: The Pertinence of STQC in the Indian Security and Surveillance Landscape
ADITYA KHEMKAMD, Aditya Infotech Ltd. Standards are not merely guidelines; they are the foundation of trust in a rapidly evolving technological world. In India, the IoTSCS Essential Requirements (ER) Certification for Security administered by STQC under the Ministry of Electronics and Information Technology (MeitY), has emerged as a cornerstone of credibility in the surveillance industry. It assures quality, security, and compliance with the stringent requirements of the nation’s digital ecosystem. For security and surveillance products, the certifications by STQC-certified labs signify a commitment to excellence, especially in combating cyber threats and ensuring adherence to the Public Procurement Order (PPO) and BIS Compulsory Registration Order (CRO) guidelines. Regulatory Frameworks Governing CCTV Certification CCTV manufacturers and suppliers in India are now subject to two key regulatory frameworks that dictate compliance requirements: Both frameworks aim to ensure cybersecurity compliance, but they differ in scope, timelines, and mandates. Differences between PPO and BIS Mandates Aspect PPO BIS CRO Scope Government procurement General sales in the Indianmarket Effective Date June 6, 2024 April 9, 2025 Certifications Required Essential Requirements(ER) Essential Requirements(ER) & Safety Requirements Impact of Non-Compliance Disqualification from government contracts Ineligibility for generalsales in India What is the Essential Requirements (ER) Certification for Security About? The ER Certification is more than a mark of quality; it’s a comprehensive evaluation of a product’s ability to withstand the challenges of the modern security landscape. In the surveillance industry, it focuses on critical domains like cybersecurity standards, safeguarding against vulnerabilities like unauthorized access, hacking, or data breaches and supply chain mitigations. Security testing evaluates the resistance of hardware and software to cyber threats and unauthorized access, while supply chain verification ensures compliance with PPO guidelines for essential requirements. Together, these measures create a fortified framework for ensuring the reliability and integrity of surveillance solutions. Objectives of the Essential Requirements (ER) Certification The primary objectives of the ER Certification in the surveillance sector include: Enhancing Cybersecurity: Ensuring that surveillance systems are resilient to cyber threats and unauthorized intrusions. Promoting Trust: Providing assurance to stakeholders that certified products meet stringent quality and security benchmarks. Compliance with PPO & CRO Guidelines: Verifying the supply chain to ensure adherence to the Essential Requirements (ERs) outlined by the government. Boosting Indigenous Manufacturing: Encouraging Makein- India initiatives by certifying products developed within the country. Scope of Essential Requirements (ER) Certification In the surveillance industry, the scope of the ER Certification encompasses: Security Testing: Assessing hardware and software for vulnerabilities, resistance to cyberattacks, and ensuring robust data encryption. Supply Chain: Trusted supply chain verification to ensure that the critical components are sourced from trusted source and are not counterfeited. For instance, surveillance systems employed in traffic management projects – such as ANPR cameras at toll booths or facial recognition systems in airports – rely on the ER Certification to guarantee their performance and reliability. Importance of Essential Requirements (ER) Certification in India In an era where data breaches and cyber threats are rampant, the significance of the ER Certification cannot be overstated. For the surveillance industry, it: Strengthens Cybersecurity: By mandating rigorous security testing, it ensures that surveillance systems are equipped to protect sensitive data. Builds Credibility: Certified products gain a competitive edge in government and private sector projects.Enforces Accountability: Through supply chain verification, it ensures that all components and processes comply with national standards. Supports National Security: By certifying systems resistant to tampering and breaches, it safeguards critical infrastructure. Impact of these Mandates on the Industry Manufacturers: Manufacturers must align their production and testing processes to ensure all CCTV products meet the Essential Requirements and safety standards. This involves partnering with STQC-certified labs, updating software, and possibly redesigning products to eliminate cybersecurity risks. Distributors and Retailers: Distributors and retailers need to be vigilant about sourcing compliant products. Non-compliant stock will become unsellable after the April 2025 deadline in the market, leading to potential losses.End Users: Government agencies are already required to procure compliant products, while general consumers will benefit from enhanced security features in CCTVs once the BIS mandate is fully enforced. Certification Process The ER Certification process is rigorous, involving: Application Submission: Manufacturers provide detailed documentation on product specifications and compliance with ERs. Testing and Evaluation: Comprehensive security testing of hardware and software to identify vulnerabilities and ensure resilience. Supply Chain Mitigation Verification: Scrutinizing the origin and compliance of components with PPO guidelines. Final Approval: Upon meeting all requirements, certification is granted, reinforcing trust and credibility. Key Areas of Testing In the surveillance industry, STQC testing primarily focuses on: Security Testing: Examines resistance to cyber threats, unauthorized access, and data breaches. It ensures robust encryption and secure communication protocols. Supply Chain Mitigation Verification: Evaluates adherence to PPO guidelines, ensuring transparency and compliance in sourcing components. Essential Requirements (ER) Certification in the Surveillance Industry The surveillance industry, being critical to national security, benefits immensely from the ER Certification. By certifying products against cyber threats and ensuring compliance with supply chain guidelines, its aimed at creating a robust framework for safeguarding sensitive areas such as: Smart Cities: Certified surveillance systems play a vital role in monitoring urban areas. Critical Infrastructure: Ensures the security of airports, railways, and power plants. Public Safety: Enhances law enforcement capabilities with secure and reliable CCTV systems. STQC Certified CP PLUS Product Line An industry leader, CP PLUS demonstrates the transformative potential of the ER Certification in the security and surveillance landscape. With an extensive range of STQC-certified products, the company sets new benchmarks in quality and reliability. Certified Models Revolutionizing Surveillance CP-UNC-TE21ZL6C-VMDS-Q: ● High-resolution imagery and advanced AI-enabled analytics. ● Designed for traffic management and public safety applications. CP-UNP-F4521L30-DPQ: ● Compact yet powerful, ideal for indoor environments like retail and banking. ● Features cutting-edge motion detection and cloud integration. CP-UNC-VE21ZL4C-VMDS-Q: ● Built for extreme weather with IP67 certification. ● Perfect for industrial and outdoor applications. By integrating STQC-certified products into its portfolio, CP PLUS not only meets but exceeds the expectations of government and private stakeholders. These models exemplify the perfect balance of cutting-edge technology and unwavering security,…

Physical Security Threats to Data Centres and Leveraging Mobile Technology With AI and ML For Mitigation
What is a Data Centre? A data centre is a specialized facility designed to house computer systems, telecommunications equipment and storage systems, supported by the necessary infrastructure to ensure their efficient operation. These facilities consist of several core components including computing equipment like servers and mainframes, storage systems such as hard drives and tape systems, and a robust network infrastructure comprising routers, switches, firewalls, and cabling. The infrastructure includes power distribution systems, cooling mechanisms, fire suppression tools, and security measures for both physical and cybersecurity. Critical infrastructure in a data centre is vital for uninterrupted functionality. Power systems include uninterruptible power supplies (UPS), backup generators, multiple power feeds, and power distribution units (PDUs). Cooling systems rely on Computer Room Air Conditioning (CRAC) units, chillers, hot/ cold aisle containment, and raised floors to manage airflow. Environmental controls ensure optimal conditions through temperature and humidity monitoring, air filtration, and fire detection and suppression systems. Data centres come in various types, including: (i) Enterprise centres – Operated by companies for their own use, (ii) Colocation centres – That rent space to multiple customers, (iii) Cloud centres – Managed by cloud service providers, (iv) Edge facilities – Located closer to end-users, and (v) Hyperscale centres – Operated by tech giants. They are also classified into tiers based on their capacity and redundancy: (i) Tier 1 provides basic capacity with a single path for power and cooling, (ii) Tier 2 offers redundant components, (iii) Tier 3 includes multiple paths for concurrent maintainability, and (iv) Tier 4 achieves fault tolerance with the highest redundancy level. Data centres serve numerous critical purposes such as hosting websites and applications, storing and processing data, supporting cloud computing services, enabling business continuity, providing backup and recovery solutions, and supporting telecommunications infrastructure. They also facilitate content delivery networks, process business transactions, support artificial intelligence and machine learning, and enable big data analytics. The evolution of data centres is driven by trends toward greater energy efficiency, higher density computing, increased automation, enhanced security measures, and sustainable operations. Innovations include integrating edge computing, adopting AI-driven management, and implementing modular design approaches. These facilities are essential to modern digital infrastructure, underpinning global digital economies, business operations, internet connectivity, and digital services worldwide. Like all assets of value, apart from facing cyber threats, data centres increasingly face physical security threats because damage, sabotage or outages to data centres can cause catastrophic damage amounting to millions of dollars, loss of brand value and potentially ruinous litigations. To set context, as per a 2023 survey, roughly 54 percent of data centre operators said their latest most significant outage cost over USD100,000. A further 16 percent of respondents said the most recent crucial system outage caused them monetary damage of over USD1 million. Physical Security Threats The physical security threats faced by data centres encompass a wide range of challenges that require comprehensive protection strategies. Let us examine a few of these threats/ challenges. The most common threats are given in the Fig 2 below and thereafter are described in detail. Unauthorized physical access At the forefront of these concerns is unauthorized physical access, which can manifest through various methods including social engineering attempts, tailgating through secure entrances, impersonation of authorized personnel or contractors, theft of access credentials, forced entry attempts, and insider threats from disgruntled employees. These access-related threats are particularly concerning as they can lead to more severe security breaches if successful. Infrastructure sabotage Infrastructure sabotage represents another critical threat category, involving deliberate damage to essential systems such as power distribution units, network cables, cooling systems, backup generators, and server racks. Such attacks can cripple data centre operations and lead to significant service disruptions. The risk of vandalism to security systems themselves must also be considered, as damage to these protective measures can create vulnerabilities that malicious actors might exploit. Environmental threats Environmental threats pose a significant risk to data centre operations and require robust mitigation strategies. These include fire and smoke damage, water damage from flooding or leaks, extreme temperature fluctuations affecting equipment, humidity issues that can damage hardware, natural disasters such as earthquakes and hurricanes, chemical contamination, and electromagnetic interference. These environmental factors can cause catastrophic damage to sensitive equipment and disrupt critical services. Power-related threats Power-related threats are particularly concerning given the data centre’s reliance on consistent, clean power. These include grid power failures, UPS system failures, generator malfunctions, power surges or spikes, disruption to fuel supplies for backup systems, and potential sabotage of electrical systems. The interconnected nature of power systems means that a failure in one component can cascade through the entire facility. Theft Theft remains a persistent threat to data centres, targeting valuable assets such as server and network equipment, storage devices, copper wire, backup media, personal property, and maintenance equipment. These theft attempts can be opportunistic or carefully planned operations, potentially involving insider knowledge. The financial impact of theft extends beyond the immediate loss of equipment to include service disruption and potential data breaches. Service disruption attempts Service disruption attempts represent a broad category of threats aimed at preventing normal data centre operations. These can include blocking physical access to facilities, disrupting cooling systems, interfering with power delivery, cutting communication lines, combining DDoS attacks with physical intrusion, and jamming wireless systems. Such attacks can be particularly effective if coordinated across multiple vectors simultaneously. Malicious surveillance and intelligence gathering activities Malicious surveillance and intelligence gathering activities pose a significant threat as precursors to more direct attacks. These can include photography of facilities, drone surveillance, dumpster diving for sensitive information, social engineering to gather facility information, recording of security patrol patterns, and monitoring of staff movements. This information can be used to identify vulnerabilities and plan more targeted attacks. Vehicle-based threats Vehicle-based threats present unique challenges for data centre security including the potential for ramraid attacks, car bombs, unauthorized parking near critical infrastructure, blocking of emergency access routes, vehicle- borne surveillance, and hijacking of delivery vehicles. These threats require specific countermeasures such as vehicle barriers, bollards, secure parking areas, and…

Beware of the Dark Age of the Digital Era
GARIMA GOSWAMYCEO and Co-FounderDridhg Security International Pvt. Ltd. The rapid advancement of technology has brought unprecedented convenience, but it has also opened doors to ethical dilemmas and potential misuse. One of the most alarming possibilities lies in the hypothetical misuse of technology for unauthorized data retrieval, particularly from sensitive repositories like Aadhaarlinked databases and the sale of objectionable non consensual pictures produced by using deepfake technologies via nudify apps. Deepfake Technology and Nudify Apps: A Looming Threat Deepfake technology, which uses generative AI models to create realistic but fake images, videos, or audio, has become a significant concern. Once exclusive to media professionals, these tools are now widely accessible, and their potential for misuse is immense – from of ‘nudify’ apps, which claim to remove clothing from images, often targeting women. These apps, available for as little as INR199 on platforms like Telegram, enable anti-social elements to exploit technology for financial and reputational harm. Tutorials for these tools are freely available online, making them even more dangerous. The combination of deepfake tools with apps like Microsoft’s VASA – which generates lifelike, audio-driven talking faces – further heightens the risk of identity theft and reputational damage. These technologies, when misused, create opportunities for exploitation on a scale previously unimaginable. Unauthorized Data Retrieval: A Growing Concern Imagine an application capable of instantly retrieving personal details – such as names, phone numbers, or Aadhaar-linked addresses – by simply pointing a smartphone camera at an individual. While this may sound like science fiction, the rapid evolution of technologies like artificial intelligence (AI), augmented reality (AR), and centralized databases makes such scenarios increasingly plausible. This highlights the urgent need to address privacy and security risks associated with emerging technologies. The Role of Ethics in Technological Advancements The integration of ethics into the development and deployment of advanced technologies is no longer optional – it is a necessity. Without ethical guidelines, the misuse of such tools could lead humanity down a perilous path. Technology, when unbridled by ethics, has the potential to create a dystopian reality where privacy, security, and human dignity are continuously compromised. Developers, organizations, and governments must work collectively to ensure that technology serves the betterment of humanity. Safeguards, transparency, and strict regulatory oversight must be in place to prevent exploitation and misuse. The Need for Corrective Action It is not just governments and regulatory bodies that bear the responsibility of preventing the misuse of emerging technologies. Private organizations must also play their part by investing in solutions to counter these threats. For example, while tools to create deepfakes are widely accessible, reliable detection mechanisms remain scarce. Companies like Sensity, ResembleAI, and DridhG Security International are leading the way in developing tools to identify and counteract the misuse of these technologies. Such innovations are critical in ensuring that the digital world remains safe and secure for everyone. Conclusion The allure of technological advancements should not blind us to their potential risks. Without the integration of ethics, innovation could become a double-edged sword, capable of both immense progress and devastating harm. The time to act is now – by fostering collaboration between governments, private organizations, and ethical technologists, we can ensure that technology remains a force for good. Without immediate corrective measures, we risk entering a digital dark age where innovation outpaces our ability to control its consequences.

The Public Want Clear Rules on Police Use of Facial Recognition
There is public support for the police’s use of facial recognition to solve and prevent crimes – even in traditionally more skeptical countries as Denmark. Here, a new opinion poll shows that 84 percent have a positive attitude. However, trust in the technology depends on politicians and authorities establishing clear rules for the protection of data and privacy. Whether it is recorded video material used to solve crimes, or live images that, for example, can identify unwanted hooligans at a football stadium, public support for the use of facial recognition is quite significant. In Denmark 84 percent support the use of facial recognition in connection with the prevention and solving of crime and terrorism. The support spans across age, gender, and geography, according to a nationally representative analysis conducted by Norstat for Milestone Systems. But the support has strings attached. 70% of Danes see clear rules, data protection, and transparency about how and where the technology is used as the most important factor for their trust. Additionally, 51% consider it crucial that data is deleted as soon as it is no longer relevant to a case. “The support for facial recognition also obliges. Therefore, politicians and authorities must get started on creating clarity about rules, responsibility, and protection of our data. It is fine that they are currently operating within a pilot scheme, but it is urgent to look at more permanent regulation of facial recognition,” said Thomas Jensen, CEO of Milestone Systems. Danish Milestone Systems develops and sells data-driven video technology and analysis tools used in, for example, airports, by police, traffic control, companies, hospitals, and stadiums worldwide. “It is crucial to have clear and transparent regulation if we are to maintain the public’s support and trust in the technology and the authorities. At the same time, there must be security for how facial recognition data is stored and deleted when it is no longer relevant. It could be 30-60 days,” said Thomas Jensen. The technology is used today for everything from verification – such as when you open your iPhone, show a badge, or go through passport control – to recognizing a specific person at, for example, a sports venue. The support for facial recognition also obliges. Therefore, politicians and authorities must get started on creating clarity about rules, responsibility, and protection of our data. It is fine that they are currently operating within a pilot scheme, but it is urgent to look at more permanent regulation of facial recognition Thomas Jensen CEO, Milestone Systems “In addition to all the practical and well-known applications, modern AI-driven facial recognition is also a powerful tool that can help both solve and prevent crimes,” said Thomas Jensen. Although the publics knowledge of the technology behind facial recognition is relatively low, the attitude is positive. The new survey shows significant support for using facial recognition technology in cases of murder (88%) and serious violence and rape (87%). Likewise, 81% believe that facial recognition should be used to prevent and solve terrorism by quickly identifying known terrorists. Technology is not always perfect – this also applies to facial recognition. Therefore, two trained operators should verify with their own eyes when the software finds a face match – a picture in a database that matches a picture from a video recording of, for example, a wanted criminal or a hooliganThomas Jensen CEO, Milestone Systems Clear rules and regulations are one thing. There is still a need for common sense and human judgment, says Thomas Jensen. “Technology is not always perfect – this also applies to facial recognition. Therefore, two trained operators should verify with their own eyes when the software finds a face match – a picture in a database that matches a picture from a video recording of, for example, a wanted criminal or a hooligan,” said Thomas Jensen. He emphasizes that although most respondents in the survey support the police’s use of facial recognition in their work to protect citizens, prevent, and especially solve crimes. “But that trust and support also obliges to create clarity and frameworks,” he emphasized. Facts about facial recognition ● Today, AI – artificial intelligence – is used to train facial recognition software and convert images into anonymous signatures/ numbers. These signatures are compared with anonymous signatures in a database based on images of faces from, for example, the police, Interpol, FBI etc. ● Only when there is a potential match between the signatures are the images retrieved from the database for comparison. ● The technology is used today for everything from verification – such as when you open your iPhone, show a badge, or go through passport control – to recognizing a specific person at, for example, a football stadium. ● The technology behind facial recognition was developed in 1965 by the American mathematician Woodrow Wilson Bledsoe (1921–1995) to identify or confirm a person’s identity based on facial features. ● Post-event facial recognition analyzes video recordings after the event has taken place, instead of live. Investigators can use recognition software on recorded video from cameras to identify suspects by matching their face/signatures with known databases. ● Real-time facial recognition is the immediate analysis of a live video feed, where faces are compared with a database to generate instant alerts when a match is found. At large public events such as sports stadiums, real-time facial recognition can be used to detect wanted or banned individuals – for example, known hooligans. Read more posts

7 Advanced Technologies That Optimize The Performance of Hikvision’s PTZ Cameras
Hikvision has integrated seven advanced technologies that drive stability, precision, and efficiency in video monitoring with Pan-Tilt-Zoom (PTZ) cameras. In this blog, we will explore how these innovations – such as image stabilization, rapid focusing, and dual-view capabilities – enable Hikvision’s PTZ cameras to provide unmatched performance in various environments. Numerous real-world challenges face security professionals who need to deliver reliable and efficient video monitoring solutions. Sometimes, it is finding a way to focus on critical issues that occur within a video stream. At other times, they need to be able to ‘see’ in very adverse weather conditions. To cope with these different challenging scenarios, security solutions must be able to adapt and respond with precision and intelligence. Hikvision’s PTZ cameras bring together dedicated technologies designed to address these needs, ensuring optimal performance in the most demanding conditions. 7 innovations that enable Hikvision’s PTZ cameras to be trusted in diverse real world scenarios 1. Stabilizing images against vibrations When PTZ cameras are installed on bridges or in areas with strong winds, they are prone to vibration. This can cause the image to show signs of shaking, especially when the lens is extended to its maximum focal length. To address this problem, Hikvision has developed unique Optical Image Stabilization (OIS) and Gyroscope Image 7 Advanced Technologies That Optimize The Performance of Hikvision’s PTZ Cameras Stabilization (GIS) technologies for its PTZ cameras. Both technologies use a gyroscope to detect and measure camera vibrations. The OIS technology compensates for the camera motion by moving the lens in the optical path, ensuring that the lens always stays focused on the sensor. The GIS technology, meanwhile, counterbalances the camera’s motion digitally. 2. Seeing through fog When monitoring long distances, fog can be a significant issue. Hikvision’s defog technology measures fog density based on the level of grayness in the live video feed and automatically activates a proper defog mode. In light fog, the Algorithmic Defog mode enables the camera to digitally recover and enhance image details to produce colored video. In more challenging, thick fog conditions, the Optical Defog mode is activated. This mode uses infrared light, which can penetrate the fog to generate black-and-white video. Despite the absence of color, the video is of high quality thanks to advanced Image Signal Processing (ISP), which significantly reduces noise. 3. Focusing at lightning speed while zooming Just as eagles can spot small animals from high in the sky, Hikvision’s PTZ cameras can sharply focus on distant objects, even as their zoom level changes. This capability is powered by Hikvision’s Rapid Focus technology. By creating a 3D model of the camera’s surroundings, the system pre-calculates the coordinates and zoom ratio for every point in the scene. When the camera needs to focus on a specific point, it uses this pre-calculated data to quickly achieve sharp focus, dramatically reducing focusing time. 4. Keeping track of moving objects In some situations, it is essential to continuously track a moving object. In a chemical park, for example, it is crucial to monitor trucks transporting hazardous materials to ensure they follow the designated entrances and routes. In such cases, Hikvision’s Auto Tracking 3.0 technology provides an effective solution. By leveraging Automatic Number Plate Recognition (ANPR), the PTZ camera can identify, lock onto, and accurately follow a specific vehicle. The camera’s pan and tilt capabilities allow it to maintain focus on the vehicle as long as it remains within coverage, even if it is temporarily obscured by other objects. 5. Delivering dual, smartlylinked views at once When a traditional PTZ camera moves or zooms in, incidents outside its current field of view may be missed, creating gaps in coverage. In environments such as critical facilities or infrastructures, maintaining complete, uninterrupted coverage is vital in ensuring no incident goes unnoticed. Hikvision’s TandemVu PTZ cameras tackle this challenge by integrating multiple lenses, offering panoramic and close-up views simultaneously. The innovative Smart Linkage technology ensures that when an object is detected in the panoramic view, the PTZ lens automatically activates to track and identify it. If it identifies a trespasser, the camera can even issue visual and auditory warnings. This dual-view capability allows users to focus on details or respond to specific events while maintaining a wider overview, ensuring effective situational awareness. 6. Extending operational life with an upgraded slip ring for pan-tilt PTZ cameras undergo countless pan and tilt movements throughout their lifespan, which can lead to mechanical wear and decreased reliability in standard models. Hikvision’s Dual-Track Slip Ring is designed to address this challenge by offering enhanced durability and redundancy. The dual-track design ensures that the camera remains operational even if one track experiences damage, providing up to 10 years of reliable performance. The gold-plated tracks further enhance smoothness and resistance to wear, ensuring continuous and stable operations necessary for demanding applications. 7. Automatic recovery from lens direction drift In high-traffic environments, such as busy intersections, PTZ cameras must continually pan and tilt to provide complete coverage, which can lead to gradual lens direction drift. Hikvision’s Smart Pan-Tilt Correction technology solves this problem by automatically keeping the camera lens aligned with the intended direction, even during prolonged operation or when affected by external forces. This technology detects and corrects any directional drift, ensuring precise monitoring and accurate privacy masking. As a result, users are guaranteed the exact coverage needed for dependable security. Hikvision’s PTZ cameras are crafted with one goal in mind: to address a diverse range of challenges with precision, reliability, and intelligence. Whether it’s through ensuring stable video in windy environments, tracking moving vehicles as they travel through high-security zones, or providing clear visibility even in dense fog, these tailored technologies guarantee the powerful performance of PTZ cameras that users demand. They work together to reduce maintenance needs and costs, enhance operational efficiency, and ensure that no critical moment is missed. Read more posts

PFAS Found in Firefighter Gloves, Hoods and Wildland Gear
A firefighter’s protective clothing is composed of three distinct layers made of different textiles. In response to concerns about the gear possibly exposing firefighters to PFAS chemicals — several of which have been linked to cancer — NIST researchers investigated the presence of the chemicals in textiles used to make the layers. This latest study analyzed hoods and gloves worn in structural fires as well as protective clothing worn to fight wildfires. Credit: B. Hayes/NIST. Credit: B. Hayes/NIST The protective clothing worn by wildland firefighters often contains PFAS, according to a new study from the National Institute of Standards and Technology (NIST). The study also found PFAS in hoods and gloves worn by firefighters who respond to building fires. PFAS – which stands for ‘per- and polyfluoroalkyl substances’ – are a category of chemicals used in a wide range of products. In high concentrations, PFAS may have harmful health effects on people. Firefighters have more PFAS in their blood than the average person. It isn’t clear why, but one theory is that it comes from the protective equipment they wear during a fire – called turnout gear. “Our latest study showed that PFAS are present not only in the jacket and pants worn by firefighters, but also in many of the smaller protective garments,” said NIST Chemist and Study Co-author Rick Davis, “Measuring the presence of the chemicals is the first step in understanding their impact on firefighters.” The NIST studies do not assess the health risks that firefighters might face due to the presence of PFAS in turnout gear. However, they provide previously unavailable data that toxicologists, epidemiologists and other health experts can use to assess those risks. NIST conducted these studies at the behest of Congress, which called on NIST to study PFAS in firefighter gear in the 2021 National Defense Authorization Act. PFAS are everywhere. They don’t react very easily with other chemicals, so they make very effective nonstick surfaces, lubricants and food packaging. But the fact that they’re unreactive also means that they don’t break down easily. These chemicals stay in the environment for a long time, which is why they are sometimes called ‘forever chemicals.’ Fabrics containing PFAS are often used to make firefighting gear because these chemicals are very good at repelling water. Part of the standard for firefighter gear requires a minimum amount of water resistance to prevent steam burns and provide protection from chemicals. Water resistance also tends to make gear safer because heat can travel much more efficiently through water than through air. For example, a dry potholder will let you safely pull a hot dish out of an oven. But that same dish can give you a third-degree burn in just one second if the potholder is wet. NIST researchers have been running a series of experiments to understand how much PFAS are in that equipment. The two prior NIST studies looked at the level of PFAS in firefighter coats and pants and how wear and tear can increase the amount of measurable PFAS in these garments. This latest study, published on Dec. 13, analyzed gloves and hoods worn by structural firefighters (those who fight fires in buildings), as well as gear worn by wildland firefighters. The researchers were particularly interested in hoods and gloves because they come in direct contact with skin, as opposed to coats and pants that are worn over a base layer. Wildland gear includes the protective shirt and pants worn for fighting wildfires. It’s designed for long treks over difficult terrain, so it trades off some heat protection for mobility. Unlike the thick, heavy coat and pants used to fight a structural fire, wildland gear is like something you might wear camping with extra heat protection. The NIST team tested four types of gloves, eight types of hoods, and nine types of wildland firefighter gear from several manufacturers of firefighter gear in 2021-23. All these garments are commercially available. Our latest study showed that PFAS are present not only in the jacket and pants worn by firefighters, but also in many of the smaller protective garments Rick DavisNIST Chemist and Study Co-author The researchers pulled the garments apart into 32 textile samples and extracted PFAS from the samples into a solvent. Then they tested each solvent to see if it contained any of 55 different PFAS chemicals. After running these tests, Davis and his team found measurable amounts of PFAS in 25 of the 32 textile samples. Across those samples, they found 19 different types of PFAS. “There was a range in the amount of PFAS we found in each sample,” said Davis, “Most had only a little, but a few had large amounts.” The hoods contained low PFAS levels. In almost all cases, the amount of PFAS in hood layers was too small to be measured confidently. The inside layers of the gloves had amounts of PFAS similar to those found in the inside layers of coats and pants tested in prior studies. Wildland gear is made of only one layer. The assumption among researchers was that this layer was unlikely to contain much PFAS. In general that was true, as most of the wildland gear tested had low levels of PFAS. But there were some cases that had notably high levels. Across all the textiles tested in this study, the largest total concentration of PFAS in a single sample was about 4,240 micrograms per kilogram from a piece of wildland gear. “We still don’t know what this means in terms of risk to a firefighter’s health,” said Davis, “But understanding where PFAS is will help us reduce potential impacts as we learn more about these chemicals.” The researchers plan to run a follow-up study on the same samples to see how wear and tear might increase the amount of detectable PFAS in hoods, gloves and wildland firefighter gear. Read more posts

Beyond Visible Light Technologies Survey: Technology Adoption And Usage
Traditional cameras, which rely solely on visible light, have limitations in their ability to monitor and detect in challenging conditions such as darkness, fog, or other visual obstructions. To overcome these limitations, the industry is increasingly adopting non-visible light perception technologies such as thermal imaging, radar, x-ray and audio. By tapping into the non-visible light spectrum, these technologies enhance monitoring capabilities by detecting heat signatures, movement and details that would otherwise go unnoticed. This not only enhances security applications, such as surveillance in complete darkness or adverse weather, but also opens up new opportunities in fields like healthcare, industrial inspection, and environmental monitoring. To further explore the adoption of these advanced technologies, asmag.com and Hikvision have partnered up to conduct a survey examining the deployment and full potential of four key non-visible light technologies: thermal imaging, audio, x-ray and millimeter radar. Key findings Thermal imaging and audio lead in non-visible light tech deployment Survey data shows that thermal imaging (72%) and audio technology (57%) are the most widely deployed technologies by respondents, followed by X-ray technology (31%) and millimeter radar technology (29%). Audio technology has become a valuable component of security applications, and recent advancements have further expanded its capabilities. The transition to IP-based audio solutions has facilitated integration with existing surveillance systems, enhancing communication and sound warnings. Moreover, the incorporation of two-way audio into surveillance cameras has enabled real-time interaction with individuals in the field. While X-ray and radar technologies are gaining traction, their adoption rates remain lower than thermal and audio solutions. Factors such as cost, complexity and regulatory restrictions may contribute to this. As these challenges are addressed and technological advancements continue, we can anticipate further growth in the adoption of X-ray and radar in various sectors. Customer demand alignment with current market deployment Customer demand seems to align closely with the technologies being offered, especially for thermal imaging and audio solutions. Survey data shows that thermal imaging has the highest level of inquiries, with 15% of respondents indicating that they are always asked about it, 24% often and 39% sometimes. Similarly, audio technology also sees strong demand, with 16% reporting that it was always requested and 24% often. These figures suggest that the market is effectively meeting customer needs for these two technologies. However, demand for X-ray technology and millimeter radar outpaces their current deployment. While 42% of respondents receive inquiries for X-ray (5% always, 10% often, 27% sometimes), only 31% of solutions providers offer it. Similarly, millimeter radar is requested by 37% of respondents (2% always, 11% often, 24% sometimes), but only 29% offer it. This suggests that while customer interest is growing, existing challenges are limiting deployment. The gap suggests a potential opportunity for vendors to expand their offerings if they can address these challenges effectively. Security remains primary reason for adoption Across all technologies, security remains the primary reason for adoption. A significant 69% of respondents cited the need to enhance detection in low-light or challenging environments as a key motivator, with 49% focusing on proactive threat detection and management and 41% seeking to improve situational awareness through multi-dimensional perception. This strong emphasis on security aligns with the high demand for thermal imaging and audio technologies, which have been proven to enhance surveillance and communication in real-time security operations. Interestingly, the survey results showed that there is a growing trend towards expanding applications beyond security, with 41% of respondents indicating this as a reason for adoption. Moreover, another equal percentage (41%) cited the need to meet customer requests and project requirements. This correlation suggests a customer-centric approach in the industry, where providers are responding to specific client needs and preferences. Technology insights, applications by industry Thermal technology Security/perimeter protection remains the primary application for thermal imaging, accounting for 86% of responses. Other top applications include early fire and smoke detection (65%), industrial equipment monitoring (53%) and body temperature monitoring (43%). These applications align with the unique capabilities of thermal imaging, which detects objects based on their heat signature. Respondent quotes further support these findings: The top five verticals for thermal imaging deployment are energy infrastructure, factories, transportation, healthcare, and office/corporate buildings. This is consistent with its ability to improve situational awareness and detect potential hazards. For instance, in energy infrastructure, it can also be used to monitor equipment overheating. What are the primary applications of thermal imaging technology for your projects/ customers? Audio technology Security ranks a solid No. 1 (88%) as the primary application for audio technology. Indeed, audio solutions such as intercoms, public address systems and warning messages have been deployed for security purposes for many years. Today, audio and video surveillance can be integrated, enabling warning messages to be played back on a speaker when a potential intruder/ loiterer is detected. Non-security applications are also cited, for example industrial equipment monitoring (47%) and background music (41%). The top verticals for audio solution deployment are retail, factories, energy infrastructure, office/corporate buildings and healthcare. This is not a surprise – retail stores, for example, are known to use PA systems for both security and background music, and factories use audio analytics for equipment monitoring. It’s important to note that the audio industry is transitioning to IP-based solutions, similar to the growth of IP surveillance. This shift is expected to drive significant growth in the audio technology market as organizations adopt more advanced and integrated solutions. What are the primary applications of audio technology for your projects/ customers? Millimeter radar technology Security and traffic management are the primary applications for respondents, accounting for 81% and 64% of responses respectively. Radar works by emitting signals into the environment and processing the reflected signals to determine the speed, size and distance of those objects. This makes radar ideal for both security and transportation, for use cases such as speed measurement and traffic flow detection. Compared to cameras, radar offers several advantages, including the ability to cover large areas and operate independently of weather conditions. Radar can also be combined with PTZ cameras to provide…

5 Key Trends for Biometric Access Control in Buildings
The landscape of biometric access control for buildings is rapidly evolving, shaped by technological advancements and shifting user expectations. Here are five key trends currently defining the application of biometric access control in buildings. While some aspects of the biometric access market remain constant, such as the importance of privacy protection and rising attention to ease of use and efficiency, new trends have emerged which are transforming the way users interact with their surroundings. Understanding these key trends can help access solution providers and property managers navigate the market more effectively and better serve users. New biometric technologies are accelerating in application The market research agency ResearchAndMarkets estimates the global biometric authentication market will reach around $8.8 billion in 2026, growing at a CAGR of 16.3%. Biometric technologies – like iris and palm recognition – have made significant strides, becoming increasingly applicable in high-security environments. They provide superior security compared to traditional or pure face recognition access control systems, remarkably reducing the risk of unauthorized access. Since launching the MinMoe face recognition series, Hikvision has been at the forefront of biometric innovation, now offering more advanced biometric solutions including iris recognition terminal, face & palm recognition terminal to bolster access control security. Building management systems are increasingly converging According to Meticulous Research’s latest report, the Integrated Access Control System market is projected to experience an annual growth rate of 10.1% from 2024 to 2031. In residential properties, access control is being combined with video intercom and security systems, creating seamless user experiences and improving security. For office buildings, the integration of access control with elevator systems, advertising displays, and time attendance systems is increasingly in demand, streamlining operations while providing valuable insights. Hikvision consistently leads the way in integrated solutions, offering comprehensive packages that seamlessly blend access control with it’s own or third-party building management systems, encompassing video security, elevator control, smart automation, and more. Moreover, Hikvision facilitates integrated building management on a unified platform, allowing subsystems to interconnect and be managed cohesively, enhancing both efficiency and security. Modular designs are becoming mainstream Flexibility and cost-effectiveness are becoming more essential when property managers considering deploying new or upgrading existing access control solutions. Modern Hikvision has been committed to delivering practical and cost-efficient access control solutions, with the 1T670, 1T673 and IT681 MinMoe series offering a variety of modules including face, card, fingerprint, QR code, physical button, and sub 1G communication. Now our range has been extended with palm and mobile credential modules, to meet diverse requirements and budgets. There is an increasing demand for higher outdoor protection Biometric access control systems are moving beyond indoor applications to outdoor environments. For example, modern office complexes and manufacturing parks are increasingly installing access control points outdoors. This shift necessitates robust solutions designed to withstand various weather and outdoor conditions. Manufacturers are innovating products with durable materials and protective features to ensure reliable performance outdoors. Hikvision’s MinMoe face recognition products are engineered for durability. Our outdoor offerings feature waterproof and vandal-resistant designs, utilizing premium aluminium alloy materials along with rain shield accessories. The IP65 rating ensures exceptional protection for outdoor use. Cloud-based deployment is gaining more popularity Access control solution providers are increasingly focused on offering various deployment methods to meet the unique needs of different businesses. A notable trend is the adoption of cloud-based deployment, which offers significant advantages such as scalability, flexibility, and remote management. Hikvision offers flexible biometric access control solutions for clients of all sizes, from single stores to large organizations and chains. We provide the right deployment management options you need with unified management, including on-device management, on-premises deployment with HikCentral software, and cloud-based management with Hik-Connect 6 platform. Exciting advancements in biometric access control are transforming the landscape of security. As technology evolves, these solutions are becoming even more convenient and secure.