networked physical security information systems 101612physical... · automating compliance....

10
10/16/12 1 NETWORKED PHYSICAL SECURITY SYSTEMS Severin Sorensen, CPP Sikurity LLC PO Box 980068 Park City, UT 84098 .[email protected] 202-258-7600 DISCLAIMER The named security manufacturer equipment and solutions identified in this presentation are not an endorsement of the manufacturer, and are offered in this presentation to provide a visual of the particular technology, issue, or feature benefit available in the industry. Points of view are those of the presenter and are not those of ASIS or the security manufacturers identified. The audience is further advised that strongly held opinions of the presenter are opinions only, and could be wrong, though strongly held opinions gained from over 20 years experience in the security industry. DEFINE YOUR SYSTEMS INTEGRATION SCOPE – START WITH THE END IN MIND System Components Purpose H ow? Deter Discourge easy access Fences, walls Reinforce boundaries Barriers, gates, locks Physical constraints Detect Provide early warning Intrusion detection sensors of unauthorized entry Delay Impede easy access Fences, barriers to key assets Audio visual alerts Delay devices Assess Delay intruder for assessment Direct visual identification Provide positive confirmation CCTV, central control of valid alarm Lighting, sound Respond Take appropriate action Communications Guards Safe places Police, etc. Adapted from presentation by Martin L. Vitch, CPP, at the Physical Security Technology & Applications Conference, Minneapolis, MN, June 3-5, 1996. SYSTEMS INTEGRATION TECHNOLOGY IN DISCUSSION IN THIS PRESENTATION Networked Physical Security Systems The What and Why of Integration Command & Control with Physical Security Information Management (PSIM) Expansion of capabilities through data interaction with access control, CAD, intrusion, process control/SCADA, etc. Integrated systems through C4I (national security related systems) WHO USES SECURITY SYSTEMS INTEGRATION TODAY Airports Casinos Chemical Plants Corporate campuses Critical infrastructure Multinational corporations Rail and sea ports Shopping centers Distributed operations TYPICAL SYSTEM INTEGRATION NEEDS Scenario: Casino

Upload: others

Post on 27-May-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Networked Physical Security Information Systems 101612Physical... · automating compliance. IP360’s agentless architecture is designed ... Incident Management Display Relevant Geo-Referenced

10/16/12  

1  

NETWORKED PHYSICAL SECURITY SYSTEMS Severin Sorensen, CPP Sikurity LLC PO Box 980068 Park City, UT 84098 [email protected] 202-258-7600

DISCLAIMER

�  The named security manufacturer equipment and solutions identified in this presentation are not an endorsement of the manufacturer, and are offered in this presentation to provide a visual of the particular technology, issue, or feature benefit available in the industry.

�  Points of view are those of the presenter and are not those of ASIS or the security manufacturers identified.

�  The audience is further advised that strongly held opinions of the presenter are opinions only, and could be wrong, though strongly held opinions gained from over 20 years experience in the security industry.

DEFINE YOUR SYSTEMS INTEGRATION SCOPE – START WITH THE END IN MIND System Components Purpose How?

Deter Discourge easy access Fences, wallsReinforce boundaries Barriers, gates, locks

Physical constraints

Detect Provide early warning Intrusion detection sensorsof unauthorized entry

Delay Impede easy access Fences, barriersto key assets Audio visual alerts

Delay devices

Assess Delay intruder for assessment Direct visual identificationProvide positive confirmation CCTV, central controlof valid alarm Lighting, sound

Respond Take appropriate action CommunicationsGuardsSafe placesPolice, etc.

Adapted from presentation by Martin L. Vitch, CPP, at the Physical SecurityTechnology & Applications Conference, Minneapolis, MN, June 3-5, 1996.

SYSTEMS INTEGRATION TECHNOLOGY IN DISCUSSION IN THIS PRESENTATION

�  Networked Physical Security Systems �  The What and Why of Integration �  Command & Control with Physical

Security Information Management (PSIM)

�  Expansion of capabilities through data interaction with access control, CAD, intrusion, process control/SCADA, etc.

�  Integrated systems through C4I (national security related systems)

WHO USES SECURITY SYSTEMS INTEGRATION TODAY

�  Airports

�  Casinos

�  Chemical Plants

�  Corporate campuses

�  Critical infrastructure

�  Multinational corporations

�  Rail and sea ports

�  Shopping centers

�  Distributed operations

TYPICAL SYSTEM INTEGRATION NEEDS

�  Scenario: Casino

Page 2: Networked Physical Security Information Systems 101612Physical... · automating compliance. IP360’s agentless architecture is designed ... Incident Management Display Relevant Geo-Referenced

10/16/12  

2  

HARRAH’S NEW ORLEANS � 450 Room Hotel �� 120 Table Games�� 2,400 Slot Machines�� 9 Restaurants�� 13 Bar Outlets�� Theatre Box Office �� Valet and Parking Garage Revenue Outlets�� 5.6 Million Visitors in 2007�� 2,400 Employees�

This presentation and all trademarks appearing in this presentation are the sole and exclusive property of Harrah’s Operating Company, Inc. and its affiliated companies for use by its related companies (collectively, “Harrah’s”). This presentation and its contents are confidential and proprietary to Harrah’s and may not be used or reproduced in whole or in part without Harrah’s express prior written authorization. Trademarks not owned by Harrah’s that appear in this presentation are the property of the respective owners.

SURVEILLANCE DEPARTMENT � 30 Highly Trained Personnel �� Over 1450 Cameras�� Non-stop Recording of the Entire Casino Operation 7-60 Day Video Retention�

PROTECTING ASSETS AND REPUTATION � Actively Monitoring all Facets of the Casino to Include:�� All Public Areas on Property �� Live Gaming and Slots�� Cashiering �� Randomly Observe all Casino Employees and Guest Activity in Casino �

� Ensure Employees are Following �State Regulations, Internal Controls,�and Departmental Standard�Operating Procedures�

� Report Violations of Procedure �� Partner with LSP�

PROPERTY POLICIES AND PROCEDURES � State Regulations�� Internal Control Standards�� Departmental Standard Operating Procedures�

� Role of Surveillance is to observe and report any infractions �

OPERATIONS SUPPORT

� Perform Pace Audits/Service Audits�� Security Assistance �� Investigate Variances�� 2000 Photo Requests Monthly �� Video Retention for Injuries�� Testify in Court �� Assist Operations by Answering �1000+ Phone Calls a Day �

SURVEILLANCE WORKING ENVIRONMENT � Physical characteristics of the Surveillance Room.�

� Console, Radio, Phones�� Video Monitors�

� Keyboards �� 1450 Cameras on Property �

� Parking Garages, Hotel and Casino Property.�� VCR’s, DVR’s, and Stand Alone Digital Systems.�� Quads, Multiplexers Recording all Cameras on Property �

� LSP-Surveillance-Security �

Page 3: Networked Physical Security Information Systems 101612Physical... · automating compliance. IP360’s agentless architecture is designed ... Incident Management Display Relevant Geo-Referenced

10/16/12  

3  

SURVEILLANCE CONFIGURATIONS

� PTZ and Fixed Type Cameras�� 60-40 Ratio �

� Surveillance �� Switch-Vicon�

� Cameras�� Vicon, Pelco, Sanyo, Honeywell, Vitek�

� DVR’s & VCR’s�� Sanyo �

SYSTEM INTEGRATION � Panic Alarms�

� POS Registers and Cashiers�� MICROS Interface �

� Cash Registers�� Door Contact Alarms�

� Sensitive Areas�� Slot Data System�

� Monitored for Slot Activity �� CMS �

� Monitored to Identify Players

ENVIRONMENTAL CHALLENGES � Inconsistent Lighting Conditions�� Tracking Guests After the Fact �� 130,000 s.f. Casino Floor�� Volume of Transactions�

� Balancing Observation Efforts�� Use of Multiplexers�

� Frame Rate �� Migration from Analog to Digital - Cost �

INNOVATIONS � MICROS Interface �

�  POS Stations - Text Overlay �� Dedicated Fixed Cameras �

� Entry/Exit Points – Identify Guests�� Networking �

� Louisiana Casino Surveillance Network, Griffin, Biometrica�

� Free Sharing of Information on Casino Cheats�

17

MAKE SURE THAT YOUR TECHNOLOGY SOLUTION HAS “CROSSED THE CHASM”

Conceptual Drawing: Inspired by Geoffrey Moore in his book Crossing the Chasm

18

TECHNOLOGY PROGRESSION

Analog D

igital

Time-Lapse VCR

SAN – Storage Area Network

Digital Video Recorder Single CPU Based with IDE or SCSI HD

VCR

Stand-alone Video Servers w/storage

Edge Appliance (Cameras) with onboard storage

MVaaS, managed Video as a service, a SaaS solution

Network Video Recorder

471 Acquired, dead, renamed, merged & gone away storage companies

…It’s not the technology, but the solution that matters

Page 4: Networked Physical Security Information Systems 101612Physical... · automating compliance. IP360’s agentless architecture is designed ... Incident Management Display Relevant Geo-Referenced

10/16/12  

4  

19

PHYSICAL SECURITY INFORMATION SYSTEM (PSIM) BENEFITS REPORTED BY USERS

Integration Platform

Unified and Consistent Response Plan

Automatic Actions and Escalations

Reporting and Analysis Capabilities

Compliance

Support Intelligent Decision Making

20

EXAMPLE OF HOW INTERACTIVE CENTRAL STATION MONITORING

�  Model is similar whether hosted �  Local (on

site)

�  Remote (client hub)

�  Central Station (3rd party hub)

Early Central Monitoring Station, Farsight, LTD.

21

WHAT DO SEE IN TERMS OF OPERATION IN THIS CENTRAL STATION?

© COPYRIGHT 2008 BY SEVERIN SORENSEN AND SIKYUR LLC 22

WHAT YOU SEE IN TERMS OF PRACTICE OR ORGANIZATION IN THESE CENTRAL STATIONS

23

CENTRAL STATION DESIGN

Central station components SOC - Security Operation Center NOC – Network Operation Center DOCK – HVAC, Backup Power Generation, Controls Training Room, Engineer Support Kitchen, Shower, Storage

24

EX. NETWORK STORAGE VIA SAN

�  SAN – Storage Area Networks enable storage of video data beyond limitations of device operating systems. Note below how multiple device OS can be used in a SAN Storage array

�  SAN storage arrays can also be distributed increasing data protection

ww

w.ceg-dss.com

/vid_solution.html

Page 5: Networked Physical Security Information Systems 101612Physical... · automating compliance. IP360’s agentless architecture is designed ... Incident Management Display Relevant Geo-Referenced

10/16/12  

5  

25

EX., MVAAS – MANAGED VIDEO AS A SERVICE

• Software as a Service (SaaS) models strive to off-load the equipment costs of storage to central service providers, offering online services on a monthly fee-for-service basis.

• There are at least 12 Video SaaS models being rolled out by industry providers

• Common traits are browser based recall, access, via cell phone and Internet browser PC

INTEGRATION POSSIBILITIES

�  Truly any connected device

�  Information access

�  Information distribution, annunciation, and notification

�  Situational awareness, health, and present status

LIMITS ARE CREATIVITY

�  Access  Control  �  Communica8ons  -­‐Telephone,  Intercom,  Radio,  E-­‐Mail,  Public  Address,  Paging,  …  �  Iden8ty  Management  (FIPS  201,  TWIC,  OCRL,…)  �  Infrastructure  (Switches,  Routers,  Remote  Access,  UPS,  Compu8ng  Resources,

…)  �  Audio-­‐Visual  &  Messaging  (  TV,  announcements,  messaging,…)    �  Command  Centers  �  Opera8ons  

�  FIDS,  BIDS,  BMS,  SCADA,  …  �  Emerging  User  Interface  Features    �  Geospa8al,  Graphics,  Tracking,  Caller  ID,  Dispatch,  CAD…  �  Ad  context  to  all  events  including  video,  especially  for  large  systems  with  many  devices  

28

GE MASTERMIND

29

THE BUSINESS CONTROL CENTER

Sensor

1  VIDEO  RECORDING  AND  STORAGE  OPTIONS  

�  Indeed video systems can be the ‘brain’ of the security operations.

Page 6: Networked Physical Security Information Systems 101612Physical... · automating compliance. IP360’s agentless architecture is designed ... Incident Management Display Relevant Geo-Referenced

10/16/12  

6  

BEYOND CONVENTIONAL ACCESS CONTROL ARE BIOMETRIC COMPONENT POSSIBILITIES �  Fingerprints

�  Voiceprint

�  Retinal scan

�  Iris scan

�  Facial recognition

�  Thermal Recognition

�  Activity Recognition

6  VM  SOFTWARE  (MANY  OPTIONS)  

6  VM  SOFTWARE  (VARIETY  OF  OPTIONS  WITHIN  SINGLE  VENDOR  PLATFORM)  

http

://w

ww

.ons

si.c

om/p

rodu

cts/

com

pari

son

34

BOEING AUTOMETRIC VSOC / NICE

© COPYRIGHT 2008 BY SEVERIN SORENSEN AND SIKYUR LLC 35

DEVELOP VIDEO MANAGEMENT SYSTEMS WITH METRICS, VISUALIZATION, AND DASHBOARDS

�  Video metrics are characteristics or attributes from the video system health or observations that are automatically captured and processed.

�  Electronic dashboards can help security managers assess data with ease, drilling down on specific needs and trends. �  Good metrics are

�  Consistently measured

�  Inexpensive to gather

�  Quantified by common units of measure

�  Expressed as a numerical value

�  Sample metrics might include �  CCTV System health

�  CCTV camera status

�  IP bandwidth availability

�  IP through put and signal loss

�  Video information characteristics �  Video intelligent based information capture

(e.g., people counting, etc.)

�  Video alarm handling and characterization

36

PPM2000

� PPM 2000 specializes in software solutions for criminal and incident reporting and investigation management

� Thousands of organizations have implemented a PPM solution, and our clients span all industries and include many of the Fortune 1000.

Page 7: Networked Physical Security Information Systems 101612Physical... · automating compliance. IP360’s agentless architecture is designed ... Incident Management Display Relevant Geo-Referenced

10/16/12  

7  

37

NCIRCLE �  Comprehensive, agentless

discovery and profiling of all network assets

�  IP360 is the market-leading discovery platform that comprehensively profiles all networked devices and their applications, vulnerabilities, and configurations, providing the ideal foundation for managing risk and automating compliance. IP360’s agentless architecture is designed for rapid deployment and ease of management across large, globally distributed networks.

Specializing in live-updated mash-ups of network security data

38

NEXIDIA -- AUDIO SPEECH ANALYTICS

�  US market exists for audio products.

�  All utterances made in the entire world have been catalogued within a 400 phoneme range. The majority of languages fall around the 40 phoneme range. Searches using phoneme pattern matching can be executed on:

�  blended words

�  proper names, slang, code words, brands, etc.

�  non-standard grammar patterns

�  ad-hoc use of different languages

www.nexidia.com

39

SAMPLE GUI OPERATOR OF INTEGRATED SECURITY SYSTEMS

Management Dashboards and Decision Making Tools

Global GIS Systems Map Interfacing

Networked Systems and Site Plan

Sensor Fusion – e.g., ALPR © COPYRIGHT 2008 BY SEVERIN SORENSEN AND SIKYUR LLC 40

CINARIO �  Cinario sells itself as a world leader in Intelligent Operational Risk

Management Systems.

�  Cinario has four products built on a base of integrated IP technology for central station and security use

�  Cinario Enterprise Manager

�  Cinario Enterprise Manager Command Center

�  Cinario Security Manager

�  Cinario Adaptive Intelligence Server

�  Cinario EM Com Centre is an application is a business class software designed to be implemented in a Command Centre or a Control Room environment. Cinario EM Com Centre allows an organization integrate all of its risk monitoring systems into a single management application.

�  Cinario solutions allow organizations integrate and intelligently manage their physical infrastructure assets, reducing cost, risk and losses. Cinario EM Com Centre allows Control Room operators have full management and control of all end equipment, including CCTV, Alarms, Access Control, Access Points, EPOS, BMS systems and more. Operators use a single interface which gives a common look and feel to the environment, irrespective of the multitudes of equipment used within the environment.

�  Organizations use Cinario software to manage their Security, BMS, Energy, Refrigeration, Engineering, EPOS, HR and back office systems, often integrating their legacy systems into a command centre environment. Cinario EM Com Centre is a non proprietary application, and currently supports full integration to over 60 different types of equipment. This flexibility allows the end user the freedom to specify the equipment which meets their budgetary and functional requirements. Not being tied into a single manufacturer can have significant cost benefits for an organization.

Intelligent – management - solutions

http://www.cinario.com

© COPYRIGHT 2008 BY SEVERIN SORENSEN AND SIKYUR LLC 41

INTEGRATED SYSTEMS AWARENESS � Ex., Vistascape

42

People Alerting sources Response

plans

SITUATION MANAGEMENT

A solution approach comprised of tools and methods for the coordination between:

Situation Management

Page 8: Networked Physical Security Information Systems 101612Physical... · automating compliance. IP360’s agentless architecture is designed ... Incident Management Display Relevant Geo-Referenced

10/16/12  

8  

43

Overload of Information

THE CHALLENGE IN CONTROL ROOM

44

Risk/Cost of mismanaging security & safety situations

is on the rise Public Pressure

New Regulations Government Pressure

New Technologies Industry Pressure

CHALLENGES - MARKET TRENDS

45

Situation Management

Plans Operations Analysis

Video Access Control

Location Devices Sensors Internet

Feeds IT Systems

What is Situation Management?

46

Situator Planning

Tool

Situator Debriefing

Tool

Situator Control Room

Situator Mobile

Application

SITUATION MANAGEMENT LIFECYCLE

48 48

HOW WOULD IT LOOK LIKE? Incident Management

Display Geo-Referenced

Display Relevant

Video Feeds

Page 9: Networked Physical Security Information Systems 101612Physical... · automating compliance. IP360’s agentless architecture is designed ... Incident Management Display Relevant Geo-Referenced

10/16/12  

9  

49 50

Simultaneously, the relevant tasks are sent to the relevant

personnel and field responders

51 52

53

Door Forced Incident

54

STANDARDS WATCH – RESOURCE: THE SELECTION OF CAMERAS, DIGITAL RECORDING SYSTEMS, DIGITAL HIGH-SPEED NETWORKS AND TRAIN-LINES FOR USE IN NEW TRANSIT-RELATED CCTV SYSTEMS

� Security monitoring in stations � Security monitoring in parking lots and structures � Security monitoring for tunnels and bridges � Security monitoring for facilities � Operations monitoring in stations and key locations � On-board monitoring on trains (safety, security, interior

monitoring, and loss prevention) � On-board monitoring on buses (safety, security, interior

monitoring, and loss prevention) � External monitoring (safety, security, accident investigation, and

platform monitoring) � Loss-prevention monitoring for revenue systems

Source: http://www.transitcommtech.com/cctv.htm

Page 10: Networked Physical Security Information Systems 101612Physical... · automating compliance. IP360’s agentless architecture is designed ... Incident Management Display Relevant Geo-Referenced

10/16/12  

10  

55 55

SITUATION MANAGEMENT BENEFITS

�  Integration and unified view of all alarming sensors and systems (open system �  Optimizes investments in your existing technologies �  Improved security. Ensures better, faster decision making in routine and emergency

situations �  Ensures compliance with updated regulations and standards. Provides proof of

compliance �  Reduces human error �  Controls operating costs

56

IPVIDEOMARKET.INFO

STANDARDS

�  Example of what an integrated security systems might look like in a Central Station or Co-located Server Farm �  Interna8onal  Standards  Se]ng  Bodies  (i.e.,  ISO,  IEC….)  �  Regional  Standards  Se]ng  Bodies  (i.e.,  for  the  EU  -­‐  CEN,  CENLEC….)  �  Na8onal  Standards  Se]ng  Bodies  (i.e.,  ANSI,  BSI,  AFNOR…..)  �  ANSI  Accredited  Standards  Development  Organiza8ons  (SIA,  ASIS,  IEEE,  INCITS,  

ASTME,  other  accredited  organiza8ons)  �  ANSI/SIA  OSIPS-­‐01:2008  Framework  

�  ANSI/SIA  OSIPS-­‐01:2008  DVI  (Current  revision  work  covers  video  integra8on  and  video  analy8cs  )  

�  Open  Network  Video  Interface  Forum  (ONVIF)  –  www.onvif.org  is  an  open  industry  forum  for  the  development  of  a  global  standard  for  the  interface  of  network  video  products.    (Axis,  Sony,  Bosch)  and  330+  industry  collaborators  

�  Other  Industry  Standards  that  are  industry  specific  

© COPYRIGHT 2004-2008 BY SEVERIN

L. SORENSEN, CPP AND SIKYUR LLC. ALL RIGHTS

RESERVED. 58

GOTCHAS! AVOIDING PROJECT FOUL-UPS

1.  Prior planning prevents poor performance! 2.  Complete engineering before equipment

purchase or cutting 3.  Remember the Carpenters rule – measure

twice, cut once 4.  Avoid bleeding edge components, and

components that are obsolete fossils 5.  Experience matters, but experience with your

particular application matters more, especially lessons learned from failed projects

6.  Check references, balance sheets, and viability 7.  Never let vendors prepare your meeting minutes 8.  Prepare timelines and stick to them

WHERE TO FIND MORE INFORMATION ON CCTV SPECIFICATION, INTEGRATION, AND MONITORING

SEVERIN L. SORENSEN, CPP President & CEO SIKURITY LLC

PO Box 980068 Park City, UT 84098 (202) 258-7600 (240) 597-8877 [email protected]

www.sikurity.com