SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
Harnessing the Power of Security
Technology Through Command and
Control Centers
Donald Zoufal
Safety & Security Industry Executive
SDI (System Development Integration, LLC)
Aviation Security Summit, Prague, Czechoslovakia September 18, 2013
Harnessing the Power of
Security Technology Though
Command and Control Centers
Vectors of Influence
3
• External Governmental
Requirements
• Internal Organizational
Requirements
• Private
Sector/Commercial
Interest
• Technology Change
Increased Requirements
4
• Airport Security Programs
• Airport Emergency Plans
• National Emergency Management Systems
• Local and Regional Emergency Response Plans
• Call-Taking and Dispatch Functions
• Information Processing and Intelligence Generation
• Notification
CONOPS and SOPS
5
6
Technology Factors
• New technologies are IT-based: the
"Apollo console" is replaced by
monitor and keyboard.
• Technology has "escaped" the
security office: No longer in a "silo“;
must be distributed more widely to
new stakeholders.
• New tech is increasingly mobile:
Mobile handheld devices, live video in
vehicles, mobile command, UAVs and
UGVs.
OEMC
(911)
Mayor’s
OfficeUnited
Airlines
FBIFAA
External Access to Video at O’Hare Airport
7
Distributed Digital Platforms
• Any computer on the network with
permission can access cameras
– Multiple groups can collaborate
– View from external locations for instant
situational awareness.
• Mobile devices (in cars and on handheld units
– PDA, Smart Phones)
Digital video provides enhanced capabilities
8
Video Analytics provides more 'eyes‘
...and they never get tired…let the system look for unacceptable behavior.
• Suspicious packages
• Trespassing
• Unusual crowd movements
• Fallen Person
Evolving Analytics
9
Enhanced Imagery
1 CIF
704 x 480
Surveillance Industry
State-of-the-Art
15x Coverage OR 15x Detail
Five Mega Pixels: 2560 x 1920
352 x 240
4 CIF
High Resolution Video
• Better coverage with fewer
cameras.
• Better evidence from high-res.
10
Biometric devices
• Ensure that access cards are used only by authorized employees.
• Can use combination of card, fingerprint, and PIN.
• Various types: fingerprint, hand geometry, iris scan.
Identity Management
• Identity management is no longer confined to one system: a
single identity is now enrolled in many different disparate
systems.
• Multiple databases and reporting requirements make identity
management complex.
Sophisticated Access Control
11
Mobility
Technology is increasingly mobile, requiring new approaches to
deployment, security, and integration.
• Security becomes even more important, requiring encryption, intrusion
detection.
• Connectivity sometimes requires multiple transmission methods.
Unmanned Ground Vehicles
For patrolling perimeters
Wireless video surveillance Smart Phone
Video
Video & Other Apps in
Vehicles via Wireless
Coming…Here Now…
12
Command Center
Functions and Interfaces in
Airports Today
Complex Mix of Diverse Systems
13
14
The Command Center Puzzle
15
Command Centers
• Provide a safe, reliable home base for management
• Integrates all systems into a single management view.
Large scale video
Display any source:
video, cable TV,
documents,
computer screens,
Simple ‘drag and
drop’ control
interface
No more monitors
built into consoles:
LCD screens can
display all systems:
video, access
control, alarm
systems, etc. Can be
reconfigured quickly.
No computers
under the desk
All computers are
housed in Data
Center
LCD Panels display
system data
Messages, shift
notices, monitoring
critical applications
Access to
Everything from
one seat
Operators have
access to ALL
systems in IP-based
command center
Classic Command Center Design
Command Center Configurations
16
• Security Operations Center (SOC)
• Airport Operation Center (AOC)
• Combined Operations Center (COC)
• Public safety Answering Point (PSAP)
• Emergency Operation Center (EOC)
• Fusion Center
17
Looking to the Future
• Challenges Growing
• Continually evolving threats driven by world
politics.
• Increasing enplanements with decreasing
resources.
• New technologies require IT skills to implement
and support.
• New Capabilities and Approaches Being Employed
• All Command Centers moving to IT-based
systems; the end of the ‘component’ era.
18
Questions
Donald R. Zoufal
J.D., M.A. Homeland Security, M.A. Public
Administration
Instructor, University of Chicago,
Masters of Science in Threat and Response
Management Program
dzoufal@uchicago.edu
Safety and Security Executive
Thank you.
Visit us at sdienterprises.com

Contenu connexe

Tendances

Retail Location Security Complexities
Retail Location Security ComplexitiesRetail Location Security Complexities
Retail Location Security ComplexitiesEtienne Liebetrau
 
Secure Element Solutions
Secure Element SolutionsSecure Element Solutions
Secure Element SolutionsUgo Chirico
 
Essential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical SecurityEssential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical SecurityPrecisely
 
Phykon solutions profile2014
Phykon solutions profile2014Phykon solutions profile2014
Phykon solutions profile2014Aju Thomas
 
Software plc
Software plcSoftware plc
Software plcKingstar
 

Tendances (6)

Retail Location Security Complexities
Retail Location Security ComplexitiesRetail Location Security Complexities
Retail Location Security Complexities
 
Secure Element Solutions
Secure Element SolutionsSecure Element Solutions
Secure Element Solutions
 
Essential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical SecurityEssential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical Security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Phykon solutions profile2014
Phykon solutions profile2014Phykon solutions profile2014
Phykon solutions profile2014
 
Software plc
Software plcSoftware plc
Software plc
 

En vedette

Airport security 2013 Chris Woodroofe
Airport security 2013   Chris WoodroofeAirport security 2013   Chris Woodroofe
Airport security 2013 Chris WoodroofeRussell Publishing
 
Business Continuity Management for Airports
Business  Continuity  Management for Airports Business  Continuity  Management for Airports
Business Continuity Management for Airports Continuity and Resilience
 
Airport security 2013 martin olsson
Airport security 2013   martin olssonAirport security 2013   martin olsson
Airport security 2013 martin olssonRussell Publishing
 
Airport security market assessment
Airport security market assessmentAirport security market assessment
Airport security market assessmentFreelancer
 
Ben gurion int airport shmul zackay
Ben gurion int airport shmul zackayBen gurion int airport shmul zackay
Ben gurion int airport shmul zackayMIT Forum of Israel
 
Airport security 2013 petr hloušek
Airport security 2013   petr hloušekAirport security 2013   petr hloušek
Airport security 2013 petr hloušekRussell Publishing
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
Gatwick Airport Disruption 2013 - A Case Study
Gatwick Airport Disruption 2013 - A Case StudyGatwick Airport Disruption 2013 - A Case Study
Gatwick Airport Disruption 2013 - A Case StudySteelhenge
 
Aviation security -_chpt1
Aviation security -_chpt1Aviation security -_chpt1
Aviation security -_chpt1carlinclarke
 
Airport security – aviation security
Airport security – aviation securityAirport security – aviation security
Airport security – aviation securityIIAC
 

En vedette (12)

Airport security 2013 Chris Woodroofe
Airport security 2013   Chris WoodroofeAirport security 2013   Chris Woodroofe
Airport security 2013 Chris Woodroofe
 
Business Continuity Management for Airports
Business  Continuity  Management for Airports Business  Continuity  Management for Airports
Business Continuity Management for Airports
 
Airport security 2013 martin olsson
Airport security 2013   martin olssonAirport security 2013   martin olsson
Airport security 2013 martin olsson
 
Airport security market assessment
Airport security market assessmentAirport security market assessment
Airport security market assessment
 
Ben gurion int airport shmul zackay
Ben gurion int airport shmul zackayBen gurion int airport shmul zackay
Ben gurion int airport shmul zackay
 
Airport security 2013 petr hloušek
Airport security 2013   petr hloušekAirport security 2013   petr hloušek
Airport security 2013 petr hloušek
 
An Overview Of The Airport Security Market,
An Overview Of The Airport Security Market,An Overview Of The Airport Security Market,
An Overview Of The Airport Security Market,
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
Gatwick Airport Disruption 2013 - A Case Study
Gatwick Airport Disruption 2013 - A Case StudyGatwick Airport Disruption 2013 - A Case Study
Gatwick Airport Disruption 2013 - A Case Study
 
Airline security new
Airline security newAirline security new
Airline security new
 
Aviation security -_chpt1
Aviation security -_chpt1Aviation security -_chpt1
Aviation security -_chpt1
 
Airport security – aviation security
Airport security – aviation securityAirport security – aviation security
Airport security – aviation security
 

Similaire à Airport security 2013 donald zoufal

Unitronics catalogue 2015
Unitronics catalogue 2015Unitronics catalogue 2015
Unitronics catalogue 2015mirosabev
 
ConnectorIO Services, Industrial IoT, Cloud BMS platform - 2019.12
ConnectorIO Services, Industrial IoT, Cloud BMS platform - 2019.12ConnectorIO Services, Industrial IoT, Cloud BMS platform - 2019.12
ConnectorIO Services, Industrial IoT, Cloud BMS platform - 2019.12Connectorio
 
SFScon 21 - Stefano Della Valle - The role of DLTs in advanced IoT platform
SFScon 21 - Stefano Della Valle  - The role of DLTs in advanced IoT platformSFScon 21 - Stefano Della Valle  - The role of DLTs in advanced IoT platform
SFScon 21 - Stefano Della Valle - The role of DLTs in advanced IoT platformSouth Tyrol Free Software Conference
 
USA_32pages_cataloge-152-LOW
USA_32pages_cataloge-152-LOWUSA_32pages_cataloge-152-LOW
USA_32pages_cataloge-152-LOWCara Bereck Levy
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-WebGiovanni Maree
 
Airport security 2013 slawomir szlufik
Airport security 2013   slawomir szlufikAirport security 2013   slawomir szlufik
Airport security 2013 slawomir szlufikRussell Publishing
 
Implementing a Security strategy in IoT, Practical example Automotive Grade L...
Implementing a Security strategy in IoT, Practical example Automotive Grade L...Implementing a Security strategy in IoT, Practical example Automotive Grade L...
Implementing a Security strategy in IoT, Practical example Automotive Grade L...LibreCon
 
UplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platformUplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platformSatya Harish
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCSMEN Micro
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCSMEN Mikro Elektronik GmbH
 
Internet of Things: an overview
Internet of Things: an overviewInternet of Things: an overview
Internet of Things: an overviewPascal Bodin
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VRISC-V International
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
Use of 5G under Covid Emergency
Use of 5G under Covid Emergency Use of 5G under Covid Emergency
Use of 5G under Covid Emergency Roberto Tiozzo
 

Similaire à Airport security 2013 donald zoufal (20)

Unitronics catalogue 2015
Unitronics catalogue 2015Unitronics catalogue 2015
Unitronics catalogue 2015
 
Deimos airport suite eng
Deimos airport suite engDeimos airport suite eng
Deimos airport suite eng
 
ConnectorIO Services, Industrial IoT, Cloud BMS platform - 2019.12
ConnectorIO Services, Industrial IoT, Cloud BMS platform - 2019.12ConnectorIO Services, Industrial IoT, Cloud BMS platform - 2019.12
ConnectorIO Services, Industrial IoT, Cloud BMS platform - 2019.12
 
SFScon 21 - Stefano Della Valle - The role of DLTs in advanced IoT platform
SFScon 21 - Stefano Della Valle  - The role of DLTs in advanced IoT platformSFScon 21 - Stefano Della Valle  - The role of DLTs in advanced IoT platform
SFScon 21 - Stefano Della Valle - The role of DLTs in advanced IoT platform
 
USA_32pages_cataloge-152-LOW
USA_32pages_cataloge-152-LOWUSA_32pages_cataloge-152-LOW
USA_32pages_cataloge-152-LOW
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-Web
 
Tuneitek Solutions
Tuneitek SolutionsTuneitek Solutions
Tuneitek Solutions
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
 
Airport security 2013 slawomir szlufik
Airport security 2013   slawomir szlufikAirport security 2013   slawomir szlufik
Airport security 2013 slawomir szlufik
 
Implementing a Security strategy in IoT, Practical example Automotive Grade L...
Implementing a Security strategy in IoT, Practical example Automotive Grade L...Implementing a Security strategy in IoT, Practical example Automotive Grade L...
Implementing a Security strategy in IoT, Practical example Automotive Grade L...
 
UplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platformUplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platform
 
ACTAtek unique features
ACTAtek unique featuresACTAtek unique features
ACTAtek unique features
 
EENA 2018 - Wireless Communications in a Mission Critical Environment - State...
EENA 2018 - Wireless Communications in a Mission Critical Environment - State...EENA 2018 - Wireless Communications in a Mission Critical Environment - State...
EENA 2018 - Wireless Communications in a Mission Critical Environment - State...
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS
 
Internet of Things: an overview
Internet of Things: an overviewInternet of Things: an overview
Internet of Things: an overview
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-V
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Use of 5G under Covid Emergency
Use of 5G under Covid Emergency Use of 5G under Covid Emergency
Use of 5G under Covid Emergency
 

Plus de Russell Publishing

Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...Russell Publishing
 
Robin Forrest, International Relations, SNCF Security
Robin Forrest, International Relations, SNCF SecurityRobin Forrest, International Relations, SNCF Security
Robin Forrest, International Relations, SNCF SecurityRussell Publishing
 
Richard Aaroe, CEO, WaveTrainSystems (WTS)
Richard Aaroe, CEO, WaveTrainSystems (WTS)Richard Aaroe, CEO, WaveTrainSystems (WTS)
Richard Aaroe, CEO, WaveTrainSystems (WTS)Russell Publishing
 
Peter Guy, Operational Security & Continuity Planning Manager, Network Rail
Peter Guy, Operational Security & Continuity Planning Manager, Network RailPeter Guy, Operational Security & Continuity Planning Manager, Network Rail
Peter Guy, Operational Security & Continuity Planning Manager, Network RailRussell Publishing
 
Martyn Guiver, Head of Crime Management, Northern Rail
Martyn Guiver, Head of Crime Management, Northern RailMartyn Guiver, Head of Crime Management, Northern Rail
Martyn Guiver, Head of Crime Management, Northern RailRussell Publishing
 
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilMarc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilRussell Publishing
 
José Pires, Senior Security Advisor, International Union of Railways (UIC)
José Pires, Senior Security Advisor, International Union of Railways (UIC)José Pires, Senior Security Advisor, International Union of Railways (UIC)
José Pires, Senior Security Advisor, International Union of Railways (UIC)Russell Publishing
 
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)Russell Publishing
 
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer ElectronicDaniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer ElectronicRussell Publishing
 
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...Russell Publishing
 
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...Russell Publishing
 

Plus de Russell Publishing (20)

Elisabeth sinclair
Elisabeth sinclairElisabeth sinclair
Elisabeth sinclair
 
Elisabeth sinclair
Elisabeth sinclairElisabeth sinclair
Elisabeth sinclair
 
Denis castanet
Denis castanetDenis castanet
Denis castanet
 
Tim gray
Tim grayTim gray
Tim gray
 
Kari rouhonen
Kari rouhonenKari rouhonen
Kari rouhonen
 
Gunther koller
Gunther kollerGunther koller
Gunther koller
 
David thomasson
David thomassonDavid thomasson
David thomasson
 
Carl bjorgan
Carl bjorganCarl bjorgan
Carl bjorgan
 
Johnny sorenson
Johnny sorensonJohnny sorenson
Johnny sorenson
 
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
 
Robin Forrest, International Relations, SNCF Security
Robin Forrest, International Relations, SNCF SecurityRobin Forrest, International Relations, SNCF Security
Robin Forrest, International Relations, SNCF Security
 
Richard Aaroe, CEO, WaveTrainSystems (WTS)
Richard Aaroe, CEO, WaveTrainSystems (WTS)Richard Aaroe, CEO, WaveTrainSystems (WTS)
Richard Aaroe, CEO, WaveTrainSystems (WTS)
 
Peter Guy, Operational Security & Continuity Planning Manager, Network Rail
Peter Guy, Operational Security & Continuity Planning Manager, Network RailPeter Guy, Operational Security & Continuity Planning Manager, Network Rail
Peter Guy, Operational Security & Continuity Planning Manager, Network Rail
 
Martyn Guiver, Head of Crime Management, Northern Rail
Martyn Guiver, Head of Crime Management, Northern RailMartyn Guiver, Head of Crime Management, Northern Rail
Martyn Guiver, Head of Crime Management, Northern Rail
 
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilMarc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
 
José Pires, Senior Security Advisor, International Union of Railways (UIC)
José Pires, Senior Security Advisor, International Union of Railways (UIC)José Pires, Senior Security Advisor, International Union of Railways (UIC)
José Pires, Senior Security Advisor, International Union of Railways (UIC)
 
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
 
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer ElectronicDaniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
 
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
 
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
 

Dernier

FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 

Dernier (20)

FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 

Airport security 2013 donald zoufal

  • 1. Harnessing the Power of Security Technology Through Command and Control Centers Donald Zoufal Safety & Security Industry Executive SDI (System Development Integration, LLC)
  • 2. Aviation Security Summit, Prague, Czechoslovakia September 18, 2013 Harnessing the Power of Security Technology Though Command and Control Centers
  • 3. Vectors of Influence 3 • External Governmental Requirements • Internal Organizational Requirements • Private Sector/Commercial Interest • Technology Change
  • 4. Increased Requirements 4 • Airport Security Programs • Airport Emergency Plans • National Emergency Management Systems • Local and Regional Emergency Response Plans • Call-Taking and Dispatch Functions • Information Processing and Intelligence Generation • Notification
  • 6. 6 Technology Factors • New technologies are IT-based: the "Apollo console" is replaced by monitor and keyboard. • Technology has "escaped" the security office: No longer in a "silo“; must be distributed more widely to new stakeholders. • New tech is increasingly mobile: Mobile handheld devices, live video in vehicles, mobile command, UAVs and UGVs. OEMC (911) Mayor’s OfficeUnited Airlines FBIFAA External Access to Video at O’Hare Airport
  • 7. 7 Distributed Digital Platforms • Any computer on the network with permission can access cameras – Multiple groups can collaborate – View from external locations for instant situational awareness. • Mobile devices (in cars and on handheld units – PDA, Smart Phones) Digital video provides enhanced capabilities
  • 8. 8 Video Analytics provides more 'eyes‘ ...and they never get tired…let the system look for unacceptable behavior. • Suspicious packages • Trespassing • Unusual crowd movements • Fallen Person Evolving Analytics
  • 9. 9 Enhanced Imagery 1 CIF 704 x 480 Surveillance Industry State-of-the-Art 15x Coverage OR 15x Detail Five Mega Pixels: 2560 x 1920 352 x 240 4 CIF High Resolution Video • Better coverage with fewer cameras. • Better evidence from high-res.
  • 10. 10 Biometric devices • Ensure that access cards are used only by authorized employees. • Can use combination of card, fingerprint, and PIN. • Various types: fingerprint, hand geometry, iris scan. Identity Management • Identity management is no longer confined to one system: a single identity is now enrolled in many different disparate systems. • Multiple databases and reporting requirements make identity management complex. Sophisticated Access Control
  • 11. 11 Mobility Technology is increasingly mobile, requiring new approaches to deployment, security, and integration. • Security becomes even more important, requiring encryption, intrusion detection. • Connectivity sometimes requires multiple transmission methods. Unmanned Ground Vehicles For patrolling perimeters Wireless video surveillance Smart Phone Video Video & Other Apps in Vehicles via Wireless Coming…Here Now…
  • 12. 12 Command Center Functions and Interfaces in Airports Today
  • 13. Complex Mix of Diverse Systems 13
  • 15. 15 Command Centers • Provide a safe, reliable home base for management • Integrates all systems into a single management view. Large scale video Display any source: video, cable TV, documents, computer screens, Simple ‘drag and drop’ control interface No more monitors built into consoles: LCD screens can display all systems: video, access control, alarm systems, etc. Can be reconfigured quickly. No computers under the desk All computers are housed in Data Center LCD Panels display system data Messages, shift notices, monitoring critical applications Access to Everything from one seat Operators have access to ALL systems in IP-based command center Classic Command Center Design
  • 16. Command Center Configurations 16 • Security Operations Center (SOC) • Airport Operation Center (AOC) • Combined Operations Center (COC) • Public safety Answering Point (PSAP) • Emergency Operation Center (EOC) • Fusion Center
  • 17. 17 Looking to the Future • Challenges Growing • Continually evolving threats driven by world politics. • Increasing enplanements with decreasing resources. • New technologies require IT skills to implement and support. • New Capabilities and Approaches Being Employed • All Command Centers moving to IT-based systems; the end of the ‘component’ era.
  • 18. 18 Questions Donald R. Zoufal J.D., M.A. Homeland Security, M.A. Public Administration Instructor, University of Chicago, Masters of Science in Threat and Response Management Program dzoufal@uchicago.edu Safety and Security Executive
  • 19. Thank you. Visit us at sdienterprises.com