8447779800, Low rate Call girls in Rohini Delhi NCR
Airport security 2013 donald zoufal
1. Harnessing the Power of Security
Technology Through Command and
Control Centers
Donald Zoufal
Safety & Security Industry Executive
SDI (System Development Integration, LLC)
2. Aviation Security Summit, Prague, Czechoslovakia September 18, 2013
Harnessing the Power of
Security Technology Though
Command and Control Centers
6. 6
Technology Factors
• New technologies are IT-based: the
"Apollo console" is replaced by
monitor and keyboard.
• Technology has "escaped" the
security office: No longer in a "silo“;
must be distributed more widely to
new stakeholders.
• New tech is increasingly mobile:
Mobile handheld devices, live video in
vehicles, mobile command, UAVs and
UGVs.
OEMC
(911)
Mayor’s
OfficeUnited
Airlines
FBIFAA
External Access to Video at O’Hare Airport
7. 7
Distributed Digital Platforms
• Any computer on the network with
permission can access cameras
– Multiple groups can collaborate
– View from external locations for instant
situational awareness.
• Mobile devices (in cars and on handheld units
– PDA, Smart Phones)
Digital video provides enhanced capabilities
8. 8
Video Analytics provides more 'eyes‘
...and they never get tired…let the system look for unacceptable behavior.
• Suspicious packages
• Trespassing
• Unusual crowd movements
• Fallen Person
Evolving Analytics
9. 9
Enhanced Imagery
1 CIF
704 x 480
Surveillance Industry
State-of-the-Art
15x Coverage OR 15x Detail
Five Mega Pixels: 2560 x 1920
352 x 240
4 CIF
High Resolution Video
• Better coverage with fewer
cameras.
• Better evidence from high-res.
10. 10
Biometric devices
• Ensure that access cards are used only by authorized employees.
• Can use combination of card, fingerprint, and PIN.
• Various types: fingerprint, hand geometry, iris scan.
Identity Management
• Identity management is no longer confined to one system: a
single identity is now enrolled in many different disparate
systems.
• Multiple databases and reporting requirements make identity
management complex.
Sophisticated Access Control
11. 11
Mobility
Technology is increasingly mobile, requiring new approaches to
deployment, security, and integration.
• Security becomes even more important, requiring encryption, intrusion
detection.
• Connectivity sometimes requires multiple transmission methods.
Unmanned Ground Vehicles
For patrolling perimeters
Wireless video surveillance Smart Phone
Video
Video & Other Apps in
Vehicles via Wireless
Coming…Here Now…
15. 15
Command Centers
• Provide a safe, reliable home base for management
• Integrates all systems into a single management view.
Large scale video
Display any source:
video, cable TV,
documents,
computer screens,
Simple ‘drag and
drop’ control
interface
No more monitors
built into consoles:
LCD screens can
display all systems:
video, access
control, alarm
systems, etc. Can be
reconfigured quickly.
No computers
under the desk
All computers are
housed in Data
Center
LCD Panels display
system data
Messages, shift
notices, monitoring
critical applications
Access to
Everything from
one seat
Operators have
access to ALL
systems in IP-based
command center
Classic Command Center Design
16. Command Center Configurations
16
• Security Operations Center (SOC)
• Airport Operation Center (AOC)
• Combined Operations Center (COC)
• Public safety Answering Point (PSAP)
• Emergency Operation Center (EOC)
• Fusion Center
17. 17
Looking to the Future
• Challenges Growing
• Continually evolving threats driven by world
politics.
• Increasing enplanements with decreasing
resources.
• New technologies require IT skills to implement
and support.
• New Capabilities and Approaches Being Employed
• All Command Centers moving to IT-based
systems; the end of the ‘component’ era.
18. 18
Questions
Donald R. Zoufal
J.D., M.A. Homeland Security, M.A. Public
Administration
Instructor, University of Chicago,
Masters of Science in Threat and Response
Management Program
dzoufal@uchicago.edu
Safety and Security Executive