SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
Harnessing the Power of Security
Technology Through Command and
Control Centers
Donald Zoufal
Safety & Security Industry Executive
SDI (System Development Integration, LLC)
Aviation Security Summit, Prague, Czechoslovakia September 18, 2013
Harnessing the Power of
Security Technology Though
Command and Control Centers
Vectors of Influence
3
• External Governmental
Requirements
• Internal Organizational
Requirements
• Private
Sector/Commercial
Interest
• Technology Change
Increased Requirements
4
• Airport Security Programs
• Airport Emergency Plans
• National Emergency Management Systems
• Local and Regional Emergency Response Plans
• Call-Taking and Dispatch Functions
• Information Processing and Intelligence Generation
• Notification
CONOPS and SOPS
5
6
Technology Factors
• New technologies are IT-based: the
"Apollo console" is replaced by
monitor and keyboard.
• Technology has "escaped" the
security office: No longer in a "silo“;
must be distributed more widely to
new stakeholders.
• New tech is increasingly mobile:
Mobile handheld devices, live video in
vehicles, mobile command, UAVs and
UGVs.
OEMC
(911)
Mayor’s
OfficeUnited
Airlines
FBIFAA
External Access to Video at O’Hare Airport
7
Distributed Digital Platforms
• Any computer on the network with
permission can access cameras
– Multiple groups can collaborate
– View from external locations for instant
situational awareness.
• Mobile devices (in cars and on handheld units
– PDA, Smart Phones)
Digital video provides enhanced capabilities
8
Video Analytics provides more 'eyes‘
...and they never get tired…let the system look for unacceptable behavior.
• Suspicious packages
• Trespassing
• Unusual crowd movements
• Fallen Person
Evolving Analytics
9
Enhanced Imagery
1 CIF
704 x 480
Surveillance Industry
State-of-the-Art
15x Coverage OR 15x Detail
Five Mega Pixels: 2560 x 1920
352 x 240
4 CIF
High Resolution Video
• Better coverage with fewer
cameras.
• Better evidence from high-res.
10
Biometric devices
• Ensure that access cards are used only by authorized employees.
• Can use combination of card, fingerprint, and PIN.
• Various types: fingerprint, hand geometry, iris scan.
Identity Management
• Identity management is no longer confined to one system: a
single identity is now enrolled in many different disparate
systems.
• Multiple databases and reporting requirements make identity
management complex.
Sophisticated Access Control
11
Mobility
Technology is increasingly mobile, requiring new approaches to
deployment, security, and integration.
• Security becomes even more important, requiring encryption, intrusion
detection.
• Connectivity sometimes requires multiple transmission methods.
Unmanned Ground Vehicles
For patrolling perimeters
Wireless video surveillance Smart Phone
Video
Video & Other Apps in
Vehicles via Wireless
Coming…Here Now…
12
Command Center
Functions and Interfaces in
Airports Today
Complex Mix of Diverse Systems
13
14
The Command Center Puzzle
15
Command Centers
• Provide a safe, reliable home base for management
• Integrates all systems into a single management view.
Large scale video
Display any source:
video, cable TV,
documents,
computer screens,
Simple ‘drag and
drop’ control
interface
No more monitors
built into consoles:
LCD screens can
display all systems:
video, access
control, alarm
systems, etc. Can be
reconfigured quickly.
No computers
under the desk
All computers are
housed in Data
Center
LCD Panels display
system data
Messages, shift
notices, monitoring
critical applications
Access to
Everything from
one seat
Operators have
access to ALL
systems in IP-based
command center
Classic Command Center Design
Command Center Configurations
16
• Security Operations Center (SOC)
• Airport Operation Center (AOC)
• Combined Operations Center (COC)
• Public safety Answering Point (PSAP)
• Emergency Operation Center (EOC)
• Fusion Center
17
Looking to the Future
• Challenges Growing
• Continually evolving threats driven by world
politics.
• Increasing enplanements with decreasing
resources.
• New technologies require IT skills to implement
and support.
• New Capabilities and Approaches Being Employed
• All Command Centers moving to IT-based
systems; the end of the ‘component’ era.
18
Questions
Donald R. Zoufal
J.D., M.A. Homeland Security, M.A. Public
Administration
Instructor, University of Chicago,
Masters of Science in Threat and Response
Management Program
dzoufal@uchicago.edu
Safety and Security Executive
Thank you.
Visit us at sdienterprises.com

Contenu connexe

Tendances

Retail Location Security Complexities
Retail Location Security ComplexitiesRetail Location Security Complexities
Retail Location Security ComplexitiesEtienne Liebetrau
 
Secure Element Solutions
Secure Element SolutionsSecure Element Solutions
Secure Element SolutionsUgo Chirico
 
Essential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical SecurityEssential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical SecurityPrecisely
 
Phykon solutions profile2014
Phykon solutions profile2014Phykon solutions profile2014
Phykon solutions profile2014Aju Thomas
 
Software plc
Software plcSoftware plc
Software plcKingstar
 

Tendances (6)

Retail Location Security Complexities
Retail Location Security ComplexitiesRetail Location Security Complexities
Retail Location Security Complexities
 
Secure Element Solutions
Secure Element SolutionsSecure Element Solutions
Secure Element Solutions
 
Essential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical SecurityEssential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical Security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Phykon solutions profile2014
Phykon solutions profile2014Phykon solutions profile2014
Phykon solutions profile2014
 
Software plc
Software plcSoftware plc
Software plc
 

En vedette

Airport security 2013 Chris Woodroofe
Airport security 2013   Chris WoodroofeAirport security 2013   Chris Woodroofe
Airport security 2013 Chris WoodroofeRussell Publishing
 
Business Continuity Management for Airports
Business  Continuity  Management for Airports Business  Continuity  Management for Airports
Business Continuity Management for Airports Continuity and Resilience
 
Airport security 2013 martin olsson
Airport security 2013   martin olssonAirport security 2013   martin olsson
Airport security 2013 martin olssonRussell Publishing
 
Airport security market assessment
Airport security market assessmentAirport security market assessment
Airport security market assessmentFreelancer
 
Ben gurion int airport shmul zackay
Ben gurion int airport shmul zackayBen gurion int airport shmul zackay
Ben gurion int airport shmul zackayMIT Forum of Israel
 
Airport security 2013 petr hloušek
Airport security 2013   petr hloušekAirport security 2013   petr hloušek
Airport security 2013 petr hloušekRussell Publishing
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
Gatwick Airport Disruption 2013 - A Case Study
Gatwick Airport Disruption 2013 - A Case StudyGatwick Airport Disruption 2013 - A Case Study
Gatwick Airport Disruption 2013 - A Case StudySteelhenge
 
Aviation security -_chpt1
Aviation security -_chpt1Aviation security -_chpt1
Aviation security -_chpt1carlinclarke
 
Airport security – aviation security
Airport security – aviation securityAirport security – aviation security
Airport security – aviation securityIIAC
 

En vedette (12)

Airport security 2013 Chris Woodroofe
Airport security 2013   Chris WoodroofeAirport security 2013   Chris Woodroofe
Airport security 2013 Chris Woodroofe
 
Business Continuity Management for Airports
Business  Continuity  Management for Airports Business  Continuity  Management for Airports
Business Continuity Management for Airports
 
Airport security 2013 martin olsson
Airport security 2013   martin olssonAirport security 2013   martin olsson
Airport security 2013 martin olsson
 
Airport security market assessment
Airport security market assessmentAirport security market assessment
Airport security market assessment
 
Ben gurion int airport shmul zackay
Ben gurion int airport shmul zackayBen gurion int airport shmul zackay
Ben gurion int airport shmul zackay
 
Airport security 2013 petr hloušek
Airport security 2013   petr hloušekAirport security 2013   petr hloušek
Airport security 2013 petr hloušek
 
An Overview Of The Airport Security Market,
An Overview Of The Airport Security Market,An Overview Of The Airport Security Market,
An Overview Of The Airport Security Market,
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
Gatwick Airport Disruption 2013 - A Case Study
Gatwick Airport Disruption 2013 - A Case StudyGatwick Airport Disruption 2013 - A Case Study
Gatwick Airport Disruption 2013 - A Case Study
 
Airline security new
Airline security newAirline security new
Airline security new
 
Aviation security -_chpt1
Aviation security -_chpt1Aviation security -_chpt1
Aviation security -_chpt1
 
Airport security – aviation security
Airport security – aviation securityAirport security – aviation security
Airport security – aviation security
 

Similaire à Airport security 2013 donald zoufal

Unitronics catalogue 2015
Unitronics catalogue 2015Unitronics catalogue 2015
Unitronics catalogue 2015mirosabev
 
ConnectorIO Services, Industrial IoT, Cloud BMS platform - 2019.12
ConnectorIO Services, Industrial IoT, Cloud BMS platform - 2019.12ConnectorIO Services, Industrial IoT, Cloud BMS platform - 2019.12
ConnectorIO Services, Industrial IoT, Cloud BMS platform - 2019.12Connectorio
 
SFScon 21 - Stefano Della Valle - The role of DLTs in advanced IoT platform
SFScon 21 - Stefano Della Valle  - The role of DLTs in advanced IoT platformSFScon 21 - Stefano Della Valle  - The role of DLTs in advanced IoT platform
SFScon 21 - Stefano Della Valle - The role of DLTs in advanced IoT platformSouth Tyrol Free Software Conference
 
USA_32pages_cataloge-152-LOW
USA_32pages_cataloge-152-LOWUSA_32pages_cataloge-152-LOW
USA_32pages_cataloge-152-LOWCara Bereck Levy
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-WebGiovanni Maree
 
Airport security 2013 slawomir szlufik
Airport security 2013   slawomir szlufikAirport security 2013   slawomir szlufik
Airport security 2013 slawomir szlufikRussell Publishing
 
Implementing a Security strategy in IoT, Practical example Automotive Grade L...
Implementing a Security strategy in IoT, Practical example Automotive Grade L...Implementing a Security strategy in IoT, Practical example Automotive Grade L...
Implementing a Security strategy in IoT, Practical example Automotive Grade L...LibreCon
 
UplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platformUplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platformSatya Harish
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCSMEN Micro
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCSMEN Mikro Elektronik GmbH
 
Internet of Things: an overview
Internet of Things: an overviewInternet of Things: an overview
Internet of Things: an overviewPascal Bodin
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VRISC-V International
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
Use of 5G under Covid Emergency
Use of 5G under Covid Emergency Use of 5G under Covid Emergency
Use of 5G under Covid Emergency Roberto Tiozzo
 

Similaire à Airport security 2013 donald zoufal (20)

Unitronics catalogue 2015
Unitronics catalogue 2015Unitronics catalogue 2015
Unitronics catalogue 2015
 
Deimos airport suite eng
Deimos airport suite engDeimos airport suite eng
Deimos airport suite eng
 
ConnectorIO Services, Industrial IoT, Cloud BMS platform - 2019.12
ConnectorIO Services, Industrial IoT, Cloud BMS platform - 2019.12ConnectorIO Services, Industrial IoT, Cloud BMS platform - 2019.12
ConnectorIO Services, Industrial IoT, Cloud BMS platform - 2019.12
 
SFScon 21 - Stefano Della Valle - The role of DLTs in advanced IoT platform
SFScon 21 - Stefano Della Valle  - The role of DLTs in advanced IoT platformSFScon 21 - Stefano Della Valle  - The role of DLTs in advanced IoT platform
SFScon 21 - Stefano Della Valle - The role of DLTs in advanced IoT platform
 
USA_32pages_cataloge-152-LOW
USA_32pages_cataloge-152-LOWUSA_32pages_cataloge-152-LOW
USA_32pages_cataloge-152-LOW
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-Web
 
Tuneitek Solutions
Tuneitek SolutionsTuneitek Solutions
Tuneitek Solutions
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
 
Airport security 2013 slawomir szlufik
Airport security 2013   slawomir szlufikAirport security 2013   slawomir szlufik
Airport security 2013 slawomir szlufik
 
Implementing a Security strategy in IoT, Practical example Automotive Grade L...
Implementing a Security strategy in IoT, Practical example Automotive Grade L...Implementing a Security strategy in IoT, Practical example Automotive Grade L...
Implementing a Security strategy in IoT, Practical example Automotive Grade L...
 
UplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platformUplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platform
 
ACTAtek unique features
ACTAtek unique featuresACTAtek unique features
ACTAtek unique features
 
EENA 2018 - Wireless Communications in a Mission Critical Environment - State...
EENA 2018 - Wireless Communications in a Mission Critical Environment - State...EENA 2018 - Wireless Communications in a Mission Critical Environment - State...
EENA 2018 - Wireless Communications in a Mission Critical Environment - State...
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS
 
Internet of Things: an overview
Internet of Things: an overviewInternet of Things: an overview
Internet of Things: an overview
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-V
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Use of 5G under Covid Emergency
Use of 5G under Covid Emergency Use of 5G under Covid Emergency
Use of 5G under Covid Emergency
 

Plus de Russell Publishing

Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...Russell Publishing
 
Robin Forrest, International Relations, SNCF Security
Robin Forrest, International Relations, SNCF SecurityRobin Forrest, International Relations, SNCF Security
Robin Forrest, International Relations, SNCF SecurityRussell Publishing
 
Richard Aaroe, CEO, WaveTrainSystems (WTS)
Richard Aaroe, CEO, WaveTrainSystems (WTS)Richard Aaroe, CEO, WaveTrainSystems (WTS)
Richard Aaroe, CEO, WaveTrainSystems (WTS)Russell Publishing
 
Peter Guy, Operational Security & Continuity Planning Manager, Network Rail
Peter Guy, Operational Security & Continuity Planning Manager, Network RailPeter Guy, Operational Security & Continuity Planning Manager, Network Rail
Peter Guy, Operational Security & Continuity Planning Manager, Network RailRussell Publishing
 
Martyn Guiver, Head of Crime Management, Northern Rail
Martyn Guiver, Head of Crime Management, Northern RailMartyn Guiver, Head of Crime Management, Northern Rail
Martyn Guiver, Head of Crime Management, Northern RailRussell Publishing
 
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilMarc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilRussell Publishing
 
José Pires, Senior Security Advisor, International Union of Railways (UIC)
José Pires, Senior Security Advisor, International Union of Railways (UIC)José Pires, Senior Security Advisor, International Union of Railways (UIC)
José Pires, Senior Security Advisor, International Union of Railways (UIC)Russell Publishing
 
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)Russell Publishing
 
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer ElectronicDaniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer ElectronicRussell Publishing
 
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...Russell Publishing
 
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...Russell Publishing
 

Plus de Russell Publishing (20)

Elisabeth sinclair
Elisabeth sinclairElisabeth sinclair
Elisabeth sinclair
 
Elisabeth sinclair
Elisabeth sinclairElisabeth sinclair
Elisabeth sinclair
 
Denis castanet
Denis castanetDenis castanet
Denis castanet
 
Tim gray
Tim grayTim gray
Tim gray
 
Kari rouhonen
Kari rouhonenKari rouhonen
Kari rouhonen
 
Gunther koller
Gunther kollerGunther koller
Gunther koller
 
David thomasson
David thomassonDavid thomasson
David thomasson
 
Carl bjorgan
Carl bjorganCarl bjorgan
Carl bjorgan
 
Johnny sorenson
Johnny sorensonJohnny sorenson
Johnny sorenson
 
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
 
Robin Forrest, International Relations, SNCF Security
Robin Forrest, International Relations, SNCF SecurityRobin Forrest, International Relations, SNCF Security
Robin Forrest, International Relations, SNCF Security
 
Richard Aaroe, CEO, WaveTrainSystems (WTS)
Richard Aaroe, CEO, WaveTrainSystems (WTS)Richard Aaroe, CEO, WaveTrainSystems (WTS)
Richard Aaroe, CEO, WaveTrainSystems (WTS)
 
Peter Guy, Operational Security & Continuity Planning Manager, Network Rail
Peter Guy, Operational Security & Continuity Planning Manager, Network RailPeter Guy, Operational Security & Continuity Planning Manager, Network Rail
Peter Guy, Operational Security & Continuity Planning Manager, Network Rail
 
Martyn Guiver, Head of Crime Management, Northern Rail
Martyn Guiver, Head of Crime Management, Northern RailMartyn Guiver, Head of Crime Management, Northern Rail
Martyn Guiver, Head of Crime Management, Northern Rail
 
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilMarc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
 
José Pires, Senior Security Advisor, International Union of Railways (UIC)
José Pires, Senior Security Advisor, International Union of Railways (UIC)José Pires, Senior Security Advisor, International Union of Railways (UIC)
José Pires, Senior Security Advisor, International Union of Railways (UIC)
 
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
 
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer ElectronicDaniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
 
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
 
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
 

Dernier

Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 

Dernier (20)

Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 

Airport security 2013 donald zoufal

  • 1. Harnessing the Power of Security Technology Through Command and Control Centers Donald Zoufal Safety & Security Industry Executive SDI (System Development Integration, LLC)
  • 2. Aviation Security Summit, Prague, Czechoslovakia September 18, 2013 Harnessing the Power of Security Technology Though Command and Control Centers
  • 3. Vectors of Influence 3 • External Governmental Requirements • Internal Organizational Requirements • Private Sector/Commercial Interest • Technology Change
  • 4. Increased Requirements 4 • Airport Security Programs • Airport Emergency Plans • National Emergency Management Systems • Local and Regional Emergency Response Plans • Call-Taking and Dispatch Functions • Information Processing and Intelligence Generation • Notification
  • 6. 6 Technology Factors • New technologies are IT-based: the "Apollo console" is replaced by monitor and keyboard. • Technology has "escaped" the security office: No longer in a "silo“; must be distributed more widely to new stakeholders. • New tech is increasingly mobile: Mobile handheld devices, live video in vehicles, mobile command, UAVs and UGVs. OEMC (911) Mayor’s OfficeUnited Airlines FBIFAA External Access to Video at O’Hare Airport
  • 7. 7 Distributed Digital Platforms • Any computer on the network with permission can access cameras – Multiple groups can collaborate – View from external locations for instant situational awareness. • Mobile devices (in cars and on handheld units – PDA, Smart Phones) Digital video provides enhanced capabilities
  • 8. 8 Video Analytics provides more 'eyes‘ ...and they never get tired…let the system look for unacceptable behavior. • Suspicious packages • Trespassing • Unusual crowd movements • Fallen Person Evolving Analytics
  • 9. 9 Enhanced Imagery 1 CIF 704 x 480 Surveillance Industry State-of-the-Art 15x Coverage OR 15x Detail Five Mega Pixels: 2560 x 1920 352 x 240 4 CIF High Resolution Video • Better coverage with fewer cameras. • Better evidence from high-res.
  • 10. 10 Biometric devices • Ensure that access cards are used only by authorized employees. • Can use combination of card, fingerprint, and PIN. • Various types: fingerprint, hand geometry, iris scan. Identity Management • Identity management is no longer confined to one system: a single identity is now enrolled in many different disparate systems. • Multiple databases and reporting requirements make identity management complex. Sophisticated Access Control
  • 11. 11 Mobility Technology is increasingly mobile, requiring new approaches to deployment, security, and integration. • Security becomes even more important, requiring encryption, intrusion detection. • Connectivity sometimes requires multiple transmission methods. Unmanned Ground Vehicles For patrolling perimeters Wireless video surveillance Smart Phone Video Video & Other Apps in Vehicles via Wireless Coming…Here Now…
  • 12. 12 Command Center Functions and Interfaces in Airports Today
  • 13. Complex Mix of Diverse Systems 13
  • 15. 15 Command Centers • Provide a safe, reliable home base for management • Integrates all systems into a single management view. Large scale video Display any source: video, cable TV, documents, computer screens, Simple ‘drag and drop’ control interface No more monitors built into consoles: LCD screens can display all systems: video, access control, alarm systems, etc. Can be reconfigured quickly. No computers under the desk All computers are housed in Data Center LCD Panels display system data Messages, shift notices, monitoring critical applications Access to Everything from one seat Operators have access to ALL systems in IP-based command center Classic Command Center Design
  • 16. Command Center Configurations 16 • Security Operations Center (SOC) • Airport Operation Center (AOC) • Combined Operations Center (COC) • Public safety Answering Point (PSAP) • Emergency Operation Center (EOC) • Fusion Center
  • 17. 17 Looking to the Future • Challenges Growing • Continually evolving threats driven by world politics. • Increasing enplanements with decreasing resources. • New technologies require IT skills to implement and support. • New Capabilities and Approaches Being Employed • All Command Centers moving to IT-based systems; the end of the ‘component’ era.
  • 18. 18 Questions Donald R. Zoufal J.D., M.A. Homeland Security, M.A. Public Administration Instructor, University of Chicago, Masters of Science in Threat and Response Management Program dzoufal@uchicago.edu Safety and Security Executive
  • 19. Thank you. Visit us at sdienterprises.com