11 months ago


SECURITY Security in

SECURITY Security in 2018 “Drones are not a replacement for 24/7 CCTV cameras in any building or facility, they are ideal tools to work in tandem with CCTV” Security & Counter Terror Expo (SCTX) 2018 showcases the capabilities, technology and knowledge to protect nations, businesses and people from terrorism and serious security threats. Here we talk to two experts ahead of their presentations at the London event n addition to the exhibition areas SCTX also features an educational programme that Idelivers insight into current issues and how to combat new challenges. Ten free-to-attend conference streams, which will run on the exhibition floor, will cover border security, the cyber threat, protecting national infrastructure, policing, major events security and security design. Ahead of the event we spoke to two experts who will be presenting seminars which will be of specific interest to installers. The role of drones Firstly we met with Andrew McQuillan, director at Crowded Space Drones, to find out how the new ‘eyes in the sky’ fit in with fixed surveillance systems. At SCTX, Andrew’s presentation is titled: “Securing Crowded Places from Drones and utilising their Technological Benefits for Security, Safety and Counter Terrorism”.. How do drones enhance the use of existing CCTV systems? Drones are not a replacement for 24/7 CCTV cameras in any building or facility, they are ideal tools to work in tandem with CCTV, especially in the days of austerity in security budgets with both public and private sector organisations. Many people talk about autonomous drones and it is technically and legally possible to have a drone patrol the perimeter of a large complex that is secure from public access and not located in the middle of a town, city or otherwise congested area. This is a much more efficient use of a Security Officer’s time than exterior foot patrols and can track any unauthorised persons found onsite. A benefit for public places is the ability to respond to fluid and dynamic incidents. CCTV is in fixed locations and history has shown many terrorists and criminals will tailor their activities to avoid fixed location CCTV. With drones you are able to dynamically follow such activity and in a much higher resolution than CCTV systems allow. This includes keeping evidence continuity by tracking suspects continuously and not having to move between cameras when they are leaving a field of view. The legislation for the use of drones makes it very hard to fly drones overhead people not under their control (i.e. public spaces) and hence it is unlikely in the near future Security Officers could deploy such a tool themselves. This is purely down to the risks imposes on the unknowing public on the ground from an emergency situation with a drone. Are there any basic restrictions surrounding drones compared to fixed cameras? On a base level, all use of surveillance with drones has to comply with the relevant legislation 34

for any ground based video surveillance. We then have to comply with the aviation legislation and consider privacy legislation with drones. In relation to privacy, there are no specific rules related to privacy from the use of drones with cameras. What is considered as standard practice in the aviation industry is the Civil Aviation Act 1982. This states that any lawfully flying aircraft cannot breach trespass. In line with current filming guidelines for public space, the airspace where a drone is legally flying is therefore deemed as a public space. This does not however give the right to utilise zoom cameras and look into private owned spaces. For example, if someone uses a legally flown drone to film someone sunbathing in their back garden. This would not in itself be illegal, however if they then publish the video footage this could result in offences being committed. The recommended guidance from industry is to consider the use of drones as covert surveillance. At 400ft in the air, it can be impossible to see or hear a drone let alone work out where it is looking. Therefore when it comes to public authority surveillance, RIPA authorisation is required. Cyber and security systems The second expert we spoke to was Graeme McGowan, Senior Tutor and Cyber Advisor at UK Security Partners who will be presenting a seminar entitled: “The Relationship between Physical and Cyber Security and the Human Factor” at SCTX. How much of a genuine IT risk are IP security systems? A real and present danger! If the network infrastructure is compromised, malicious hackers or adversaries can gain full control of the network infrastructure enabling further compromise of other types of devices and data and allowing traffic to be redirected, changed, or denied. Possibilities of manipulation include denial-ofservice, data theft, or unauthorised changes to the data. Intruders with infrastructure privilege and access can impede productivity and severely hinder re-establishing network connectivity. Even if other compromised devices are detected, tracking back to a compromised infrastructure device is difficult. Malicious actors with persistent access to network devices will re-attack and move laterally to other access points after they have been ejected from previously exploited hosts. The solution is proper network segmentation, an effective security mechanism to prevent an intruder from propagating exploits or laterally moving around an internal network. On a poorly segmented network, intruders are able to extend their impact to control critical devices or gain access to sensitive data and intellectual property. Security architects must consider the overall infrastructure layout, segmentation, and segregation. Segregation separates network segments based on role and functionality. A securely segregated network can contain malicious occurrences, reducing the impact from intruders, in the event that they have gained a foothold somewhere inside the network. Also deploy a SOC that will enable detection of intruders across the network – internally and externally. It’s also important to note that with security, there’s no one-size-fits-all approach. Every network is different and requires skilled professionals to create tailored plans across all fronts: apps, databases, network devices, cloud servers, IT infrastructures, and the weakest link in the security chain: humans – the users. These security plans are living, breathing things that need to be updated, upgraded, and patched on a constant basis, too. Who should be held responsible for the security of networked security systems? The responsibility for the security of networked security systems must lie with skilled professional IT experts but more importantly the C-Suite must lead in fostering company-wide cultures of cyber-awareness, vigilance, and preparedness. Clearly cybersecurity is everybody’s problem and it’s high time this truth was recognised starting with the executive suite on down. This can be done by introducing a program of awareness, training and education from top to bottom. Both Andrew and Graeme will be presenting seminars at SCTX 2018. See them and others at Olympia, London on 6–7 March. “Clearly cybersecurity is everybody’s problem and it’s high time this truth was recognised” 35

Traffic Control Systems - Serco
Education Security Solutions
IPfocus May 2007 Mag - IP UserGroup
NiceVison Intrusion Detection Brochure - Voice Products, Inc.