13.08.2019 Views

International Security Journal - August 2019 - Special Report

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Issue 06 | <strong>August</strong> <strong>2019</strong><br />

<strong>International</strong><strong>Security</strong><strong>Journal</strong>.com<br />

Information, Analysis and Insights for Manufacturers, Installers and Senior <strong>Security</strong> Professionals<br />

a special report from international security journal<br />

surveillance<br />

<strong>International</strong> <strong>Security</strong> <strong>Journal</strong> keeps watch<br />

on the global surveillance industry<br />

editor’s<br />

introduction<br />

Examining the crossroads that<br />

the industry now finds itself at<br />

p41<br />

Market<br />

Analysis<br />

Discussing the value of collaboration<br />

when it comes to surveillance<br />

knowledge<br />

partner<br />

IDIS is ensuring that its users<br />

have peace of mind<br />

p44-46<br />

p42-43<br />

to be featured in an ISJ special report<br />

Contact our Editor on +44 (0)1622 684525 or matthew.bull@intsecurityjournal.com


www.idisglobal.com<br />

COMPLEXITY ELIMINATED.<br />

RELIABILITY GUARANTEED.<br />

IDIS<br />

: A total surveillance solution from South Korea’s largest manufacturer<br />

Ease-of-use, third-party integration and hardened network security combined with rapid plug-and-play installation<br />

to deliver a future-proof solution and low total cost of ownership.<br />

IDIS<br />

America<br />

IDIS<br />

Europe<br />

801 Hammond Street, Suite 200, Coppell, TX 75019, U.S.A.<br />

T 1 (469) 444 6538 F 1 (469) 464 4449 E sales_americas@idisglobal.com<br />

1000 Great West Road, Brentford, Middlesex, TW8 9HH, United Kingdom<br />

T +44 0 203 657 5678 F +44 0 203 697 9360 E uksales@idisglobal.com


editor’s introduction <strong>Special</strong> <strong>Report</strong><br />

editor’s introduction<br />

MATTHEW BULL @INTSECJOURNAL @INTSECJOURNAL<strong>2019</strong> INTERNATIONAL SECURITY JOURNAL<br />

surveillance<br />

With the surveillance industry at a crossroads, <strong>International</strong> <strong>Security</strong><br />

<strong>Journal</strong> takes a deeper look at which direction it is likely to take<br />

In this month’s <strong>Special</strong> <strong>Report</strong>, we<br />

are taking a deeper look into the<br />

critical subject of surveillance.<br />

For some time now, the global<br />

surveillance market has been<br />

growing at an incredible rate, but<br />

it now finds itself at somewhat of a<br />

crossroads. The introduction of new<br />

technologies and fears over privacy<br />

have led to manufacturers needing<br />

to take a step back and consider<br />

what their next moves will be.<br />

The use of facial recognition within<br />

surveillance systems was again<br />

brought to the fore when the city<br />

of San Francisco banned its use<br />

in May <strong>2019</strong>. UK authorities are<br />

now also raising concerns about<br />

the technology with the House of<br />

Commons Science and Technology<br />

Committee suggesting that use<br />

of automatic facial recognition<br />

should be suspended.<br />

The committee stated that no further<br />

trials of the technology should take<br />

place until relevant regulations are<br />

introduced, it raised concerns over<br />

accuracy and bias and warned<br />

that police forces were failing<br />

to edit a database of custody<br />

images to remove pictures of<br />

unconvicted individuals.<br />

Many leading figures throughout the<br />

industry advocate the introduction<br />

of a stringent legal framework to<br />

control the use of the technology.<br />

Tony Porter, Surveillance Camera<br />

Commissioner believes that the<br />

responsibility for finding such a<br />

solution lies with lawmakers. In his<br />

annual report, produced for the UK<br />

parliament in January <strong>2019</strong>, Porter<br />

projected that “the police use of<br />

integrated and highly sophisticated<br />

video surveillance platforms will<br />

continue to increase” meaning<br />

that the balance between privacy<br />

and security will continue to<br />

challenge law enforcement.<br />

Porter continued: “Lawmakers and<br />

regulators need to be robust and coordinated<br />

in supporting those efforts<br />

and challenging them when their use<br />

is deemed excessive.”<br />

So what does all this uncertainty<br />

mean for manufacturers? Axon, the<br />

company that supplies 47 out of the<br />

69 largest police agencies in the<br />

United States with body cameras<br />

and software, has announced that it<br />

will ban the use of facial recognition<br />

systems on its devices.<br />

“Face recognition technology is not<br />

currently reliable enough to ethically<br />

justify its use,” the company’s<br />

independent ethics board concluded.<br />

In a 28-page report, Axon’s ethics<br />

board, which was handpicked by<br />

members of the Policing Project at<br />

New York University School of Law,<br />

argued that the technology “does not<br />

perform as well on people of colour<br />

compared to whites, or young people<br />

compared to older people.”<br />

It is, of course, an extreme<br />

step to take but one that many<br />

manufacturers could soon be<br />

considering. Legal challenges<br />

against facial recognition are<br />

springing up around the world<br />

and this moratorium from Axon<br />

could lead the way towards more<br />

responsible use of the technology.<br />

For those vendors that continue to<br />

develop facial recognition, it appears<br />

that privacy masking software is an<br />

absolute necessity, especially within<br />

the EU in order to comply with<br />

GDPR. Companies such as IDIS and<br />

Hanwha Techwin are leaders in this<br />

particular field with more accurate<br />

and easier-to-use solutions being<br />

released all the time.<br />

This <strong>Special</strong> <strong>Report</strong> will help<br />

the industry to navigate the<br />

unknown terrain that lies ahead.<br />

<strong>International</strong><strong>Security</strong><strong>Journal</strong>.com ISJ | 41


special report market Analysis<br />

Market Analysis<br />

The next stage of surveillance<br />

<strong>International</strong> <strong>Security</strong> <strong>Journal</strong> analyses what the future of the<br />

surveillance industry may look like and the threats it will face<br />

To look back over the<br />

history of the global<br />

surveillance industry is<br />

to see a prime example<br />

of how technology<br />

advancements can<br />

revolutionise any particular market.<br />

The world’s first network camera in<br />

1996, built by Axis Communications,<br />

jolted the industry to switch from<br />

analogue to IP networks.<br />

Now the latest revolution is in the<br />

shape of the Internet of Things (IoT)<br />

and other smart technologies such<br />

as facial recognition. A <strong>2019</strong> study by<br />

Absolute <strong>Report</strong>s forecast that the<br />

worldwide surveillance market would<br />

grow at a CAGR of 11.9% over the<br />

next five years and will reach a value<br />

of US$55 billion by 2024.<br />

The report states that surveillance<br />

is most commonly used in China,<br />

with the country having a 38.3%<br />

market share with North America<br />

in second position, boasting<br />

a market share of 20.7%.<br />

Reducing friction<br />

Despite these impressive figures,<br />

there are challenges on the horizon<br />

that manufacturers must be<br />

prepared to overcome. Gijs van den<br />

Heuvel, a representative of the Open<br />

<strong>Security</strong> & Safety Alliance (OSSA)<br />

spoke exclusively with <strong>International</strong><br />

<strong>Security</strong> <strong>Journal</strong> about what the<br />

market should be concerned about.<br />

“There are a couple of challenges<br />

that run in parallel but are also<br />

undeniably intertwined. There is the<br />

skyrocketing amount of data being<br />

generated by the surveillance market<br />

that’s currently not being used to its<br />

fullest potential. Then there is the<br />

significant trust issue related to data<br />

security and privacy that’s caused<br />

by a lack of transparency and<br />

standardisation. And across<br />

the industry, by design, there<br />

exists friction between different<br />

brands, devices, software and<br />

data regarding interoperability.”<br />

42 | Isj <strong>International</strong><strong>Security</strong><strong>Journal</strong>.com


visit us online www.<strong>International</strong><strong>Security</strong><strong>Journal</strong>.com<br />

As for what can be done to solve<br />

these problems, van den Heuvel<br />

was confident that OSSA will have<br />

a key role to play. “OSSA intends<br />

to set a common industry baseline<br />

concerning data security and<br />

privacy, forming a consistent<br />

foundation from which devices<br />

originate and from there, parties<br />

“OSSA intends<br />

to set a common<br />

industry baseline<br />

concerning data<br />

security and privacy,<br />

forming a consistent<br />

foundation from<br />

which devices<br />

originate and from<br />

there, parties can<br />

differentiate to fuel<br />

value and innovation<br />

for the market.”<br />

can differentiate to fuel value<br />

and innovation for the market.<br />

The specification of a common<br />

and vendor-agnostic operating<br />

system (OS) will help to<br />

enhance trust. Accompanied<br />

by the specification of a digital<br />

marketplace, this common<br />

approach will open doors for<br />

unlocking the trapped value<br />

of data (i.e., enabling humans<br />

to interact with their content<br />

on substantially more valuable<br />

levels), even beyond security.<br />

“By collectively embracing this<br />

common OS and a complementary<br />

digital marketplace that offers apps<br />

for download to digital security and<br />

safety devices, friction between<br />

brands and systems will start to<br />

disappear and customisation along<br />

with cross-product compatibility will<br />

be encouraged. The IoT evolution is<br />

driven by connections and now is<br />

the time for the surveillance market<br />

to together shift from an ageing<br />

pipeline process to a revolutionary<br />

platform experience.”<br />

Protecting your privacy<br />

It is not just OSSA that is looking<br />

to come up with solutions for the<br />

industry’s current difficulties.<br />

Key players such as Axis<br />

Communications have been<br />

working hard to figure out how<br />

privacy concerns can be allayed.<br />

To that end, Axis recently unveiled<br />

AXIS Live Privacy Shield, the market’s<br />

only edge analytics software for<br />

cameras that masks people in real<br />

time in video streams at up to full<br />

frame rate. Because it runs directly<br />

on selected Axis cameras, no<br />

expensive servers are required,<br />

and it is easy to scale.<br />

AXIS Live Privacy Shield compares a<br />

live camera view to a set background<br />

scene and applies a detailed and<br />

dynamic transparent mask to areas<br />

of change. In other words, moving<br />

people and objects appear as<br />

transparencies over a background.<br />

The entire process happens<br />

faster than the blink of an eye<br />

and effectively eliminates the<br />

collection of personal data.<br />

By default, dynamic masking is<br />

applied to the camera’s entire field<br />

of view, but users can choose<br />

to define areas<br />

where masking is not<br />

applied – for example,<br />

if there is a conveyer belt<br />

with moving objects that they<br />

want to be able to see. Users can<br />

also configure the system to deliver<br />

a separate video stream without<br />

dynamic masking, so authorised<br />

viewers can access details<br />

in case of an incident.<br />

Staying one step ahead<br />

As we move forward into the next<br />

phase of global surveillance, it is<br />

vital that vendors continue to be<br />

proactive when developing solutions.<br />

One threat that will not go away<br />

is that of cyber-attacks on<br />

cameras and networks.<br />

Secure by Default is a new initiative<br />

launched in the UK at the recent<br />

IFSEC <strong>2019</strong> exhibition. It is a set of<br />

minimum requirements which for the<br />

first time will provide a guarantee<br />

for users that network video<br />

security products are as secure<br />

as possible in their default<br />

settings out of the box.<br />

The scheme was launched<br />

by UK Surveillance Camera<br />

Commissioner, Tony Porter and will<br />

allow manufacturers to display a<br />

Secure by Default kite mark on their<br />

products if they have been certified.<br />

This will lead to manufacturers being<br />

held to account both internally and<br />

by the public if they are deemed not<br />

to be doing enough to protect<br />

the end user from cyber-attacks.<br />

Whatever happens in this next<br />

phase of the global surveillance<br />

industry, it will certainly be<br />

worth watching.<br />

<strong>International</strong><strong>Security</strong><strong>Journal</strong>.com ISJ | 43


special report knowledge partner<br />

knowledge partner<br />

What keeps you<br />

up at night?<br />

From traditional risks to modern threats, one surveillance manufacturer<br />

is taking a comprehensive approach to ensuring users’ peace of mind<br />

Since the global roll out of IDIS’ branded<br />

surveillance business—beginning<br />

in 2013 in Europe and continuing<br />

through the company’s Americas<br />

launch in 2015—South Korea’s largest<br />

in-country security and surveillance<br />

manufacturer has presented its “total<br />

solution” as a market differentiator. Designing,<br />

developing, manufacturing and delivering<br />

(completely in-house) a complete end-to-end<br />

range of analogue and IP technology – from<br />

recorders, through cameras, software and even<br />

monitors—the company is increasingly known<br />

for its total solution concept and approach.<br />

However, in most discussions of the IDIS<br />

Total Solution, the focus is on the company’s<br />

wide range of high-performing analogue<br />

and IP hardware options, VMS software and<br />

innovations in AI/Deep Learning. Here, we<br />

explore how the company’s “total solution”<br />

approach extends well beyond its branded<br />

and product offerings, into the R&D and<br />

technological underpinnings of the offerings<br />

themselves and how that “total solution”<br />

approach has resulted in one of the industry’s<br />

most complete, multi-pronged approaches to<br />

managing both traditional video surveillance<br />

headaches and truly modern, still evolving<br />

threats to cybersecurity and data integrity.<br />

We’ll look at the specific steps IDIS has taken<br />

and incorporated at every step of the product<br />

lifecycle to ensure and enhance peace of<br />

mind for its partners, end-users and their<br />

stakeholders, while still keeping its marketresponsive<br />

innovation aggressive, performance<br />

standards and ease of use high and total cost<br />

of ownership low.<br />

The headache: Cybersecurity<br />

In <strong>2019</strong>, cyberthreats against video surveillance systems have<br />

reached an all-time high, with little relief in sight. This makes<br />

cybersecurity a top area of concern—and in many cases, a new<br />

area—for security professionals and their stakeholders. Beyond<br />

traditional local and hardware security measures, the integrity,<br />

confidentiality and accessibility of video surveillance data must be<br />

protected during recording, retrieval and while in-transit.<br />

IDIS considers and addresses cybersecurity concerns from R&D<br />

through customer installation and has developed a comprehensive<br />

set of technologies and features to ensure maximum protections<br />

for end users. It starts with a best practice: educating installers<br />

and integration partners on the importance of designing and<br />

implementing a physically separate network (or partitioning an<br />

isolated VLAN on shared network equipment) and continues<br />

through a comprehensive, layered and multi-pronged approach to<br />

ensuring maximum cybersecurity for users, focusing on securing<br />

data access, securing data transmission and securing data<br />

recording.<br />

Securing data access<br />

• IDIS NVR<br />

products have<br />

their own<br />

firewall installed<br />

that monitors and<br />

controls incoming<br />

and outgoing network traffic<br />

based on a predetermined set of security rules, including IP,<br />

MAC address and port authentication. The firewalls on IDIS<br />

NVR products are designed and pre-configured to prevent<br />

unauthorised access.<br />

• IDIS’ use of Multi-factor authentication system utilising user<br />

accounts and a registered mobile app to further limit access<br />

44 | Isj <strong>International</strong><strong>Security</strong><strong>Journal</strong>.com


knowledge partner <strong>Special</strong> <strong>Report</strong><br />

to authorised users and protect video surveillance<br />

data. To gain access to an IDIS NVR, the user needs<br />

to certify themselves with the IDIS Mobile App after<br />

going through the usual login process by typing in a<br />

user ID and password.<br />

Securing data transmission<br />

• IDIS’ data transmission security system<br />

combines IDIS’ proprietary technology with TLS,<br />

the cryptographic protocol designed to provide<br />

communications security and data integrity over<br />

networks. By integrating TLS into IDIS’ proprietary<br />

data security solutions, there is minimal performance<br />

impact on video surveillance data transmission.<br />

TLS helps prevent malicious activities such as<br />

sniffing, modification and destruction of data as it is<br />

transmitted between devices across a network.<br />

• FEN <strong>Security</strong> (For Every Network <strong>Security</strong>) protects<br />

access and data transmission over a public network.<br />

FEN is a proprietary security system independently<br />

developed by IDIS using point-to-point (P2P)<br />

technology. An automated network configuration<br />

service, FEN simplifies installation of networked<br />

surveillance systems, enabling users to<br />

setup and configure secure surveillance<br />

systems without needing a professional<br />

knowledge of the routers and NAT<br />

devices on the network.<br />

by external devices such as PCs, keeping the data<br />

safe from forgery and alterations. The iBank system is<br />

used in all IDIS’ recording systems.<br />

• IDIS’ Chained Fingerprint technology extracts<br />

distinctive features of recorded video data to create<br />

a “fingerprint” for each frame, then embeds that<br />

fingerprint into the data of the next frame, effectively<br />

connecting each frame together as with a blockchain.<br />

Video data created with Chained Fingerprint<br />

technology can be submitted to courts as evidence<br />

since an alteration to any frame is easily and quickly<br />

detectable, making it simple to prove the footage<br />

is authentic and unchanged. It is a highly efficient<br />

technology for ensuring and proving the integrity of<br />

users’ recorded video data.<br />

• IDIS’ edge encryption recording technology encrypts<br />

the video data at the IP camera before storing<br />

and sending it over the network. Therefore,<br />

additional encryption and decryption processes<br />

on storage and data transmission systems are<br />

not necessary. The encrypted data is recorded<br />

directly to the SD cards and HDDs, so the stored<br />

data is safe from unauthorised access and<br />

alteration if the SD cards or HDDs are stolen.<br />

Secure data recording<br />

• IDIS iBank is a database system,<br />

independently developed by IDIS, specifically<br />

for video recording. This system maximises<br />

storage efficiency and enables fast data<br />

processing. In addition, storage devices that<br />

implement the iBank solution cannot be read<br />

The headache: Power or equipment failures<br />

Of course, not all threats to video surveillance data<br />

are as new and emergent as cyberthreats. Traditional<br />

risks to power, networks and storage can still make for<br />

critical failures. The challenge, though, is always that,<br />

if any part of a video surveillance infrastructure fails,<br />

the system must first recognise the failure before it can<br />

switch to back-up systems. The process takes precious<br />

time if done manually and redundant equipment can be<br />

expensive. IDIS innovated a series of features, known as<br />

the IDIS Critical Failover suite, to address this problem and<br />

more, making things easier for security professionals.<br />

• IDIS Temporary Smart Failover is designed to offer<br />

protection against network instability and network<br />

failure. When the camera’s network connectivity is<br />

unstable, it starts to save to an internal recording<br />

session buffer (NLTSrec, up to 60MB), preventing a<br />

break in the recording. And if an IDIS IP camera<br />

is disconnected from the NVR, it will instantly<br />

begin recording to an internal SD card and<br />

automatically transfer the data to the NVR<br />

after the network connection is restored,<br />

leaving no incident unrecorded.<br />

• IDIS storage redundancy protections further protect<br />

against storage failure. With native RAID 1 support,<br />

the NVR saves two identical copies of the data. If<br />

one disk fails, the data is retrieved from the second<br />

one, without trouble or concern. And with native<br />

RAID 5 support, if a single drive fails, subsequent<br />

reads are calculated from the distributed parity<br />

so that no data is lost.<br />

• IDIS NVR Failover protection against recorder<br />

hardware failure further ensures peace of mind. If<br />

<strong>International</strong><strong>Security</strong><strong>Journal</strong>.com ISJ | 45


special report knowledge partner<br />

any of the primary NVRs fail, a standby NVR is<br />

activated. The primary NVRs and standby NVR<br />

continuously monitor one another to quickly<br />

respond to problems, reducing the risk of data<br />

loss and decreasing failover response times.<br />

• With native dual power supply on key models,<br />

users are protected against power supply<br />

failure. Should one power supply fail, the<br />

second one continues to power the NVR<br />

without any degradation in service. When the<br />

failed power supply unit (PSU) is replaced, a<br />

spare PSU reverts to redundant operation.<br />

The core of any peace of mind: the technology<br />

However, at its core, IDIS believes that truly eliminating<br />

risk and worry in video surveillance starts with factoring<br />

in origin, reliability, ease-of-use and installation,<br />

warranties, interoperability and forward/backward<br />

compatibility. As such, the peace of mind that comes<br />

with the IDIS Total Solution begins in Seoul, Korea. IDIS’<br />

ground-breaking DirectIP technology is at the heart of the<br />

IDIS Total Solution for video surveillance. From capture,<br />

through recording and on to display, DirectIP cameras,<br />

recorders and monitors (as well as switches, accessories,<br />

feature sets and software) are designed, developed<br />

and manufactured in Korea, where the company was<br />

founded and is headquartered. This allows partners and<br />

customers to know their IDIS DirectIP video surveillance<br />

technology avoids many risks related to external sourcing<br />

manufacturing, eliminating emerging security concerns<br />

and immunising IDIS users from uncertainties related to<br />

pricing, supply and longterm maintenance and support<br />

related to current trade tensions (and tariff impact) and a<br />

predicted expansion of existing US government bans on<br />

Chinese surveillance technology manufacturers.<br />

Additionally, IDIS’ full control of their product development<br />

and manufacturing lifecycle (while maintaining ONVIF<br />

compatibility and robust integrations) means they can<br />

guarantee quality control, interoperability and forward/<br />

backward compatibility (as long as seven years in either<br />

direction) like no other surveillance manufacturer today.<br />

This allows IDIS to provide unparalleled customer support<br />

(with a dedicated support centre near Dallas, Texas for<br />

North American partners and customers) and some of the<br />

longest warranties in the industry (including the industry’s<br />

longest NVR guarantee). With DirectIP’s award-winning<br />

plug-and-play installation, ease of use (including SmartUX<br />

controls, named a <strong>Security</strong> Products “New Product of the<br />

Year” when they debuted for the way they revolutionised<br />

PTZ operator experience and effectiveness), dozens of<br />

headaches, risks and unnecessary costs related to the<br />

installation, use, training and maintenance of your video<br />

surveillance systems simply disappear.<br />

Notes Keith Drummond, Senior Director of IDIS America:<br />

“The IDIS approach is one of partnership, first and<br />

foremost. Partnership with our integrator and installer<br />

partners, of course, but also, by extension, with our<br />

end users. We maintain an ongoing feedback loop with<br />

the market and that allows us to channel our industryleading<br />

R&D efforts and investments not just into<br />

innovation and the ‘specs arms race,’ but into the specific<br />

innovations—some headline making, some not—our users<br />

are saying they need to make their jobs easier, improve<br />

their surveillance outcomes and address the kinds of<br />

headaches and threats that keep them up at night.<br />

It’s easy to make and brand a ‘cybersecurity solution,’ and<br />

call it a day, but that’s not the IDIS way. We’ve developed,<br />

over time, one of the most comprehensive and multifaceted<br />

sets of tools, features, and guarantees to help our<br />

partners sleep at night and focus on what matters—using<br />

our technology to keep their charges safe and secure. It’s<br />

what we’ve been doing and what we’ll continue to do as<br />

long as we’re out here in the market.”<br />

46 | Isj


<strong>International</strong> <strong>Security</strong> Expo (ISE) is the only flagship event<br />

bringing Government, Industry, Academia and the entire end-user<br />

community in charge of regulation & procurement together under<br />

one roof to debate current challenges and to source the latest<br />

security technologies and services.<br />

84%<br />

of visitors said<br />

they would<br />

return<br />

DON'T MISS:<br />

• FREE to attend<br />

• All content CPD Certified by The <strong>Security</strong> Institute<br />

• High-level conferences, summits & debates<br />

presented by world renowned speakers<br />

• Live product demonstrations showcasing real-life<br />

attack testing, live scenario-based solutions and<br />

the latest in security innovation<br />

• Key areas & zones displaying over 1,000 of the<br />

latest high-quality products & innovative solutions<br />

13,750+<br />

INTERNATIONAL<br />

VISITORS<br />

LPCB Live LAB & Zone:<br />

Featuring live demonstrations of<br />

physical attack testing. Sessions<br />

will cover attack testing on<br />

enclosures, timber & steel doors<br />

and mesh & palisade fencing.<br />

Drone & Counter Drone Systems Zone<br />

Featuring a large, scenario based<br />

demonstration area showcasing<br />

the very latest Drones, Counter<br />

IED solutions.<br />

375+<br />

EXHIBITORS<br />

NEW<br />

FEATURE:<br />

Immersive<br />

Demonstrator – This<br />

exciting new feature will<br />

be a central feature on the<br />

show floor, not to be missed<br />

more details to be announced.<br />

register your interest now: www.internationalsecurityexpo.com/register-interest

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!