International Security Journal - August 2019 - Special Report
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Issue 06 | <strong>August</strong> <strong>2019</strong><br />
<strong>International</strong><strong>Security</strong><strong>Journal</strong>.com<br />
Information, Analysis and Insights for Manufacturers, Installers and Senior <strong>Security</strong> Professionals<br />
a special report from international security journal<br />
surveillance<br />
<strong>International</strong> <strong>Security</strong> <strong>Journal</strong> keeps watch<br />
on the global surveillance industry<br />
editor’s<br />
introduction<br />
Examining the crossroads that<br />
the industry now finds itself at<br />
p41<br />
Market<br />
Analysis<br />
Discussing the value of collaboration<br />
when it comes to surveillance<br />
knowledge<br />
partner<br />
IDIS is ensuring that its users<br />
have peace of mind<br />
p44-46<br />
p42-43<br />
to be featured in an ISJ special report<br />
Contact our Editor on +44 (0)1622 684525 or matthew.bull@intsecurityjournal.com
www.idisglobal.com<br />
COMPLEXITY ELIMINATED.<br />
RELIABILITY GUARANTEED.<br />
IDIS<br />
: A total surveillance solution from South Korea’s largest manufacturer<br />
Ease-of-use, third-party integration and hardened network security combined with rapid plug-and-play installation<br />
to deliver a future-proof solution and low total cost of ownership.<br />
IDIS<br />
America<br />
IDIS<br />
Europe<br />
801 Hammond Street, Suite 200, Coppell, TX 75019, U.S.A.<br />
T 1 (469) 444 6538 F 1 (469) 464 4449 E sales_americas@idisglobal.com<br />
1000 Great West Road, Brentford, Middlesex, TW8 9HH, United Kingdom<br />
T +44 0 203 657 5678 F +44 0 203 697 9360 E uksales@idisglobal.com
editor’s introduction <strong>Special</strong> <strong>Report</strong><br />
editor’s introduction<br />
MATTHEW BULL @INTSECJOURNAL @INTSECJOURNAL<strong>2019</strong> INTERNATIONAL SECURITY JOURNAL<br />
surveillance<br />
With the surveillance industry at a crossroads, <strong>International</strong> <strong>Security</strong><br />
<strong>Journal</strong> takes a deeper look at which direction it is likely to take<br />
In this month’s <strong>Special</strong> <strong>Report</strong>, we<br />
are taking a deeper look into the<br />
critical subject of surveillance.<br />
For some time now, the global<br />
surveillance market has been<br />
growing at an incredible rate, but<br />
it now finds itself at somewhat of a<br />
crossroads. The introduction of new<br />
technologies and fears over privacy<br />
have led to manufacturers needing<br />
to take a step back and consider<br />
what their next moves will be.<br />
The use of facial recognition within<br />
surveillance systems was again<br />
brought to the fore when the city<br />
of San Francisco banned its use<br />
in May <strong>2019</strong>. UK authorities are<br />
now also raising concerns about<br />
the technology with the House of<br />
Commons Science and Technology<br />
Committee suggesting that use<br />
of automatic facial recognition<br />
should be suspended.<br />
The committee stated that no further<br />
trials of the technology should take<br />
place until relevant regulations are<br />
introduced, it raised concerns over<br />
accuracy and bias and warned<br />
that police forces were failing<br />
to edit a database of custody<br />
images to remove pictures of<br />
unconvicted individuals.<br />
Many leading figures throughout the<br />
industry advocate the introduction<br />
of a stringent legal framework to<br />
control the use of the technology.<br />
Tony Porter, Surveillance Camera<br />
Commissioner believes that the<br />
responsibility for finding such a<br />
solution lies with lawmakers. In his<br />
annual report, produced for the UK<br />
parliament in January <strong>2019</strong>, Porter<br />
projected that “the police use of<br />
integrated and highly sophisticated<br />
video surveillance platforms will<br />
continue to increase” meaning<br />
that the balance between privacy<br />
and security will continue to<br />
challenge law enforcement.<br />
Porter continued: “Lawmakers and<br />
regulators need to be robust and coordinated<br />
in supporting those efforts<br />
and challenging them when their use<br />
is deemed excessive.”<br />
So what does all this uncertainty<br />
mean for manufacturers? Axon, the<br />
company that supplies 47 out of the<br />
69 largest police agencies in the<br />
United States with body cameras<br />
and software, has announced that it<br />
will ban the use of facial recognition<br />
systems on its devices.<br />
“Face recognition technology is not<br />
currently reliable enough to ethically<br />
justify its use,” the company’s<br />
independent ethics board concluded.<br />
In a 28-page report, Axon’s ethics<br />
board, which was handpicked by<br />
members of the Policing Project at<br />
New York University School of Law,<br />
argued that the technology “does not<br />
perform as well on people of colour<br />
compared to whites, or young people<br />
compared to older people.”<br />
It is, of course, an extreme<br />
step to take but one that many<br />
manufacturers could soon be<br />
considering. Legal challenges<br />
against facial recognition are<br />
springing up around the world<br />
and this moratorium from Axon<br />
could lead the way towards more<br />
responsible use of the technology.<br />
For those vendors that continue to<br />
develop facial recognition, it appears<br />
that privacy masking software is an<br />
absolute necessity, especially within<br />
the EU in order to comply with<br />
GDPR. Companies such as IDIS and<br />
Hanwha Techwin are leaders in this<br />
particular field with more accurate<br />
and easier-to-use solutions being<br />
released all the time.<br />
This <strong>Special</strong> <strong>Report</strong> will help<br />
the industry to navigate the<br />
unknown terrain that lies ahead.<br />
<strong>International</strong><strong>Security</strong><strong>Journal</strong>.com ISJ | 41
special report market Analysis<br />
Market Analysis<br />
The next stage of surveillance<br />
<strong>International</strong> <strong>Security</strong> <strong>Journal</strong> analyses what the future of the<br />
surveillance industry may look like and the threats it will face<br />
To look back over the<br />
history of the global<br />
surveillance industry is<br />
to see a prime example<br />
of how technology<br />
advancements can<br />
revolutionise any particular market.<br />
The world’s first network camera in<br />
1996, built by Axis Communications,<br />
jolted the industry to switch from<br />
analogue to IP networks.<br />
Now the latest revolution is in the<br />
shape of the Internet of Things (IoT)<br />
and other smart technologies such<br />
as facial recognition. A <strong>2019</strong> study by<br />
Absolute <strong>Report</strong>s forecast that the<br />
worldwide surveillance market would<br />
grow at a CAGR of 11.9% over the<br />
next five years and will reach a value<br />
of US$55 billion by 2024.<br />
The report states that surveillance<br />
is most commonly used in China,<br />
with the country having a 38.3%<br />
market share with North America<br />
in second position, boasting<br />
a market share of 20.7%.<br />
Reducing friction<br />
Despite these impressive figures,<br />
there are challenges on the horizon<br />
that manufacturers must be<br />
prepared to overcome. Gijs van den<br />
Heuvel, a representative of the Open<br />
<strong>Security</strong> & Safety Alliance (OSSA)<br />
spoke exclusively with <strong>International</strong><br />
<strong>Security</strong> <strong>Journal</strong> about what the<br />
market should be concerned about.<br />
“There are a couple of challenges<br />
that run in parallel but are also<br />
undeniably intertwined. There is the<br />
skyrocketing amount of data being<br />
generated by the surveillance market<br />
that’s currently not being used to its<br />
fullest potential. Then there is the<br />
significant trust issue related to data<br />
security and privacy that’s caused<br />
by a lack of transparency and<br />
standardisation. And across<br />
the industry, by design, there<br />
exists friction between different<br />
brands, devices, software and<br />
data regarding interoperability.”<br />
42 | Isj <strong>International</strong><strong>Security</strong><strong>Journal</strong>.com
visit us online www.<strong>International</strong><strong>Security</strong><strong>Journal</strong>.com<br />
As for what can be done to solve<br />
these problems, van den Heuvel<br />
was confident that OSSA will have<br />
a key role to play. “OSSA intends<br />
to set a common industry baseline<br />
concerning data security and<br />
privacy, forming a consistent<br />
foundation from which devices<br />
originate and from there, parties<br />
“OSSA intends<br />
to set a common<br />
industry baseline<br />
concerning data<br />
security and privacy,<br />
forming a consistent<br />
foundation from<br />
which devices<br />
originate and from<br />
there, parties can<br />
differentiate to fuel<br />
value and innovation<br />
for the market.”<br />
can differentiate to fuel value<br />
and innovation for the market.<br />
The specification of a common<br />
and vendor-agnostic operating<br />
system (OS) will help to<br />
enhance trust. Accompanied<br />
by the specification of a digital<br />
marketplace, this common<br />
approach will open doors for<br />
unlocking the trapped value<br />
of data (i.e., enabling humans<br />
to interact with their content<br />
on substantially more valuable<br />
levels), even beyond security.<br />
“By collectively embracing this<br />
common OS and a complementary<br />
digital marketplace that offers apps<br />
for download to digital security and<br />
safety devices, friction between<br />
brands and systems will start to<br />
disappear and customisation along<br />
with cross-product compatibility will<br />
be encouraged. The IoT evolution is<br />
driven by connections and now is<br />
the time for the surveillance market<br />
to together shift from an ageing<br />
pipeline process to a revolutionary<br />
platform experience.”<br />
Protecting your privacy<br />
It is not just OSSA that is looking<br />
to come up with solutions for the<br />
industry’s current difficulties.<br />
Key players such as Axis<br />
Communications have been<br />
working hard to figure out how<br />
privacy concerns can be allayed.<br />
To that end, Axis recently unveiled<br />
AXIS Live Privacy Shield, the market’s<br />
only edge analytics software for<br />
cameras that masks people in real<br />
time in video streams at up to full<br />
frame rate. Because it runs directly<br />
on selected Axis cameras, no<br />
expensive servers are required,<br />
and it is easy to scale.<br />
AXIS Live Privacy Shield compares a<br />
live camera view to a set background<br />
scene and applies a detailed and<br />
dynamic transparent mask to areas<br />
of change. In other words, moving<br />
people and objects appear as<br />
transparencies over a background.<br />
The entire process happens<br />
faster than the blink of an eye<br />
and effectively eliminates the<br />
collection of personal data.<br />
By default, dynamic masking is<br />
applied to the camera’s entire field<br />
of view, but users can choose<br />
to define areas<br />
where masking is not<br />
applied – for example,<br />
if there is a conveyer belt<br />
with moving objects that they<br />
want to be able to see. Users can<br />
also configure the system to deliver<br />
a separate video stream without<br />
dynamic masking, so authorised<br />
viewers can access details<br />
in case of an incident.<br />
Staying one step ahead<br />
As we move forward into the next<br />
phase of global surveillance, it is<br />
vital that vendors continue to be<br />
proactive when developing solutions.<br />
One threat that will not go away<br />
is that of cyber-attacks on<br />
cameras and networks.<br />
Secure by Default is a new initiative<br />
launched in the UK at the recent<br />
IFSEC <strong>2019</strong> exhibition. It is a set of<br />
minimum requirements which for the<br />
first time will provide a guarantee<br />
for users that network video<br />
security products are as secure<br />
as possible in their default<br />
settings out of the box.<br />
The scheme was launched<br />
by UK Surveillance Camera<br />
Commissioner, Tony Porter and will<br />
allow manufacturers to display a<br />
Secure by Default kite mark on their<br />
products if they have been certified.<br />
This will lead to manufacturers being<br />
held to account both internally and<br />
by the public if they are deemed not<br />
to be doing enough to protect<br />
the end user from cyber-attacks.<br />
Whatever happens in this next<br />
phase of the global surveillance<br />
industry, it will certainly be<br />
worth watching.<br />
<strong>International</strong><strong>Security</strong><strong>Journal</strong>.com ISJ | 43
special report knowledge partner<br />
knowledge partner<br />
What keeps you<br />
up at night?<br />
From traditional risks to modern threats, one surveillance manufacturer<br />
is taking a comprehensive approach to ensuring users’ peace of mind<br />
Since the global roll out of IDIS’ branded<br />
surveillance business—beginning<br />
in 2013 in Europe and continuing<br />
through the company’s Americas<br />
launch in 2015—South Korea’s largest<br />
in-country security and surveillance<br />
manufacturer has presented its “total<br />
solution” as a market differentiator. Designing,<br />
developing, manufacturing and delivering<br />
(completely in-house) a complete end-to-end<br />
range of analogue and IP technology – from<br />
recorders, through cameras, software and even<br />
monitors—the company is increasingly known<br />
for its total solution concept and approach.<br />
However, in most discussions of the IDIS<br />
Total Solution, the focus is on the company’s<br />
wide range of high-performing analogue<br />
and IP hardware options, VMS software and<br />
innovations in AI/Deep Learning. Here, we<br />
explore how the company’s “total solution”<br />
approach extends well beyond its branded<br />
and product offerings, into the R&D and<br />
technological underpinnings of the offerings<br />
themselves and how that “total solution”<br />
approach has resulted in one of the industry’s<br />
most complete, multi-pronged approaches to<br />
managing both traditional video surveillance<br />
headaches and truly modern, still evolving<br />
threats to cybersecurity and data integrity.<br />
We’ll look at the specific steps IDIS has taken<br />
and incorporated at every step of the product<br />
lifecycle to ensure and enhance peace of<br />
mind for its partners, end-users and their<br />
stakeholders, while still keeping its marketresponsive<br />
innovation aggressive, performance<br />
standards and ease of use high and total cost<br />
of ownership low.<br />
The headache: Cybersecurity<br />
In <strong>2019</strong>, cyberthreats against video surveillance systems have<br />
reached an all-time high, with little relief in sight. This makes<br />
cybersecurity a top area of concern—and in many cases, a new<br />
area—for security professionals and their stakeholders. Beyond<br />
traditional local and hardware security measures, the integrity,<br />
confidentiality and accessibility of video surveillance data must be<br />
protected during recording, retrieval and while in-transit.<br />
IDIS considers and addresses cybersecurity concerns from R&D<br />
through customer installation and has developed a comprehensive<br />
set of technologies and features to ensure maximum protections<br />
for end users. It starts with a best practice: educating installers<br />
and integration partners on the importance of designing and<br />
implementing a physically separate network (or partitioning an<br />
isolated VLAN on shared network equipment) and continues<br />
through a comprehensive, layered and multi-pronged approach to<br />
ensuring maximum cybersecurity for users, focusing on securing<br />
data access, securing data transmission and securing data<br />
recording.<br />
Securing data access<br />
• IDIS NVR<br />
products have<br />
their own<br />
firewall installed<br />
that monitors and<br />
controls incoming<br />
and outgoing network traffic<br />
based on a predetermined set of security rules, including IP,<br />
MAC address and port authentication. The firewalls on IDIS<br />
NVR products are designed and pre-configured to prevent<br />
unauthorised access.<br />
• IDIS’ use of Multi-factor authentication system utilising user<br />
accounts and a registered mobile app to further limit access<br />
44 | Isj <strong>International</strong><strong>Security</strong><strong>Journal</strong>.com
knowledge partner <strong>Special</strong> <strong>Report</strong><br />
to authorised users and protect video surveillance<br />
data. To gain access to an IDIS NVR, the user needs<br />
to certify themselves with the IDIS Mobile App after<br />
going through the usual login process by typing in a<br />
user ID and password.<br />
Securing data transmission<br />
• IDIS’ data transmission security system<br />
combines IDIS’ proprietary technology with TLS,<br />
the cryptographic protocol designed to provide<br />
communications security and data integrity over<br />
networks. By integrating TLS into IDIS’ proprietary<br />
data security solutions, there is minimal performance<br />
impact on video surveillance data transmission.<br />
TLS helps prevent malicious activities such as<br />
sniffing, modification and destruction of data as it is<br />
transmitted between devices across a network.<br />
• FEN <strong>Security</strong> (For Every Network <strong>Security</strong>) protects<br />
access and data transmission over a public network.<br />
FEN is a proprietary security system independently<br />
developed by IDIS using point-to-point (P2P)<br />
technology. An automated network configuration<br />
service, FEN simplifies installation of networked<br />
surveillance systems, enabling users to<br />
setup and configure secure surveillance<br />
systems without needing a professional<br />
knowledge of the routers and NAT<br />
devices on the network.<br />
by external devices such as PCs, keeping the data<br />
safe from forgery and alterations. The iBank system is<br />
used in all IDIS’ recording systems.<br />
• IDIS’ Chained Fingerprint technology extracts<br />
distinctive features of recorded video data to create<br />
a “fingerprint” for each frame, then embeds that<br />
fingerprint into the data of the next frame, effectively<br />
connecting each frame together as with a blockchain.<br />
Video data created with Chained Fingerprint<br />
technology can be submitted to courts as evidence<br />
since an alteration to any frame is easily and quickly<br />
detectable, making it simple to prove the footage<br />
is authentic and unchanged. It is a highly efficient<br />
technology for ensuring and proving the integrity of<br />
users’ recorded video data.<br />
• IDIS’ edge encryption recording technology encrypts<br />
the video data at the IP camera before storing<br />
and sending it over the network. Therefore,<br />
additional encryption and decryption processes<br />
on storage and data transmission systems are<br />
not necessary. The encrypted data is recorded<br />
directly to the SD cards and HDDs, so the stored<br />
data is safe from unauthorised access and<br />
alteration if the SD cards or HDDs are stolen.<br />
Secure data recording<br />
• IDIS iBank is a database system,<br />
independently developed by IDIS, specifically<br />
for video recording. This system maximises<br />
storage efficiency and enables fast data<br />
processing. In addition, storage devices that<br />
implement the iBank solution cannot be read<br />
The headache: Power or equipment failures<br />
Of course, not all threats to video surveillance data<br />
are as new and emergent as cyberthreats. Traditional<br />
risks to power, networks and storage can still make for<br />
critical failures. The challenge, though, is always that,<br />
if any part of a video surveillance infrastructure fails,<br />
the system must first recognise the failure before it can<br />
switch to back-up systems. The process takes precious<br />
time if done manually and redundant equipment can be<br />
expensive. IDIS innovated a series of features, known as<br />
the IDIS Critical Failover suite, to address this problem and<br />
more, making things easier for security professionals.<br />
• IDIS Temporary Smart Failover is designed to offer<br />
protection against network instability and network<br />
failure. When the camera’s network connectivity is<br />
unstable, it starts to save to an internal recording<br />
session buffer (NLTSrec, up to 60MB), preventing a<br />
break in the recording. And if an IDIS IP camera<br />
is disconnected from the NVR, it will instantly<br />
begin recording to an internal SD card and<br />
automatically transfer the data to the NVR<br />
after the network connection is restored,<br />
leaving no incident unrecorded.<br />
• IDIS storage redundancy protections further protect<br />
against storage failure. With native RAID 1 support,<br />
the NVR saves two identical copies of the data. If<br />
one disk fails, the data is retrieved from the second<br />
one, without trouble or concern. And with native<br />
RAID 5 support, if a single drive fails, subsequent<br />
reads are calculated from the distributed parity<br />
so that no data is lost.<br />
• IDIS NVR Failover protection against recorder<br />
hardware failure further ensures peace of mind. If<br />
<strong>International</strong><strong>Security</strong><strong>Journal</strong>.com ISJ | 45
special report knowledge partner<br />
any of the primary NVRs fail, a standby NVR is<br />
activated. The primary NVRs and standby NVR<br />
continuously monitor one another to quickly<br />
respond to problems, reducing the risk of data<br />
loss and decreasing failover response times.<br />
• With native dual power supply on key models,<br />
users are protected against power supply<br />
failure. Should one power supply fail, the<br />
second one continues to power the NVR<br />
without any degradation in service. When the<br />
failed power supply unit (PSU) is replaced, a<br />
spare PSU reverts to redundant operation.<br />
The core of any peace of mind: the technology<br />
However, at its core, IDIS believes that truly eliminating<br />
risk and worry in video surveillance starts with factoring<br />
in origin, reliability, ease-of-use and installation,<br />
warranties, interoperability and forward/backward<br />
compatibility. As such, the peace of mind that comes<br />
with the IDIS Total Solution begins in Seoul, Korea. IDIS’<br />
ground-breaking DirectIP technology is at the heart of the<br />
IDIS Total Solution for video surveillance. From capture,<br />
through recording and on to display, DirectIP cameras,<br />
recorders and monitors (as well as switches, accessories,<br />
feature sets and software) are designed, developed<br />
and manufactured in Korea, where the company was<br />
founded and is headquartered. This allows partners and<br />
customers to know their IDIS DirectIP video surveillance<br />
technology avoids many risks related to external sourcing<br />
manufacturing, eliminating emerging security concerns<br />
and immunising IDIS users from uncertainties related to<br />
pricing, supply and longterm maintenance and support<br />
related to current trade tensions (and tariff impact) and a<br />
predicted expansion of existing US government bans on<br />
Chinese surveillance technology manufacturers.<br />
Additionally, IDIS’ full control of their product development<br />
and manufacturing lifecycle (while maintaining ONVIF<br />
compatibility and robust integrations) means they can<br />
guarantee quality control, interoperability and forward/<br />
backward compatibility (as long as seven years in either<br />
direction) like no other surveillance manufacturer today.<br />
This allows IDIS to provide unparalleled customer support<br />
(with a dedicated support centre near Dallas, Texas for<br />
North American partners and customers) and some of the<br />
longest warranties in the industry (including the industry’s<br />
longest NVR guarantee). With DirectIP’s award-winning<br />
plug-and-play installation, ease of use (including SmartUX<br />
controls, named a <strong>Security</strong> Products “New Product of the<br />
Year” when they debuted for the way they revolutionised<br />
PTZ operator experience and effectiveness), dozens of<br />
headaches, risks and unnecessary costs related to the<br />
installation, use, training and maintenance of your video<br />
surveillance systems simply disappear.<br />
Notes Keith Drummond, Senior Director of IDIS America:<br />
“The IDIS approach is one of partnership, first and<br />
foremost. Partnership with our integrator and installer<br />
partners, of course, but also, by extension, with our<br />
end users. We maintain an ongoing feedback loop with<br />
the market and that allows us to channel our industryleading<br />
R&D efforts and investments not just into<br />
innovation and the ‘specs arms race,’ but into the specific<br />
innovations—some headline making, some not—our users<br />
are saying they need to make their jobs easier, improve<br />
their surveillance outcomes and address the kinds of<br />
headaches and threats that keep them up at night.<br />
It’s easy to make and brand a ‘cybersecurity solution,’ and<br />
call it a day, but that’s not the IDIS way. We’ve developed,<br />
over time, one of the most comprehensive and multifaceted<br />
sets of tools, features, and guarantees to help our<br />
partners sleep at night and focus on what matters—using<br />
our technology to keep their charges safe and secure. It’s<br />
what we’ve been doing and what we’ll continue to do as<br />
long as we’re out here in the market.”<br />
46 | Isj
<strong>International</strong> <strong>Security</strong> Expo (ISE) is the only flagship event<br />
bringing Government, Industry, Academia and the entire end-user<br />
community in charge of regulation & procurement together under<br />
one roof to debate current challenges and to source the latest<br />
security technologies and services.<br />
84%<br />
of visitors said<br />
they would<br />
return<br />
DON'T MISS:<br />
• FREE to attend<br />
• All content CPD Certified by The <strong>Security</strong> Institute<br />
• High-level conferences, summits & debates<br />
presented by world renowned speakers<br />
• Live product demonstrations showcasing real-life<br />
attack testing, live scenario-based solutions and<br />
the latest in security innovation<br />
• Key areas & zones displaying over 1,000 of the<br />
latest high-quality products & innovative solutions<br />
13,750+<br />
INTERNATIONAL<br />
VISITORS<br />
LPCB Live LAB & Zone:<br />
Featuring live demonstrations of<br />
physical attack testing. Sessions<br />
will cover attack testing on<br />
enclosures, timber & steel doors<br />
and mesh & palisade fencing.<br />
Drone & Counter Drone Systems Zone<br />
Featuring a large, scenario based<br />
demonstration area showcasing<br />
the very latest Drones, Counter<br />
IED solutions.<br />
375+<br />
EXHIBITORS<br />
NEW<br />
FEATURE:<br />
Immersive<br />
Demonstrator – This<br />
exciting new feature will<br />
be a central feature on the<br />
show floor, not to be missed<br />
more details to be announced.<br />
register your interest now: www.internationalsecurityexpo.com/register-interest