2. Security Industry Association
securityindustry.org
S A V E T H E D A T E
June 15 – 17, 2016 • Westin City Center, Washington, D.C.
WHY ATTEND
• Learn the latest on legislative and regulatory
matters affecting the security industry
• Gain a better understanding of the market
drivers at work in the government space
• Network with government and private-
sector decision makers
WHO ATTENDS
• Security Executives
• Sales and Marketing Professionals
• Security Practitioners and Policy
Specialists
• Federal and Congressional Staff
Join Us in 2016 at Our New Location,
Westin City Center, Washington, D.C.
securityindustry.org/summit
3. Q 1 2 0 1 6 3
Q1
By Owais Hassan
T
oday’s cybersecurity landscape is
faced with a wide range of threats
from sophisticated hackers to
malware infections and malicious attacks
that can threaten the delivery of essential
services. These advanced persistent threats
have changed the security industry and
how organizations protect their networks.
Traditional security solutions fail and
security must expand beyond the physical
perimeter when it comes to life safety and
intrusion. Mission critical infrastructure
such as embassies, federal buildings, and
military bases are particularly vulnerable
targets. Cybersecurity attacks also impact
commercial installations at banks,
museums, campuses, and enterprises
that have high-value assets. Physical
perimeter security alone is not enough, it
needs to be supported by the underlying
communicationinfrastructure.Thedelivery
of alarm information must be disseminated
by a trusted source that provides a stable
network in a secure environment.
WIRELESS ALARM COMMUNICATIONS
SECURITY
A typicalwireless alarmcommunication
system consists of various components
connected to the alarm panel, as
illustrated in the network diagram.
Every component of the alarm
communication system needs to satisfy
the following security requirements:
• Physical security (tamper detection)
• Transmission security
• Substitution security (rogue and
stolen equipment)
• Information security (data
encryption and information assurance)
• Real-time mitigation controls
(logging and network management)
PUBLIC VS. PRIVATE
Mitigating Security Risks with Alarm Communication
Systems for Mission Critical Applications
Traditional methods of alarm
communication are exposed to potential
threats, posing serious security risks. The
communication infrastructure starts from
the transport layer security. Some alarm
communication systems utilize the cellular
spectrum where a public service provider is
common knowledge (GSM, 3G, LTE, etc.),
thereforesusceptibletojamming.IntheU.S.
and most countries, it is illegal for private
citizens to jam cell phone transmission.
The fact that its illegal does not prevent
it from happening. Some countries allow
businesses and government organizations
to install jammers in areas where cell phone
use is seen as a public nuisance. There are
plenty of low cost commercial off-the-shelf
handheld jamming devices readily available
overtheInternet.Anyalarmcommunication
system leveraging either unlicensed or
cellular licensed spectrum is vulnerable to
radio frequency interference and jamming.
This issue impacts deployment of alarm
communication networks serving mission
critical needs.
All equipment deployed in high-
value installations need to be designed
to effectively safeguard and protect
information against common security
threats found in wireless networks:
• Loss of data confdentiality
• Data corruption and loss of integrity
• Replay attacks
• Spoofng, substitution, and
masquerading
• Stolen feld equipment
• Denial of services
NEXT-GENERATION SECURITY
Technical solutions are being developed as
a countermeasure to mitigate security risks.
Next-generation alarm communication
technology is evolving and will provide
end-to-end encryption, plus ensure data is
transmitted without eavesdropping, data
tampering, and message forging.
The implementation of this next-
generation security solution will use
advanced authentication techniques such
as dynamic key management, distributed
denial-of-service frewall, and digital
certifcates that require digital signing before
any equipment is authorized to be added to
the network.
The wireless mesh radio technology will
use licensed spectrum, an unknown and
covert frequency band along with frequency
agility, and cognitive radio capabilities to
combat jamming to head-end equipment.
The packet delivery communication
protocol will use dynamic mesh which
is proven to be less disruptive and more
tolerable under jamming or radio frequency
interference conditions. This distributed
architecture is preferable compared to
centralized base station cellular architecture
where localized jamming at the single
cellular base station could impact a large
volume of customer premise equipment or
shut down a substantial territory serviced by
a single base station tower.
NETWORK MANAGEMENT
The high security alarm communication
system installation should be routinely
evaluated to identify any threats arising out
of potential vulnerabilities. The impact of
a security threat should be quantifed with
Mean Time Between Hazardous Events
measurements based on the following
factors:
• Diffculty level of exploiting a threat
• Degree of harm caused by exploitation
of the threat
• Mitigation & Control techniques and
their effectiveness
To rapidly mitigate any security risk
as it unfolds in the real-world, the next-
generation security system infrastructure
must have:
• An encrypted fle system
• Secured executable image and critical
data storages
• Anti-tamper and anti-cloning
capabilities
• A fexible architecture
• Secured software upgrade capabilities
to proactively harden the system
Expert implementation is key and
network management is critically important.
This modern approach to network security
is the most reliable option for protecting the
delivery of alarm information to the central
monitoring station.
Owais Hassan is Vice President of
Engineering at AES Corporation. He can
be contacted at ohassan@aes-corp.com.
4. 4 Q 1 2 0 1 6
Q1
I
n recent months we have seem
an increase in legislative activity
addressing the vexing question
of how best to protect our nation’s
schools. Unfortunately, this follows
numerous active shooter incidents,
both in academic environments and
also in the law enforcement and
civilian workplace.
There is currently thoughtful
and bipartisan work being done by
various members of the House and
Senate, including strong leadership
by Representatives Rick Larson (D -
WA) and Susan Brooks (R – IN), who
are co-chairs of the bipartisan School
Safety Caucus. While policymakers
on Capitol Hill discuss and debate
this issue, including the merits of
H.R. 2667, the School Safety Act, it
is important to also consider a new
paradigm when contemplating the
‘integration’ of security elements to a
facility, whether it is a school, hospital
Rethinking Physical Security
By Jeffrey Isquith and Morgan P. Muchnick
or any physical structure.
Until recently, detection,
surveillance and physical barriers have
been designed to keep possible threats
out of a secured facility. However, this
‘fortress mentality’ does little to deal
with the increasing possibility that a
threat will make it’s way into a ‘secured’
area regardless of the steps taken to
safeguard such an environment. In
addition, there are growing threats
from personnel who already have
access to, or inhabit the ‘secured
environment’ in question. Examples
of this are numerous and include, but
not limited to, the shootings at Sandy
Hook Elementary School, Northern
Arizona University, Columbine High
School, Aurora theatre shooting of
2012, Washington Navy Yard in 2013,
and Ft. Hood in 2009 and 2014.
In order to address and mitigate
such threats, the utilization of physical
ballistic barriers in the immediate space
is imperative. This will enable those
exposed to gun violence to seek shelter
behind objects nearest to them. While
training to seek such protection would
certainly be helpful, human behavior
will also lead us to instinctively ‘duck
and cover’ during such events.
While individuals who inhabit a
physical space want safeguards to
protect them from harm, they do not
necessarily wish to be inconvenienced
or feel as though they are working in
a physically confining environment.
This is particularly true in public
and civic spaces, such as schools and
universities. Neither students nor
teachers want to feel as though they
are pursuing their educational pursuits
in a bunker-like environment. This is
why the seamless integration of well-
hidden ballistic barriers, whether it is
embedded within interior architectural
elements such as walls, door structures
or furnishings, can provide a layer of
protection that is both pervasive and
hidden.
However policymakers decide to
address school security, through
legislation or other means, the
integration of ballistic barriers into
interior environments can be an
essential part of every security plan.
We owe it to the next generation, our
most critical asset, to provide them the
maximum feasible level of safety and
protection.
Mr. Jeffrey Isquith, Founder and CEO,
Ballistic Furniture Systems/Amulet
Ballistic Barriers.
Mr. Morgan P. Muchnick, Director of
Government & Public Affairs, Ballistic
Furniture Systems/Amulet Ballistic
Barriers.
5. Q 1 2 0 1 6 5
Q1
By Jumbi Edulbehram, Regional
President, Americas, Oncam
T
he transportation market – both
private and public – is heavily
regulated to ensure the safety
and security of passengers and the
general public, and with that regulation
comes specifc needs in regards to video
surveillance. These entities are tasked with
complying with stringent rules in regards
to the security systems deployed, and many
of them maintain a proactive approach to
security in growing urban areas.
The United Nations found that in 2014,
54 percent of the world’s population
resided in urban areas, and by 2050, the
urban population is expected to increase
to 66 percent, or approximately 2.5 billion.
Public forms of transportation are lifelines
for billions of people across the globe
already, and large populations continue
to depend on it each day as a result of
rapid urbanization and globalization. As
the world has watched attacks unfold on
transit systems, such as those that took
place at the end of March in Brussels, it’s
clear these systems – and the people who
operate and use them – are at risk every
day.
360-degree IP video surveillance
technology is increasingly playing a vital
role in protecting public transport because
this technology offers a number of unique
features. The largest advantage 360-degree
cameras have is that there is no moving
Meeting Compliance and Regulation Needs with
Video Surveillance in the Transportation Market
parts and offer PTZ capabilities during
playback, enabling users to capture a full
panoramic view of the area without blind
spots or mechanical delays.
Moreover, the high-resolution
360-degree image captured with a
fsheye lens is “dewarped” at the viewer’s
discretion, and can be processed in real
time or during playback as if the video
were live. These cameras come in a range
of sizes and discreet interior and exterior
designs. In today’s market, where increases
in surveillance need to be balanced with
the public’s perception of privacy, the
discreet form factor of 360-degree cameras
are benefcial.
Transit applications are an ideal
ft for easily adaptable, scalable and
reliable 360-degree camera systems to
provide maximum situational awareness
for any city’s infrastructure, preferred
transportation medium and regulatory
requirements. Train and bus stations,
whether above ground or below, rely on
360-degree cameras to protect platforms at
all hours by panning or zooming into every
corner of a station, eliminating the need
for a large number of traditional cameras.
Airport traffc is also more voluminous
than ever, with some hubs seeing millions
pass through each year and dozens of FAA
or international air regulations always in
fux. In highly metropolitan areas, certain
airports are even connected by rail or bus to
the center of a city, making follow through
of situational awareness even more crucial
as people transfer from one transport
method to the next. These 360-degree
cameras can cost-effectively manage this
network of transfer options by cutting
back on the number of traditional cameras
installed. Though increasing compatibility
with VMS and other third-party screening
systems, security personnel can ensure
the safety and continuity of major
transportation hubs.
Cruise ships, a less obvious form
of travel, carry thousands of people
across international waters to various
destinations, yet face signifcant Coast
Guard compliance requirement hurdles
when it comes to proper video surveillance.
Proactivity toward incident detection is
encouraged on board these vessels, where
360-degree cameras and video analytics
technologies are being installed on decks
and elevators to reduce installation costs,
camera numbers and violent or illegal
activity onboard.
With the threats in urban areas and
to public and private transportation,
security is paramount, and making sure
rules and regulations are followed is an
important factor in keeping the public
safe. 360-degree IP video surveillance
cameras are an intelligent, cost-effective
and effcient investment for transportation
security the world over as they provide
unprecedented fexibility to evolving
regulations without altering the unique
and delicate balance of our world’s cities.
6. 6 Q 1 2 0 1 6
Q1
By Lynn A. de Seve
S
pring is upon us and so are various
GSA security meetings, events and
other forums for industry partners
interested in learning and participating
in upcoming government acquisition
planning and opportunities. The Security
Industry Association (SIA) Procurement
Policy Working Group and Government
Relations Committee is tracking
government initiatives, participating
in events, as well as hosting some
informative sessions on GSA physical
access control systems (PACS) promotion
and other GSA Multiple Award Schedule
(MAS) Transformation implementations.
GSA Schedule 84 offcials continue the
PACS conversation that began at the SIA
ISC East forum and continued during
the SIA webcast with the U.S. General
Services Administration (GSA) on January
15. A key focus of the January webinar
was to discuss planned changes to PACS
and authentication products and services
on Schedules 70 and 84 -- effective per
GSA’s mass contract modifcations issued
on Feb. 4, 2016. The new GSA Special
Item Numbers (SINs) for products and
services appearing on the GSA Approved
Product List (APL) are now offcially
part of the Schedule 84 program. Special
Item Number (SIN) 246 35-7 is in effect
for those companies whose products are
listed on the GSA Approved Products List
(APL), and SIN 246-60 (5) is available
for those companies that have met the
requirements for completing the FICAM
solution training and certifcation.
Additionally, companies must appear
on the APL for integrators. With these
changes in place, GSA is working to
promote their program and to help federal
agencies. As part of their implementation,
GSA expressed a need for industry
expertise and feedback to assist them in
their efforts to move forward to educate,
inform and offer a contracting solution
where the agencies can buy PACS from
the Schedule 84 program. In addition
to improving the program to make
the identifcation of PACS products
and services more visible to agencies
GSA Seeks Procurement Solutions for PACS
and Announces MAS Transformation Initiatives
and bringing standards current, GSA
discussed their interest in creating a
new blanket purchase agreement (BPA)
for PACS to make it easier for agencies
to both understand and procure PACS
through the Schedule 84 program.
On March 2, GSA’s Schedule 84 staff
conducted a virtual industry day to
seek feedback and engage in an open
forum conversation with the Schedule
84 industry partners on PACS solutions
for the federal government. After posting
an RFI in GSA eBuy for Schedule 84
contractors offering PACS products and
solutions to participate in a the conference
call, participants were encouraged to
voice their ideas with anonymity to foster
open communication. With the concept
of creating a ”multiple award” BPA to
enable customers to buy a prepackaged
solution, GSA asked for commonalities
supporting customer requirements in
purchasing PACs. GSA eBuy will receive
written comments and suggestions from
the schedule partners.
Christopher Redmond, Schedule 84
Branch Chief and his staff were available
to continue the discussion on PACS and
answer questions about the 84 program
from Government industry at a meeting
hosted by SIA during ISC West on April 6.
New initiatives are being rolled out
at GSA Industry Days. A key initiative
is Category Management to improve
the acquisition process in assisting
Government agencies with one source for
smarter acquisition. GSA has gone live
with a public view of their Acquisition
Gatewayonlineportal. CategoryHallways
were created at the Acquisition Gateway
which is open for commercial business
to review at this time. To see what has
been posted in the security hallway go
to https://hallways.cap.gsa.gov/app/#/
gateway/security-protection . Security
white papers and other information
on PACS are posted in the Acquisition
Gateway for security.
On May 3-4, GSA Schedule 84 will
hold their Annual GSA Industry Days in
Fort Worth, TX. If you are a Schedule 84
Contract holder, this is an opportunity to
become better informed on GSA common
regulations, requirements, compliance
issues, and upcoming changes to the GSA
Program. The agenda will cover best
practices for submitting modifcations, a
discussion of contractor assessment visits,
tips from a customer’s perspective, break-
out sessions for topics of interest and an
opportunity to meet your contracting
offcer. Furthermore, the conference
will provide invaluable and enlightening
Q & A sessions with the community of
fellow schedule holders and the GSA
management team. This event will be
held at the Federal Building in Ft. Worth,
TX but worth the trip whether you are a
rookie or an experiences GSA contractor.
Several new initiatives will be
announced including GSA’s discussion
on Transactional Data Reporting (TDR).
We have heard the TDR fnal rule may be
posted in the Federal Register as early as
May2016.GSAhasadvisedtrainingwillbe
provided to vendors as well as contracting
offcers on the reporting and the TDR
repository. As the next step and follow
on to the Competitive Pricing Initiative
GSA will roll out their Formatted Pricing
Tool (FPT). The new tool will aid in the
pricing analysis of identical items for new
offers and modifcations for vendors and
contracting offcers. To help improve GSA
processes GSA will also launch Making It
Easier (MIE).
The SIA Government Procurement
Policy Working Group and Government
Relations Committee encourages
security industry professionals to join
our working group to keep up to date
on all of the happenings with Schedules
programs and other Federal, State and
Local Government procurement issues
and initiatives of interest to the security
community.
Lynn A. de Seve is president of GSA
Schedules Inc. and chair of the SIA
Procurement Policy Working Group. She
can be contacted at lynn@gsa-schedules.
com.
7. Q 1 2 0 1 6 7
Q1
T
ime and money — people are
always seeking ways to save or
gain both, and this is also evident
in enterprise operations. As government
agencies deal with ever tightening
budgets and seek to increase efficiency,
a crucial part is to achieve optimal,
comprehensive security while saving
these two precious commodities.
In terms of enterprise security, a
unified platform accomplishes both
while adding multiple other
benefits that drive return-on-
investment and reduce total cost
of ownership.
A unified security platform
blends various devices and
solutions into a single, intuitive
platform that simplifies
operations, giving the immediate
benefit of greater efficiency.
Users are able to manage many
different systems from a single
interface, saving time because
users are no longer jumping
from one screen to another for
the sake of investigation, or
responding to a situation in real
time. Additional time savings
is achieved by streamlining
workflows and processes,
allowing enterprises to do more
with existing resources, resulting in
additional savings. If the security
department can do just as much
or more with the resources already
budgeted for, there is no need to invest
time or money into training more
personnel, or learning new solutions.
Investing in a security solution
should not be all about saving money.
It is critical to also reduce initial
investment to ensure the enterprise
achieves its security goals while
obtaining, processing and using critical
information as quickly and accurately
as possible is the key.
Integrating access control
Video and Access Control: A
Case for Unifed Platforms
By Mitchell Kane, President, Vanderbilt Industries
technologies with video surveillance
and alarm monitoring via a unified
platform enhances situational
awareness, enabling operators to
see when an alarm is triggered and
immediately view the location of
the alarm trigger with its associated
video. Seeing these events take place
simultaneously, the operator quickly
gathers the necessary information
to make a real-time decision on how
to address the event. These intuitive
functionalities provide enterprises
greater control of overall security.
THE BENEFITS OF NETWORKED ACCESS
CONTROL
In addition to integrating various
security systems together into a unified
platform, end users are finding ways to
streamline the installation process by
introducing wireless or online locks
for better networked access control.
Today’s access control users expect
more of a system than a one-size-fits-all
solution that is cumbersome to operate
and expensive to scale. Integrators
are responding with more customized
solutions that incorporate a blend of
online and wireless locks to better suit
each customer’s specific needs.
Wireless offline locks use a wireless
protocol to communicate with a
system’s central hub, and provide an
added level of flexibility. Additionally,
they can be quickly and easily added
to an access control solution without
the significant financial and time
investment involved with
running wire. Another option,
online locks, which can also
be wireless, and are networked
with the rest of a facility’s
access control system, enabling
decision-making to occur on
the central hub, rather than at
the door. These devices provide
greater capabilities, including
remote management, automatic
alerts and different user access
levels.
Both wireless and online locks
work hand-in-hand to help
provide end users with real-time
reporting capabilities and the
ability to streamline response.
The flexibility of both of these
options gives end users the
ability to design a system in a
way that best suits the facility and the
end user’s budget.
Simplification and unified platforms
save end users time and money by
integrating many security applications
– such as video and access control
data – into a single platform. Going
further, wireless and online locks allow
more and more end users the freedom
and flexibility needed to integrated
more options for their facilities. This
empowers the end user to rapidly
respond to emerging situations based
on various pieces of the event puzzle
coming together to tell the full story.