When Strategies Converge: Networked and Smart, Too

March 17, 2006
/ Print / Reprints /
/ Text Size+
IT-based intelligent security is designed into new airport terminal construction. Shown is the new American Airlines terminal in New York.

A couple dozen or so U.S. airports are today’s Petri dish for the convergence of information technology and intelligent video. While the Transportation Security Administration (TSA) recently admitted chronic and expensive problems with passenger identification and “watch list” databases, integration of emerging software with captured security video is a working window on the future of fighting everything from terrorism to vandalism.

A TSA grant at Pittsburgh International Airport, for example, supplements security guards and screeners with intelligent video. J. P. Hudson & Associates, based in Beaver, Pa., played a central role in the design and execution of the plan. “We’ve done a lot of work with transportation, with the strongest focus being on airports,” commented John Hudson, the firm’s principal.

To assist in the Pittsburgh International project, Hudson tapped several other security firms including integrator InterTECH Security.


The system automatically analyzes the video input, identifying potential security breaches and reacts to suspicious activity with a preprogrammed set of alarm behaviors. “It’s dangerous to get too deep into the details and where we have it deployed, but I think it is safe to say that by using intelligent video technology, the airport is much safer now than it was before,” commented InterTECH’s Christopher Wetzel.

According to Austin, Tex.-based GE Security’s Xavier Heusghem, internal and external communications require an efficient audio/visual and data-based information system in order to manage airport security applications, anticipate and make effective decisions and initiate preventative measures for any foreseeable risk. For instance, Toronto’s Lester B. Pearson International Airport uses the firm’s VisioWave solution.

It provides advanced security using distributed system architecture over an IP network, IP-based video surveillance, events/alarms management, integration with other airport security systems while operating on a Gigabit Ethernet and wireless network infrastructure.

In this application, an important aspect of the Toronto system is the ability to offer video services to multiple tenants, who are part of the airport infrastructure, through secured access within the distributed video switching environment.

According to convergence gurus such as Steve Hunt of 4A International, Chicago, (see his column elsewhere in this issue), there are numerous business advantages as security and information technology bridge two worlds.

Intelligent video evolves in San Diego. “We are working out details now about very specific vehicle size, shape and patterns of movement, for example. Many of these details are confidential, but I can tell you that we are confident that the application of intelligent video to these types of threats can be an enormous security benefit,” said Mark Denari.

Business advantages

Steve Rice agrees. An executive at DVTel, Paramus, N.J., he said, “In many organizations, security is now incorporated into the strategy of the company. One catastrophic event could ruin sales and profitability for many quarters to come.” That, of course, includes airports where a major incident could affect the U.S. economy.

Added Rice, this new reality is coupled with the tremendous growth of integrated systems and now the convergence of physical security onto company networks. “The immediate outgrowth of new IT-centric security operations has been the sometimes ‘shotgun marriage’ of security and IT. This new relationship is by no means automatic or easy, but it is absolutely critical for organizations to get right.”

He pointed to a major Fortune 500 company, which went with a major security upgrade, choosing network video recorder (NVR) technology for its headquarters and to provide remote access to a number of formally disparate and isolated offices around the world.

That enterprise and many airports share the same next step. Security would have no choice but to work with IT. And it was at this crucial juncture that problems would be created or solutions negotiated that could affect the entire company for years to come.

Here is a thumbnail of Rice’s game plan.

  • Identify the right people to work with IT.
  • Get clear on the nature of the relationship: Security is now a customer of the IT department, where the department goes to get computers, storage and networking.
  • Reach an understanding on both sides about the new roles and relationships. The rules have changed – forever.
  • Understand the IT mission. It provides the technology, infrastructure and services in support of their customer’s business requirements.
  • Recognize IT’s “pain points,” that is their personnel and resource constraints so as to be set up for success, and not ask for the impossible from the outset.
  • Clearly formulate and communicate the security mission to IT, so IT would be able to assist in implementing the security vision.
  • Establish a pilot system to monitor network utilization and connectivity to remote offices to proactively address any bandwidth and security issues before putting video on the corporate network.
  • Upon selection of technology providers and installers, confirm with IT the understanding of the company’s business requirements and how they will be implemented and achieved in this new world.

Lessons learned

From the security perspective, Rice believes that some of the most important lessons learned in a security-IT include:
Moving to a digital solution offers an opportunity to take security from a cost center to contributing to the bottom line. Security must leverage the latest technology to contribute to the company’s profitability.

Security is now seen as part of the business strategy of the company. In this new reality, security must innovate and think outside the box to continue to deliver strategic importance to the company.

To create a mutually beneficial, effective partnership with IT, security must work hard to effectively communicate its business and service level requirements and understand the same from the IT perspective.

Side bar: Intelligent Takeoff at San Diego International

The San Diego Regional Airport Authority, owner and operator of the San Diego International Airport, is moving forward with a $15 million initiative to link the many technologies that control access and perform surveillance in and around the airport. SmartCatch intelligent video surveillance software from Vidient of Sunnyvale, Calif., is potentially a key element of this expanding system.

Under the leadership of Mark Denari, director of aviation security and public safety, San Diego is adding intelligent video surveillance to the security measures in place at access points. Currently, there is a beta test in progress at four of these portals, and Denari and his team are working with Vidient engineers to fine-tune the system to recognize the precise behaviors that constitute breach of security policy at the airport.

A prime benefit of intelligent video – video generated by behavior recognition software – is that no one needs to continually monitor the video. When the pre-defined behavior occurs, the recording begins automatically, and alerts are sent to guards or to the individual overseeing the operation when a threat is perceived.

“The Vidient system will tell us when an anomalous event or situation occurs – a breach of our access policies – and will send an alert to our command and control environment. This will draw attention to the event in real time, so we can determine and take appropriate action. We will also be able to review and analyze the digital video historically,” said Denari.

It’s important to distinguish between motion sensor technology and true behavior recognition software. Some motion detector systems create an invisible line in the video – across a secure doorway, for example – and motion across that line, even a bird or wind-blown object, triggers an alert. Sophisticated behavior recognition software available today can recognize a human being, distinguish it from an inanimate object and even accurately determine the number of people in the camera view. Algorithms can be written to spot specific types or sizes of vehicles, packages or pieces of luggage. To use behavior recognition technology, the first step is to identify the precise problem or threat at the location, and then program the software accordingly for that specific video device.

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Bill Zalud

You must login or register in order to post a comment.



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

security 2015 january cover

2015 January

In the January 2015 issue of Security, learn how PTZ and fixed dome cameras do dual duty in video production and surveillance applications, improve security on college campuses, and how to better cope with harsh environments in surveillance. 

Table Of Contents Subscribe

Tougher Cybersecurity Legislation

On January 20, President Barack Obama called for tougher cybersecurity legislation in his 2015 State of the Union address. Which of the following points do you feel is most needed today?
View Results Poll Archive


CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.