Subscribe to

Blogs

Discovered at DEFCON 27: automated license plate readers (ALPRs) being hoodwinked by clothing

 - 
Wednesday, August 14, 2019

It seems Joe Public is shouting “privacy here, privacy there, privacy everywhere,” as people are pushing back against certain technologies that could, or people believe could, misidentify them and track, monitor and record their actions, or be the catalyst to their personal information and identity being stolen.

It’s a double-edged sword really; people want to use the technology to ensure safety and security, but at the same time, they want no interference with their privacy. It’s all or nothing. Unfortunately, we aren’t at a point with technology where “good” people are automatically excluded from the “bad.” However, one solution to protect privacy presented itself about a week ago at none other than DEFCON 27

As over 25,000 security professionals and researchers, federal government employees, lawyers, journalists, and of course, hackers with an interest in anything and everything that can be hacked descended on Las Vegas’ Paris, Bally’s, Flamingo and Planet Hollywood Convention Centers, professional ethical hacker and now, fashion designer, Kate Rose, debuted her weapon of choice against ALPRs and surveillance — t-shirts, hoodies, jackets, dresses and skirts. 

Knows as Adversarial Fashion, each garment is purposely designed to trigger ALPRs and inject data rubbish into systems used by states and its contractors, believed by some to monitor and track civilians. Rose tested a series of modified license plate images with commercial ALPR APIs and created fabric patterns that read into LPRs as if they are authentic license plates. Priced at no more than 50 bucks, tops, you too can now fool ALPRs with your clothes! 

Don’t feel like shelling out your hard-earned money? Not to worry! Rose lists all the resources needed to make your own computer vision-triggering fashion and fabric designs on her site, along with a hyperlinked list of libraries and APIs, image editing tools, color palette extraction tools and textile pattern tutorials. In addition, slides from her DEFCON 27 Crypto and Privacy Village talk, “Sartorial Hacking to Combat Surveillance,” offering the following how-to guide of designing your own anti-surveillance clothes: 

  1. Choose a recognition system and experiment with design constraints, starting with high confidence images.
  2. Test tolerances by making slight modifications to source images. 
  3. Make notes of “cue” attributes that affect confidence scores. 
  4. Plot enough images to determine what seems to work. 
  5. Use images that work to design a pattern and digitally print it onto fabric. 

I’m not too sure if this is a 5-step method to early retirement, but I can say people are demanding privacy and obviously, being very creative in their fight for it. 

 

Regulation implementing NDAA procurement ban announced

 - 
Wednesday, August 14, 2019

On Tuesday, Aug. 13, the Federal Acquisition Regulation (FAR) rule implementing the first subsection of the procurement prohibition on certain Chinese telecommunications and video surveillance equipment was announced.

Notably, the rule covers only the provision of the fiscal year 2019 National Defense Authorization Act (NDAA) Section 889 set to go into effect one year following enactment — subsection (a)(1)(A) relating to direct government procurement of covered equipment and services. The remaining provisions of Section 889 (including applicability to the use of federal grant funds) are scheduled to go into effect in August 2020.

While the Security Industry Association (SIA) is working to provide members with a preliminary analysis of the rule as quickly as possible, these rules and contract clauses added to the FAR should be carefully reviewed by suppliers of video surveillance equipment to the government.

The rule prohibits federal agencies from buying “covered telecommunications equipment or services as a substantial or essential component of any system, or as critical technology as part of any system” from designated Chinese entities, including:

•    Telecommunications equipment produced by Huawei or ZTE and their affiliates;
•    Video surveillance and telecommunications equipment produced by Hytera Communications Corporation (Hytera), Hangzhou Hikvision Digital Technology Company (Hikvision), Zhejiang Dahua Technology Co., Ltd. (Dahua) or their affiliates for the purpose of public safety, security of government facilities, physical security surveillance of critical infrastructure and other national security purposes;
•    Telecommunications or video surveillance services provided by any of these entities or using any such equipment; and
•    Telecommunications or video surveillance equipment or services produced or provided by an entity that the Secretary of Defense, in consultation with the Director of National Intelligence or the Director of the Federal Bureau of Investigation, reasonably believes to be an entity owned or controlled by, or otherwise connected to, the Chinese government.

In a comprehensive analysis of the interim rule, Morrison & Foerster said, “DoD, GSA and NASA are working to update the online System for Award Management (SAM) to allow contractors to represent annually whether they sell covered equipment or services. Only contractors that provide an affirmative representation in SAM will be required to provide offer-by-offer disclosures in their proposals for contracts or task orders. This option is not available yet, so contractors should expect to see the representation incorporated into solicitations starting August 13.

“The second clause — FAR 52.204-25 — incorporates Section 889’s prohibitions and definitions into the contract and also imposes a significant reporting requirement on the contractor. The reporting requirement obligates the contractor to report through DIBNet if it identifies any activity prohibited by the rule during contract performance. Contractors must do so within one business day of identifying the activity, and then follow up within 10 business days with any additional information about mitigation actions undertaken or recommended.”

Morrison & Foerster also pointed out that by October 14, 2019, the Secretary of Commerce “must issue new restrictions implementing the May Executive Order declaring a national emergency over the influx of telecommunications technology developed by ‘foreign adversaries’ and entities controlled by them. Implementing regulations will identify covered entities and transactions, almost certainly targeting entities like Huawei and ZTE,” Morrison & Foerster analysts opined.

Stay tuned for more on this topic.

Will drones take off within security?

 - 
Wednesday, August 7, 2019

The role of robotics within security continues to increase, as the technology can act as a force multiplier, expand the scope and effectiveness of security around and within a perimeter, including everything from small to expansive areas. Drones, for example, have come a long way in just a couple of years, and are starting to be used in commercial and industrial senarios, as well as in and around home.

With drone technology advancing at a fast rate, FAA regulations loosening, and more accessible off-the-shelf solutions available, we may be at a turning point when it comes to increased adoption of drones within security, according to a recent whitepaper, Drones in Security & Surveillance, by FlytBase, an enterprise drone automation company.

“The physical security market is primed for drone automation and scaling — the time, cost and safety benefits of autonomous drone fleets can create significant business value for this industry,” FlytBase CEO Nitin Gupta, said in the announcement of the white paper. “Drone patrols will augment human guards and enable security agencies, risk managers, security directors, system integrators and other stakeholders to make faster, better decisions for real-time incident response, remote security operations, event management, disaster response and more.”

The ability to deploy in a multitude of 24/7 security and surveillance use-cases is helping to drive increased demand and adoption of unmanned aerial vehicles (UAVs), said Flytbase, noting that UAVs address many user/customer pain points, including:
     •    High turnover of security guards;
     •    Operations at night and in hostile scenarios;
     •    Surveillance of hard-to-reach locations;
     •    Liabilities associated with human and helicopter patrols;
     •    CCTV blind spots; and
     •    Need for real-time situational awareness in emergencies, etc.

“The time for aerial security is now ripe because the prosumer drone market has matured so rapidly in the last few years that commercial-off-the-shelf drones can be used commercially, instead of (expensive, monolithic, low reliability) custom drones, in all but the most demanding security and surveillance use-cases,” according to the white paper. “The physical security market is one of the most compelling target segments for the commercial drone industry. As automation technology is adopted for industrial and commercial security, drone fleets will play a central role, given that they can be deployed autonomously, at scale.” 

The two obvious obstacles for driving broad adoption of drones in aerial security use-cases tended to be:
     •    Hardware (battery life, sensor quality, flight stability, etc.); and
     •    Regulation (especially for beyond visual-line-of-sight i.e. BVLOS operations)

However, these are now turning enablers, with the emergence of:
     •    Reliable, off-the-shelf drones that are affordable and programmable; and
     •    FAA integrated pilot programs, EVLOS relaxations, Part 107 certifications and UAS Remote ID.

As UAV regulations mature, security agencies in particular are expected to rapidly   adopt drones to substantially reduce their operating costs, improve perimeter coverage and awareness, and to minimize occupational, health and safety risks to human guards.  Despite a variety of relevant use-cases, the enterprise adoption of drones in this sector remains at the proof-of-concept and pilot stage; for production deployments to become widespread, three enablers are needed:

     1.    Drone-in-a-box hardware that is cost-effective and yet reliable;
     2.    SaaS solutions that automate drones, are scalable and yet hardware-agnostic; and
     3.    Integrated offerings that require low investment, & hence pay back in < 1 year.

“For VLOS and EVLOS security operations, the drone-in-a-box requirement is less critical,” the white paper noted. “Thus, security agencies, domain consultants, drone  system integrators, managed service providers and end users can all get started with off-the-shelf, prosumer-grade drones and existing SaaS offerings, and eventually add docking stations and charging pads to their autonomous drone security operations.”

Click here for the complete white paper.

Is banning biometrics the answer to safety and security in public housing?

 - 
Wednesday, August 7, 2019

Some people are calling it “social control,” some believe it’s exploiting the poor; others are saying it will “criminalize and marginalize” residents, while Congresswoman Ayanna Pressley mentions “rampant biases” especially with “women and people of color.” Sounds like “it” should be banned, right? Well, what if I told you I am talking about facial recognition biometric technology? Would that influence your decision to ban or not to ban this technology?

For the first time ever, a piece of proposed federal legislation addresses limits on biometric technology and tenants of public housing — the No Biometric Barriers to Housing Act of 2019, introduced by Congressional Democratic lawmakers Yvette Clarke from New York; Ayanna Pressley from Massachusetts and Rashida Tlaib from Michigan. 

Here’s what the legislation would do: prohibit the use of biometric recognition technology in most public and assisted housing units funded by the Department of Housing and Urban Development (HUD) and require the department to submit a report to Congress. Required in the report would be the following:

  • Any known use of facial recognition technologies in public housing units
  • Impact of emerging technologies on tenants
  • Purpose of installing this technology in units
  • Demographic information of tenants
  • Impact of emerging technologies on vulnerable communities in public housing, including tenant privacy, civil rights and fair housing.

Several organizations support this legislation including:

  • NAACP;
  • The National Housing Law Project;
  • National Low Income Housing Coalition; 
  • National Action Network;
  • Color of Change; and
  • The Project On Government Oversight (POGO), a nonpartisan, independent watchdog that investigates and exposes waste, corruption, abuse of power and when the govern fails to serve the public or silences those who report wrong doing. 

POGO went so far as to pen a letter to the Congresswomen, citing facial recognition systems have “registered false matches over 90 percent of the time in multiple law enforcement pilot initiatives,” and Massachusetts Institute of Technology researchers, the America Civil Liberties Union and an FBI expert found “facial recognition technology is less effective in properly identifying women and people of color, raising civil rights concerns.”

Thus far, this legislation would only affect HUD housing; however, it could very easily trickle into other landlord/tenant situations as the hot topic surrounding public security seems to revolve around privacy.

How to assess your company’s cybersecurity risk

 - 
Wednesday, July 31, 2019

It finally happened. Temps reached into the 100s in Dallas as Cyber:Secured Forum helped some security professionals stay cool inside The Westin Dallas Park Central while learning actionable takeaways and best practices related to maintaining and improving cybersecurity of security systems and solutions. While I gather my thoughts to bring you a detailed rendition of the past two days, now would be a great time to do a cybersecurity risk assessment on your system. 

Here are my “4 Preliminaries” (4Ps) to help you get started on your assessment:

  1. Perspective. Make a list of all information stored on your computer, online, in different apps and in the cloud, for example, work documents, apps, music, passwords, pictures, videos of your family, banking and credit card credentials, etc. Physically seeing how much precious data you have should be a wakeup call to protect it against cyber threats and attacks.
  2. Passwords. Make a list of all online accounts and their login credentials. 
  3. Peruse. Look through the list and carefully think about the value of each type of stored data. If it would be detrimental if anyone gained access or a particular piece or data or online account was lost, deleted or leaked online, put a star by it or highlight it. 
  4. Posture. Take a position of defense against cyberattacks, cybercriminals and cyberthreats. To start, make sure all the passwords on your list are strong to prevent access to your data. Each account needs a DIFFERENT, robust password consisting of at least 12 or more of the following: upper- and lower-case letters, and numbers and symbols in various combinations and locations within the password. 

Once you’ve completed the 4Ps, google the phrase “cybersecurity risk assessment checklist.” This tool is available for free from different organizations and businesses. Choose the checklist that resonates most closely with your business, or take bits and pieces of a variety of checklists to create a custom list. Then, using the information you’ve already gathered from the 4Ps, get started answering the questions. You’ll be well on your way to learning exactly where your company is postured for cybersecurity as well as areas that need improvement. 

 

Industry confidence skyrockets, SIA reports

 - 
Wednesday, July 31, 2019

Security industry confidence continues to rise with the summer temps, according to The Security Industry Association’s latest Security Market Index, a bimonthly measure and outlook for the security industry.

While confidence in the state of the market had already seen a bump in May with a Security Market Index (SMI) of 63, up from the March SMI of 60, hopes are even higher this month with a July 2019 SMI of 71, SIA reported, noting that any Index above 50 indicates that conditions within the industry are largely positive and that security industry professionals are predominantly confident in their business outlooks.

Special focuses of the July 2019 SMI include:
•    A continuously climbing SMI for security consultants;
•    Despite other sectors' increases, a dip in confidence for the video surveillance SMI;
•    Integrators increasing spending among decreases in overall confidence in business conditions; and
•    Expected security spending increases in government and education.

For its July SMI, SIA found that 48 percent of security professionals rated current business conditions as “excellent,” and 45 percent said they were “good.” Only 7 percent said conditions were “average,” and no Security Market Index respondents considered current conditions to be “fair” or “poor.” In May 2019, 49 percent of respondents said conditions were “excellent,” and 38 percent rated conditions as “good.” Eight percent said conditions were “average,” 5 percent rated conditions as “fair” and no Security Market Index respondents rated conditions as “poor.”

SIA noted that multiple respondents said that there is a strong demand from customers for security system upgrades, as well as new installations, while others pointed out the strong acquisition activity currently happening within the security market. And while the responses were mostly positive, some pointed out what they see as current issues in the industry. “While the economy appears strong, we’re seeing a lot of pressure to cut prices,” said a respondent working in the access control sector, who rated current business conditions as “good.” One respondent who works as an engineer in the industry rated current business conditions as “good,” but expressed worry over the U.S. president’s relations with Europe, saying, “Unnecessary business risk results.”

While numbers remained steady in most key factors (new orders; product/service sales; new product intro; and capital equip spend) this July, SIA found that the percentage of respondents who said they plan on increasing their number of employees or hours worked jumped to 76 percent, when only 56 percent said so in May.

Within the next three months, 90 percent of security professionals believe business conditions will be either “much better” or “a little better,” SIA found, with 10 percent expecting no change to business conditions, and zero Security Market Index respondents expecting conditions to be worse. This is slightly more optimistic than in May, when 87 percent expected improved conditions within three months.

When SIA asked which vertical market they think has the most potential for increased security spending in the next five years, many respondents to the July SMI answered government and education, with 24 percent answering government, and 21 percent answering education. Other answers included healthcare (17 percent), cannabis (10 percent), office buildings (7 percent) and energy (3 percent).
  
In regard to increased government business, SIA referenced a Dec. 2018 U.S. Government Accountability Office (GAO) report, Federal Building Security: Actions Needed to Help Achieve Vision for Secure, Interoperable Physical Access Control, which pointed out the need for improved security in government buildings and a government-wide approach to regulate access to controlled areas in federal buildings using access control systems such as card readers.   

“Implementation of physical access control systems at federal agencies represents a significant federal investment,” stated the report. “For example, over the next five years the Transportation Security Agency plans to spend about $73 million to implement physical access control systems . . . In addition, according to GSA officials, GSA has spent millions of dollars to test these systems.”   

School security has also proven to be a booming market for the security industry, with bills requiring security spending in schools and grants for security systems in schools being introduced at a rapid rate, SIA reported.  The education sector of the market for security equipment spending and services reached $2.7 billion in revenue in 2017, according to a 2018 report from IHS Markit, School Security Systems Industry – U.S. Market Overview. The market is expected to grow an average of 1 percent annually, reaching $2.8 billion by 2021. However, the report warns that since so much progress has been made in securing schools over recent years, security spending may actually slow in the market.

For the full Security Market Index, including a breakdown by segment click here

Artificial Intelligence (AI) necessary to respond to cyberattacks

 - 
Wednesday, July 24, 2019

Being born in the late 70s, it’s been amazing to watch the evolution of computers, the Internet, cyber and the like. I remember sitting in my junior high computer class—7th grade, I believe. Working with Basic on an Apple 2e, I created white coding on a black screen that made a man (stick figure) jump, dance and run when the user got the correct answer to the math problem presented on the screen. That, my friends, was high tech! 

Now, the graphics are realistic and some even interact with voice; data is being produced and shared at the rate of zettabytes; and computers are turning into machine learners, all of which is absolutely amazing but at the same time scary as bad people have turned it into a free-for-all of mass hacking that is detrimental to people and society. 

Human security experts work tirelessly each and every day to keep people like you and me, and the world safe; however, being human, they have their limits. For example, cybersecurity involves repetitiveness and tediousness, scouring through big data to identify anomalous data points; long, exhausting hours of data analysis; and relentlessly monitoring data going in and out of enterprise networks. Enter the age of artificial intelligence (AI) penetrating into the cyber realm in terms of security, obviously known collectively as cybersecurity. Working along-side humans, AI can complement cybersecurity by performing the repetitive, tedious tasks; it can be trained to take predefined steps against attacks and learn the most ideal responses going forward; and AI is fast and accurate with data analysis. This enables and empowers human security experts to use their talents and skills on other projects to further enhance cybersecurity. 

Capgemini, a global leader in consulting, technology services and digital transformation, recently published “Reinventing Cybersecurity with Artificial Intelligence Report,” finding 61 percent of enterprises said they cannot detect breach attempts today without the use of AI technologies. That’s over half of the 850 senior executives surveyed from IT information security, cybersecurity and IT operations in seven sectors across 10 countries. And if that’s not eye-opening enough, check out these findings: 

  • 69 percent believe AI will be necessary to respond to cyberattacks; 
  • 73 percent are testing AI use cases for cybersecurity; 
  • 64 percent said AI lowers the cost and reduces overall time taken to detect and respond to breaches by 12 percent; and
  • 56 percent said their cybersecurity analysts are overwhelmed and approximately 23 percent are not able to successfully investigate all identified incidents. 

With numbers like these, it’s easy to see AI and machine learning are essential to cybersecurity now and into the future. So, here at SSN, we’ve taken a huge step to bring you the latest and greats cybersecurity news with the addition of a “cybersecurity” tab on our website. Yep, that’s right … a whole section dedicated to all things cybersecurity!

To get a taste of our cybersecurity content check out the articles “Federal government aims to modernize physical security practices” and “Data forensics: time is of the essence,” and as always, we value your feedback. 

 

 

Cybersecurity on tap at SSN

 - 
Friday, July 19, 2019

For the past few years here at SSN we have been paying more and more attention to cybersecurity and its role within physical security, looking at it from as many different security perspectives as possible — end user, consultant, specifier, commercial integrator, supplier — you name it and we’ve probably written about it!

With cybersecurity playing such a prominent role in physical security today, we have added a section on our site that is completely devoted to our cybersecurity coverage. The convergence of physical and IT security is happening, and what better place to stay up to date on the latest happenings in the cybersecurity space than right here at SSN.

Some of our recent cyber-related stories include a great piece from SSN Contributing Editor Lilly Chapa, who attended the recent SIAGovSummit, about how the federal government aims to modernize physical security practices. As she points out, government agencies intend to evolve their security approach to address changing technology, threats and budgets, including working closer with cybersecurity and IT professionals.

Another interesting story worth checking out is by SSN Managing Editor Ginger Schlueter, who spoke with Cyber Criminologist Dr. Peter Stephenson about the art of data forensics.

Plus, she will be attending Cyber:Secured Summit at The Westin Dallas Park Central, July 29-31, and providing full coverage of the event here on the site as well, which you can find by just clicking on the Cybersecurity tab at the top of the site.

Dive right in here.

Summing up the 2019 Genetec Press Summit

 - 
Wednesday, July 17, 2019

I’ve spent the last two days in Montreal, learning all about Genetec but also learning tidbits of powerful information about the security industry. I will be sharing my thoughts, observations and knowledge in the days to come, so stay tuned to our website. Here is a preview of what’s to come:

We sometimes take for granted how “precious an average day is and how much it takes just to make a day average,” Andrew Elvish, vice president, marketing & product management, Genetec said when it comes to ensuring safety and security each and every day. Further, we have to “make sure everything happens every day.”

Genetec does its part to ensure everything happens every day by creating security solutions as well as partnering with others who do the same. The company has a global footprint in which they grow organically and currently, it employees 1,500 people of whom speak 23 different languages. The company also invests 28 percent of their topline into R&D. Expansion efforts are focused on entering a market at the right place at the right time with an emphasis on building channels and channel partners.

Yesterday was filled with open, authentic discussions around hot topics within the industry with Genetec employees as well as people from outside the organization who work with Genetec. Topics of discussion included: the role of privacy in a digital democracy, the future of AI in security, privacy matters in security, ALPR and the role of parking in cities and a panel discussion about cannabis and security.

Today, I get the unique opportunity to visit the Montreal Casino’s command center to see security in action, demonstrating how everything happens every day.

Again, stay tuned to SSN’s website and print publication for in-depth coverage and knowledge sharing of this event.

North America to lead growing global stadium security market

 - 
Wednesday, July 17, 2019

The increasing focus on safe cities and securing sports events and concerts in stadiums is aiding expansion of the global Stadium Security Market. 

The global market was valued at $6.2 billion in 2017 and is expected to reach $16.1 billion by 2025, growing at a CAGR of 12.8 percent during the forecast period, according to a new report from Fortune Business Insights based in Pune, India.

The report, titled “Stadium Security Market: Global Market Analysis, Insights and Forecast, 2018-2025,” offers insights into the market and the rising importance on public safety and security in stadiums across the world. According to the study, stadium owners are now installing well-equipped security systems including metal detectors, intrusion alarm systems, access control systems, CCTV cameras, facial recognition systems and fire alarm systems.

“Technological advancements such as adoption of Internet of Things (IoT) in stadium security systems is expected to enhance the spectator experience,” noted one of the lead analysts on the study. “Upgradation of stadium security plan can offer a convenient and personalized experience to spectators and simultaneously ensures complete security.” Moreover, IoT adoption helps in the effective management of stadium infrastructure, contributing towards the growth of the market, he said.

As per seating capacity, stadiums with capacity between 30,000 and 50,000 are anticipated to grow at a rapid pace driven by rising number of events and concerts, growing at a CAGR of 13.4 percent and. On the other hand, stadiums with a capacity of less than 30,000 seats are projected to account for the highest share in the global market. However, this segment is anticipated to exhibit a CAGR of 12.5 percent during the forecast period.                     
                                                                         
North America is expected to lead the global Stadium Security Market in the forecast years. Predominantly, Canada and the U.S are on alert for terrorist attacks, which compels the stadium owners to adopt stadium security solutions. Rapid technological advancements in stadium security systems and growing demand for maintaining stadium infrastructure are driving the market in North America. The market in Asia Pacific is expected to gain an impressive share in the forecast years.
 
Increasing terrorist threats and pressing need for ensuring public safety are compelling companies to develop innovative and smart stadium security measures. “To gain an edge over strong competition, several leading players are installing stadium security systems at some major stadiums to maintain their position in the global market,” the research firm found.

The top 10 players covered two-third of the share in the global market in 2017, the study noted, including:
•    Avigilon Corp.
•    AxxonSoft
•    BOSCH Security Systems
•    CISCO Systems Inc.
•    Dallmeier
•    Genetec Inc.
•    Honeywell International Inc.
•    Intel Corporation
•    NEC Corporation
•    Rapiscan Systems
 

Pages