Mobile phone restriction in penitentiaries should reduce street crimes immediately

inselaciune_telefonThe existence of mobile telephones, laptop computers and other digital communication tools inside penitentiaries makes it easy for convicts to organize crimes from their respective reclusion centers without having to be on the streets. Kidnappings, extortions and hired homicides are part of inmates’ crime agenda, which they perform with impunity under the “protection” of their condition as prisoners.

A CICPC officer linked to the investigation of these crimes revealed that 90% of phone call extortions originate from within a prison, so he assures that restricting the use of mobile devices in penitentiaries would “almost completely” eliminate this crime. “This would be a hard blow to kidnapping and hired-gun gangs led by prisoners; although the degree of reduction for these two crimes would be lower”, he said.

For this reason, penal experts insist on the need to double the efforts to prevent the insertion of these devices into the nation’s penitentiaries. But in light of the State’s unwillingness to halt the illegal traffic of mobile telephones, specialists propose the implementation of technological measures to block outgoing calls or disabling mobile devices.

bloq_direccional_recl_10One of the technology alternatives most recommended by experts is the installation of call jammers, due to their quick action and low costs.

A telecommunications security specialist indicated that jammers should be selected based on their range of action, as they could affect the communications of housing developments located close to the penitentiary centers.

“This is a basic solution, but it doesn’t guarantee that, under threat or payment, prison guards won’t turn off the device for a few hours. Or that using a ground cable from outside the prison the inmates can get internet access. It takes government willingness to make this device work”, he explained.

Source: El Nacional

Anuncios

Your next digital password could be the palm of your hand

scanners-handsBank cards with no numerical codes, fan identification systems at stadium gates and computers activated only by their owners are some of the possibilities a new identification system developed in Hungary offers.

The key: a reading of the blood vessels of the palm of your hand as the only digital signature. The reading of these biometric data is possible thanks to the cooperation between Japanese firm Fujitsu and Hungarian AlbaSec, allowing for safe identification of people.

This unique system can recognize five million points in the circulating system of a person’s palm, instead of the usual 10 to 50 used by other techniques. A 3cmx3cm sensor is capable of identifying those millions of points with infrared beams in just one second.

The PalmSecure sensor was developed by Fujitsu, while the Hungarian company developed the software capable of identifying the biometric data of an unlimited number of people thanks to the unique patterns of their hands’ blood vessels.

This artery scanner has several advantages, as the hand never touches the glass, thus leaving no prints that would make it easy to copy the information. The device which costs about 300 euro to install, generates a so-called “hash code,” information it doesn’t keep in its memory but transmits to the system that deciphers these data.

Thus, this scanner could be used for personal identification, as a complement for Passports or as the numerical code used in ATMs. Your secret number is your own hand and nobody else can use it.

Source: EFE

Group of international hackers arrested

hacker_pass-630x420The Spanish International Police, in collaboration with the US National Security Agency (NSA) has dismantled a group of hackers specialized in robbing ATMs worldwide. The group is responsible for extracting over 60 million USD in a simultaneous ATM attack to 23 countries back in February of 2013.

The network was dismantled as they prepared for a similar attack in Japan. Six members of Romanian citizenship and two Moroccan have been arrested in Spain. The IT expert and group leader was arrested in Germany.

The criminals were still following their leader’s orders, capable of violating bank databases to disable their security measures. They managed to get USD 400,000 in a single night, by targeting 446 ATMs in Madrid.

In the police raid in Spain’s capital, Madrid, the agents intercepted € 25,000 in cash, two credit card reader/recorders, over one thousand virgin cards with a magnetic band, IT materials and a large number of jewels.

Source: Correo del Orinoco

Condominium at the Expense of Crime

CCTVVenezuela is a country in which their citizens must invest in personal safety especially in Caracas, a city in which an average 14 kidnappings a week and 15 robberies and 8 murders a day are committed as reported off the record by the Body of Scientific, Penal and Criminal Investigations (CICPC, in Spanish).

Electric fences, especial gates for garages, bars for houses and buildings, security cameras, vigilance services, coded keys, emergency response services, life insurances, insurance against car theft, special devices and armor for vehicles are just a small part of a larger list of security expenses that reduce the availability of money and the possibilities to spend it on health, travel or leisure for the Venezuelan.

In a building where 150 families live there may require an average 60 thousand Bolivars monthly for vigilance expenses and maybe, some 10 percent of such amount for maintenance and repair of security devices, electric lock systems and other equipment.

Therefore, it is very important at the time of investing money, to have a plan or program that will harmonize the budget availability with the existing priorities. It is convenient to base on a risk assessment study prepared by a certified specialist, who shall help with the implementation plan according to your reach. Careful attention must be given to the selection of the equipment and devices for electronic safety.

In general, you must use renowned brands in terms of quality and reliability considering both the high initial economic impact and the mid-term compensation due to their durability and low failure frequency.

A risk assessment study shall highlight what are the areas of vulnerability in your house or building, and shall provide suggestions on how to solve them. A vendor or supplier of security systems that does not rely on a previous study will offer you everything that is at hand in terms of making a sale, which might eventually end in a waste of your money.

A control room with a view……to the world

G4S Technology VMSDCAn advanced video monitoring G4S center uses the web to integrate our offices in the world.

Imagine a monitoring center capable of viewing its customers’ premises anywhere in the world, detecting incidents the moment they occur and then directing security officers or other agencies to the precise location of the event.

Science fiction? A vision of the distant future?

Not at all. G4S Technology operates a data center and video monitoring (known by its acronym in English as VMSDC) that covers all these features.

Although based in the United States, just north of Boston, Massachusetts, the “field of vision” of this video-based center is not limited to North America. It can “see” as far as the internet will allow, which means virtually anywhere in the world that has a broadband connection. It already monitors remotely G4S Technology’s own high security headquarters at Tewkesbury, Gloucestershire, in the UK. But it is the US market on which it is focusing. Working with strategic manned security partners, like G4S, it is providing integrated security solutions that reduce overall costs whilst taking the protection of customers’ assets to another level.

It also monitors, in remote form, the G4S high security facilities in Tewkesbury, Gloucestershire, UK, however it is focusing in the US market. Since it works in conjunction with its strategic allies in the security field, it can offer integrated solutions that allow costs reduction; meanwhile it protects its client’s assets to a higher level.

Some monitoring stations attempted to reduce the incidence of false alarms by introducing low cost, low quality cameras, similar to webcams, so that operators could view a location to verify if there was a problem.

“In other words,” Cordasco observes, “they have had to put in a second technology to make sure the first is working correctly. That’s not using video for real surveillance purposes; it’s just a protect – yourself measure.”

Another approach, preferred by larger businesses, has been to set up CCTV control rooms at their sites and have security officers watch a wall of monitors for signs of any unauthorized activity or other incidents caught on camera.

In its day, this use of TV cameras was seen as a great advance because it reduced the number of security personnel required to patrol a site. It is still a preferred solution for many customers though, increasingly, companies are rejecting permanent viewing of the screens and using CCTV forensically instead. This enables them to see, after the event, what went wrong or who committed an offence, but it plays no role in preventing an incident. Recent developments offer better solutions. G4S Technology decided it was time for a total rethink of centralized monitoring and the way it could benefit the security companies providing manned security and their customers.

This new concept wasn’t based just on the opportunities offered by the internet, broadband connectivity and video technology. It was more about G4S’s own Symmetry video management system and the extraordinary things it can do with all these elements.

“The big difference with us compared with other monitoring centers is that we use video as the primary technology for securing customers’ facilities. For that, an IT-based environment is essential.”

The way to achieve this was with a purpose-built center. So G4S Technology designed its VMSDC to accommodate all the sophisticated high tech equipment necessary to make it a world-class establishment and recruited people with superior technical skills.

Also G4S Touchcom moved developers of network software OneFacility to the same building, to allow the VMSDC to become a technical help desk during 24 hours for all the developing advanced solutions that G4S Technology is developing.

There are, of course, plenty of high definition and touch screens in the new center but instead of wallto-wall monitors it has a panoramic screen with constantly changing locations and images, as well as individual desktop displays. But undoubtedly the most important innovation is the use of video analytics which control the images sent to the G4S monitoring center. This allows CCTV cameras to “look” for certain events and only when they occur will the VMSDC be alerted.

For example, this intelligent video system monitors activity at a 55-acre outdoor shopping mall in California at which G4S security officers are on duty around the clock.

Once the shops close, the video analytics software begins its surveillance and it “knows” exactly what it is looking for. “It is programmed with an algorithm that only detects people,” explains Cordasco, who supervised the VMSDC’s design and development.

“It ignores dogs, or trees moving, or paper being blown around. But the moment a person walks into view it will send an image to our center and an operator will watch what is happening. “If it’s just a person strolling through the mall, no action is necessary but if he sees the individual acting suspiciously, or trying doors of retail outlets, then he will notify the G4S Wackenhut officer on duty, via his Secure Trax device”.

“The operator can either speak with or text the officer and can even send a photo or a video clip of what he has just seen on screen, together with the precise location provided by GPS technology. He will also be able to watch and record the officer’s intervention.”

Similarly, video analytics respond to vehicle movements at a Texas organ transplant agency. The CCTV camera ignores human activity but the moment a vehicle arrives at a particular gate it transmits the image to the Boston facility and an operator will watch the delivery or collection procedure to ensure it goes smoothly. “Organs,” says Cordasco, “are very valuable.”

The VMSDC gained UUFX certification from Underwriters Laboratories, which sets standards for monitoring centers, and satisfied the requirements for a Five Diamond rating.

“Less than four per cent of all monitoring centers have been able to achieve both,” adds Cordasco, with understandable pride.

And with its IT infrastructure firmly established, the new G4S advanced video monitoring center is well placed to take advantage of even more advanced security technology, as it is developed.

Biometric Systems, an efficient alternative in the field of security

biometriaTechnology has achieved significant advances in the field of physical security, with the invention of reliable equipment and devices that facilitate control and supervision tasks keeping us informed of what takes place in company facilities even without human presence.

In order to illustrate our readers on the working features and utility of these preventive security devices, this edition includes comments on biometric identification systems, especially the fingerprint recognition system.

Biometric security technology is based on the recognition of people’s unique and nontransferable physical features, such as: the shape of their faces, the geometry of some parts of the human body such as hands, eyes, and fingerprints. These are some of the features that differentiate a human being from another.

Fingerprint identification is one of the oldest and certainly most spread out techniques used today. An individual’s fingerprint is defined by a complex combination of line, arch, bow and circle patterns. An optical scanner reads fingerprints using an intermittent light through a transparent plate over which users place one of several of their fingers, thus digitalizing their reflection on the plate. An existing computer software codifies the different patterns found in the digital image and the resulting templates can be optionally encrypted and stored in a central database or on each user’s individual card. These systems have a wide range of applications: from safe access to computers, networks, protection of electronic files, to physical access control in a restricted-access environment.

The implementation of fingerprint biometrics in companies’ access control systems is currently considered to be a valuable investment, due to the benefits obtained in automated security  in the access control to restricted spaces and areas.

Fingerprint biometrics systems are a means to identify people safely, as compared to other means, and offer the following advantages and disadvantages:

Advantages.

Every individual’s fingerprint is unique and inalterable for life.

Large amounts of money have been invested in developing and improving fingerprint processing techniques.

It’s a non-intrusive technique; placing a finger on a reader does not make the user feel violated.

The margin of error of the algorithms used to identify or authenticate fingerprints is extremely low.

Disadvantages.

Scanned images may be blurry or inaccurate due scars or dirt on the persons finger or the scanner’s plate.

For additional information on this or any other topic related to electronic security systems, contact us at:

infocentre@ve.g4s.com