As explained in the previous article, the partitioning of the area requires the implementation of control and detection devices. All of these systems are called "passive security" as opposed to "active security".
Clarification and terminology before continuing. Many "security sellers" pretend to use artificial intelligence, AI. This is true and fake, but do they know why? You’ll know it
1 AI is the overall implemented system able to simulate human intelligence. We write SIMULATE and not replace. And so, they are capable of giving an illusion of a kind of intelligence without any free will. We currently distinguish three various AI.
2 The "Machine Program", AI totally linked to the programmer, such as the "Global Positioning System" (GPS), video games, character recognition (OCR), augmented or not virtual reality and even video motion detection (VMD). Finally, it is the current computer for domestic use, business and, of course, for security on a large scale.
3 The "Machine Learning" AI is also linked to the programmer with additional algorithms. It allows synthesis and data comparison, as well as event-driven restitution. This is the machine that beat Kasparov. This AI is used in medicine, education, research, and high-tech security, such as video analytics intelligence. SDS is one of the few specialists in Asia.
4 The "Autonomous Machine", the blood-curding AI ... Completely unlinked from the programmer, it systematically learns, manages and develops its neural networks, gains in logic, self-learns and stores knowledge. Worse, it tests itself by making its improvised errors. This is the famous GO machine (refer to the strategic game). Always in experimentation, this machine is both promising and terrifying ...
When some will sale AI, you will be I-nitiated :-)
Like AI, there are three categories of passive security. Of course, the aim advisor will be to organize them in synergy to gain efficiency, to down the costs and increase the active safety (officers) skills without disturbing the functioning on-site.
Physical protections are equipment or hard constructions used to seal an area or perimeter and slow down any intrusions. These elements can guarantee several uses depending on their resistance to shock, deflagration, thrust, impact, shear or other. Resistance to water, sound dispersion, and thermal or electromagnetic propagation will also be among the qualities required, if applicable, depending on in situ needs.
This equipment can be walls, doors, windows, locks or even elevators, among others. Each of these components is inert or interlocked.
Control and management equipment ensure regular access, fluidity of flows, and compartmentalization of areas. These can be access controls, but also "AI" software to override permissions. An accessible room could be refused to all or almost all if a critical attendance threshold is reached. In this case, intelligent video analysis systems EVITECH type will be the only one to use. These systems are supposed to control movement permissions and access rights.
The detection and alert equipment ensure permanent vigilance of the spaces to detect anomalies between the rules and reality. Some, such as motion detection or volumetric alarms, offer few possibilities in terms of detection (yes/no). Other equipment, on the other hand (high-tech), can easily combine several behaviours and take the appropriate measures independently in response to a threat.
SDS is already in the future. Today, expertise and audits of risks and threats make it possible to synergise the three categories, such as on very sensitive sites as follows:
The passages are analyzed in perimetry; in case of alert, drones automatically set off on a reconnaissance patrol on the GPS point activated. A control room receives live images and directs interventions. And that's just the beginning …
At a time when the threat is growing (terrorism, crime, espionage, etc.), technology will never replace humans but will stay at its service to limit false alerts and guide interveners in order to optimize their efficiency and protect them in action.
Every day, the limits of security are unlocked to offer companies, but also governments, the greatest serenity in their evolution against adversaries. This document gives a kind of the main basic without talking about more specific equipment such as armoured vehicles, safes or advanced signalling...
Security in a company must be as transparent as possible so as not to constrain while inspiring a climate of trust. It’s an alchemy that few security managers know how to implement ...
The threat can also come from within, knowingly or not. This is often the result of a lack of awareness and laxity in applying the rules. This is the subject of our next article on the notion of the protection of secrets and confidential documents.
So, remember it, stay suspicious of counterfeits …