Your SlideShare is downloading. ×
Airport security 2013   donald zoufal
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Airport security 2013 donald zoufal


Published on

Published in: Business, Technology

1 Like
  • Be the first to comment

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Harnessing the Power of Security Technology Through Command and Control Centers Donald Zoufal Safety & Security Industry Executive SDI (System Development Integration, LLC)
  • 2. Aviation Security Summit, Prague, Czechoslovakia September 18, 2013 Harnessing the Power of Security Technology Though Command and Control Centers
  • 3. Vectors of Influence 3 • External Governmental Requirements • Internal Organizational Requirements • Private Sector/Commercial Interest • Technology Change
  • 4. Increased Requirements 4 • Airport Security Programs • Airport Emergency Plans • National Emergency Management Systems • Local and Regional Emergency Response Plans • Call-Taking and Dispatch Functions • Information Processing and Intelligence Generation • Notification
  • 5. CONOPS and SOPS 5
  • 6. 6 Technology Factors • New technologies are IT-based: the "Apollo console" is replaced by monitor and keyboard. • Technology has "escaped" the security office: No longer in a "silo“; must be distributed more widely to new stakeholders. • New tech is increasingly mobile: Mobile handheld devices, live video in vehicles, mobile command, UAVs and UGVs. OEMC (911) Mayor’s OfficeUnited Airlines FBIFAA External Access to Video at O’Hare Airport
  • 7. 7 Distributed Digital Platforms • Any computer on the network with permission can access cameras – Multiple groups can collaborate – View from external locations for instant situational awareness. • Mobile devices (in cars and on handheld units – PDA, Smart Phones) Digital video provides enhanced capabilities
  • 8. 8 Video Analytics provides more 'eyes‘ ...and they never get tired…let the system look for unacceptable behavior. • Suspicious packages • Trespassing • Unusual crowd movements • Fallen Person Evolving Analytics
  • 9. 9 Enhanced Imagery 1 CIF 704 x 480 Surveillance Industry State-of-the-Art 15x Coverage OR 15x Detail Five Mega Pixels: 2560 x 1920 352 x 240 4 CIF High Resolution Video • Better coverage with fewer cameras. • Better evidence from high-res.
  • 10. 10 Biometric devices • Ensure that access cards are used only by authorized employees. • Can use combination of card, fingerprint, and PIN. • Various types: fingerprint, hand geometry, iris scan. Identity Management • Identity management is no longer confined to one system: a single identity is now enrolled in many different disparate systems. • Multiple databases and reporting requirements make identity management complex. Sophisticated Access Control
  • 11. 11 Mobility Technology is increasingly mobile, requiring new approaches to deployment, security, and integration. • Security becomes even more important, requiring encryption, intrusion detection. • Connectivity sometimes requires multiple transmission methods. Unmanned Ground Vehicles For patrolling perimeters Wireless video surveillance Smart Phone Video Video & Other Apps in Vehicles via Wireless Coming…Here Now…
  • 12. 12 Command Center Functions and Interfaces in Airports Today
  • 13. Complex Mix of Diverse Systems 13
  • 14. 14 The Command Center Puzzle
  • 15. 15 Command Centers • Provide a safe, reliable home base for management • Integrates all systems into a single management view. Large scale video Display any source: video, cable TV, documents, computer screens, Simple ‘drag and drop’ control interface No more monitors built into consoles: LCD screens can display all systems: video, access control, alarm systems, etc. Can be reconfigured quickly. No computers under the desk All computers are housed in Data Center LCD Panels display system data Messages, shift notices, monitoring critical applications Access to Everything from one seat Operators have access to ALL systems in IP-based command center Classic Command Center Design
  • 16. Command Center Configurations 16 • Security Operations Center (SOC) • Airport Operation Center (AOC) • Combined Operations Center (COC) • Public safety Answering Point (PSAP) • Emergency Operation Center (EOC) • Fusion Center
  • 17. 17 Looking to the Future • Challenges Growing • Continually evolving threats driven by world politics. • Increasing enplanements with decreasing resources. • New technologies require IT skills to implement and support. • New Capabilities and Approaches Being Employed • All Command Centers moving to IT-based systems; the end of the ‘component’ era.
  • 18. 18 Questions Donald R. Zoufal J.D., M.A. Homeland Security, M.A. Public Administration Instructor, University of Chicago, Masters of Science in Threat and Response Management Program Safety and Security Executive
  • 19. Thank you. Visit us at