Legal Issues FlightGP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652018-05-01T04:00:00Z, Lilly Chapa<p>​In rural Grant County, Washington, public utility security personnel don't just protect remote substations—they help respond to the community's emergency calls. However, after one concerning encounter, it was clear something had to change—and security managers looked to the sky for solutions.</p><p>The Grant County Public Utilities Department (PUD) security leadership team gathered last March to review a disturbing incident from the previous night: a PUD security officer had responded to reports of a man seemingly under the influence firing a weapon indiscriminately in a nearby town. It's not unusual for PUD security personnel to respond to calls that do not pertain to the utilities because of the rural location and geography of the area, and that night the unarmed officer arrived at the scene of the disturbance before law enforcement. Fortunately, he was able to keep the man calm until police arrived, and the event ended without incident. Upon review, however, it was clear that the security officer could have been in harm's way.</p><p>"We have issues with people being on a substance, or domestic violence calls that we are first responders to, because law enforcement is a long way away," says Nick Weber, ​CPP, PSP, security manager for Grant County PUD. "We've had the patrol vehicle dented when residents kicked it, someone firing off weapons, and we just thought, 'how could we do this better?'" The team discussed solutions and initially joked about using a drone to mitigate problems. However, with more consideration, Weber said the idea began to gain traction. Using an off-the-shelf drone, the PUD could train its contract security officers to scope out a potentially perilous situation before endangering themselves, reducing response time. The drone could even be used for preemptive security assessments of the county's critical infrastructure.</p><p>"We had issues dealing with having unarmed security forces being placed into harm's way in order to solve issues related to the human environment, as well as looking for ways to better use our time and resources to conduct security assessments of substations, dams, and other critical buildings," says then physical security supervisor Brady Phelps, CPP, PSP. "We wanted to explore the challenges and opportunities that drones could present." Phelps—who now works as an auditor for the Western Electricity Coordinating Council—along with Weber and contract guard services account manager George Hainer began to flesh out the plan.​</p><h4>In the Industry</h4><p>The use of drones for security purposes is steadily picking up steam. As of summer 2016, more than 2,000 organizations had applied for commercial exemptions through the U.S. Federal Aviation Administration (FAA) to use drones for emergency management, security, or risk management, according to the Association for Unmanned Vehicle Systems International. And an IFSEC Global report notes that the international security market for drones will grow to $10 billion by 2020. </p><p>But applications for commercial exemptions don't lead to drone programs overnight, and Grant County PUD's security team was unaware of any other electric utility companies that used drones for emergency response augmentation. The Grant County Sheriff's Department had been using drones for investigations for about six months, and the PUD was able to turn to it for licensing advice later in the process, but first had to outline a program—and get buy-in.</p><p>"We were concerned about the optics that the security department is buying toys—other departments could complain because some of the things we do in security are cool and there's some jealousy," Hainer explains. "There were also concerns about wasting money. We talked with our boss and agreed we'd create strict usage policies, as well as safety and security standards, and went ahead with our budget to buy three hobby-level drones as a test."</p><p>While the potential for drones seems endless, Phelps stresses the importance of fully understanding their capabilities and limits to explain possibilities to those granting approval without making unrealistic promises. And while the drones were primarily going to be used for security operations, PUD wanted to share the wealth with other critical infrastructure departments in the county.</p><p>"Establishing that firm understanding of the drones' capability helped us go to other departments that have needs," Phelps explains. "We wanted to see how the line department could use it, how the dam could use it, so we went to their leadership and said that we have this tool and we want to share it. It eliminated those internal optics by showing that this is a tool for business and we'd like to help you solve problems. That went a long way to get buy-in from the whole organization."</p><p>As part of a demonstration, the PUD team worked with the county's dam department to conduct an assessment of an embankment via drone. What would normally take three or four hours and involve exposing workers to dangerous conditions took seven minutes and captured clear 4K video that allowed for easy assessment. ​</p><h4>Regulations and Beyond</h4><p>Before the PUD could begin deploying its drones regularly, it had to meet several criteria imposed by the U.S. government. Unlike individual hobbyists, organizations or public entities have to apply for commercial exemptions through the FAA. Additionally, PUD wanted the ability to fly the drones out of its line of sight and at night, which also required waivers. Another challenge was determining who was going to fly the drones—all operators must be certified by the FAA, which could be time consuming and would reduce the pool of people who could use the technology. "It's a big problem for some guards with no clue about airplanes and passing that test," Hainer notes.</p><p>After consulting with the Grant County Sheriff's Department, Hainer—who has previously held a private pilot's license—began the process to become FAA certified as the pilot in command for the team, allowing him to conduct flights and train others. PUD is still waiting on another FAA certificate that would allow the team to certify its own pilots. </p><p>During the extensive certifications process, another unforeseen challenge came up—the PUD contract security officers who typically respond to emergencies filed a grievance through their union that the drone program would take their work away. To address this issue, the PUD security team agreed that, in addition to Hainer, about 14 contract guards would be trained to operate the drones. "There's a great chance that they are going to need the drones more often than one of us internally," Hainer notes.</p><p>Weber detailed the team's efforts to assure executives that the program wouldn't be misused—one of the drones' greatest use cases might be one of its greatest challenges. One of PUD's key patrol zones is the land along either side of the Columbia River—a 50-mile stretch with only one public crossing.</p><p>"Murphy's Law tends to hold true in that patrol zone with reported incidents inordinately happening on the opposite side of the river from our patrol officer, making one or two miles away a 30-plus minute response time by vehicle," Weber notes. Responding to a call with a drone would allow security to gain situational awareness within 10 minutes and understand what kind of additional response might be needed. "Do we need to go and pick up trash or is it a violent felony?" he says.</p><p>However, one executive raised concerns about using the drones along the river during the high-volume summer months when they are most needed—what happens if a security officer decides to use a drone to follow around a boatful of teenage girls in bikinis?</p><p>"That's a valid concern," Hainer says. "There will be strict requirements for what kind of event would launch the drone, the creation of a flight plan, coordinating with Security Operations Center—especially near critical infrastructure. Every flight is going to have a lot of paperwork to make sure it's never misused." </p><p>PUD agreed to tightly restrict usage to situations where the drone would be significantly more efficient or keep personnel out of harm's way, Weber says. When a call comes in to the Security Operations Center, officials would need to document justification and a flight plan before dispatching a drone, as well as notify utilities if the flight path is within 400 meters of a power plant, transmission line, or substation. "These controls provide reasonable assurance to our senior leadership that the drones will only be operated by trained personnel and have a documented business purpose for each flight," Weber notes.</p><p>While the drone emergency response program is still in the early stages—PUD is waiting on the rest of the FAA certifications and waivers, and Hainer is training the guards on drone operation—the team has already begun to conduct safety assessments for itself and other departments, such as the dam assessment. </p><p>"Right now, we're using imagery via Google Earth for threat assessments and there's a lag on what's accurate—a couple areas don't have up-to-date imagery, and some others are low quality," Hainer notes. "We'd be launching the drone, using a program that compiles the aerial imagery for use in response plans and threat assessments, and it's much more accurate and higher quality."</p><p>Weber says that the team is most excited about the reduced response time and potential to keep security personnel safe, but the drone program will have more practical uses too. PUD plans on using drones to keep tabs on remote substations and transmission lines, instead of relying on costly cameras or roving vehicle surveillance. Phelps points out that drones can also be used to make sure that the sites remain compliant. </p><p>"We're one of the first groups in the electric industry to do this, and there's no roadmap," Weber says. "The sheriff's department has been a great help because they're six months ahead of us with their program, and our risk department that is in charge of insurance is comfortable with it because of all the benefits."</p><p>The team says it is pleased that the program will be launched in time for the busy summer months along the river, and staff members are looking forward to discovering what other applications drones have for both security and critical infrastructure.</p><p>"The limitations will be set not by the FAA, but by imagination," Hainer says. "Drones will provide a lot more opportunity than threat." </p>

Legal Issues Flight 2018 Legal Report Balk on Bud 2018 SM Online 2018 SM Online 2018 Legal Report Resources the Wheel: Stopping Distracted Driving 2018 Legal Report Review: Tradecraft Primer 2018 SM Online 2018 Legal Report Resources & Neutral in the Workplace 2018 Legal Report 2018 SM Online 2018 Legal Report Resources Review: Online Records 2018 Legal Report in China with Good Intentions

 You May Also Like... Online January 2018<h4>​SCHOOL SAFETY</h4><p>Campus security nonprofit <a href="" target="_blank">Safe Havens International </a>offers free school safety resources on its website that can be used in K-12 schools as well as for higher learning institutions. Documents include a <a href="" target="_blank">safety plan evaluation tool</a>, a building design checklist, and a sample background investigation booklet for the hiring process. Safe Havens International works with schools on national and international levels in planning, coordinating, and evaluating a wide range of school crisis simulations.</p><h4>​BIODEFENSE</h4><p>Despite a call for a united biodefense approach, U.S. federal agencies continue to face challenges in sharing threat information, according to <a href="" target="_blank">a GAO report​</a>. A <a href="" target="_blank">2016 panel on biodefense</a> contends that the U.S. vice president should lead the nation’s biodefense efforts.</p><h4>CYBER STRATEGY</h4><p>Despite awareness of cyber risks, many companies remain unprepared to deal with them, according to PricewaterhouseCoopers’ <a href="" target="_blank">The Global State of Information Security Survey 2018.​</a></p><h4>CRISIS COMMUNICATIONS</h4><p>SmartRiskSolutions GmbH <a href="" target="_blank">published a handbook​</a> with advice for crisis management and crisis communications during a terrorist attack or active shooter incident. </p><h4>ASIS ACCOLADES</h4><p>Attendees at the ASIS 2017 voted the Pelco by Schneider Electric VideoXpert Professional Video Management System an ASIS Accolades People’s Choice Award winner. The Judges Choice awardee was the intelligent security robot from Cobalt Robotics. <a href="" target="_blank">Read about all the winners.​</a></p><h4>WHISTLEBLOWING REWARDS</h4><p>Financial incentives can discourage whistleblower reporting, <a href="" target="_blank">according to a new study.​​</a></p><h4>FIRE SAFETY</h4><p>The <a href="" target="_blank">2016 Fire and Life Safety Study</a> from Consulting-Specifying Engineer surveyed its subscribers on what matters to them when selecting a fire and life safety system. ​</p><h4>EMAIL</h4><p>The U.S. Department of Homeland Security <a href="" target="_blank">issued a binding directive ​</a>that requires all U.S. agencies to adopt email and Web security guards against phishing and spam.</p><h4>BOMBING CONVICTION</h4><p><a href="" target="_blank">A jury convicted</a> Ahmad Khan Rahimi on eight charges related to bombings in New York City on September 17, 2016, which injured more than 30 people and caused millions of dollars in property damage.</p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465's-New-in-Access-Control.aspxWhat's New in Access Control?<p>​Innovation in access control is quietly heating up. The industry is ready to implement innovations on a broad scale that have been just out of reach. Demand for virtual credentials is growing, facial recognition technology is both technically and economically feasible, and migration to the cloud is increasing—and increasingly beneficial. Over the next few years, market adoption of these advances will transform the ways security professionals operate and organizations benefit from their access control systems. </p><p><strong>Virtual credentials and mobile access technology</strong></p><p>The demand for virtual credentials and mobile access is intensifying, driven in part by younger members of the workforce who never go anywhere without their smartphones. Suffice to say, most employees wouldn't turn their cars around for a forgotten physical credential, but they'll certainly restart their commutes to collect forgotten smartphones. </p><p>The benefits are simple: convenience, compliance, and satisfaction of workforce demand. Everyone carries their phone, security professionals enhance their management capabilities, and employees can stay on the move. By including the credential in a mobile device, embedded in an app, organizations can also provide novel security capabilities, such as threat reporting and virtual photo ID. </p><p>The good news is that virtual credentials and mobile access technology have progressed to the point that they are easier to implement. Migration is straightforward, and implementation does not need to be all-or-nothing. Instead it can be taken in phases leading to an interim hybrid approach that includes physical and virtual credentials. </p><p><strong>Facial recognition</strong></p><p>Facial recognition offers the advantage of using existing access control rules, while reducing the friction of the user experience. </p><p>Picture a busy New York City high-rise office building with turnstiles that control access to an elevator lobby. There are always a few employees who have to search their pockets or backpacks to fish out a physical credential. Implementing facial recognition eliminates that bottleneck. The software scans people as they approach the turnstile and transmits a virtual credential to the access control system. Where a line might otherwise have formed, authorized employees now pass through turnstiles efficiently. </p><p>Facial recognition access control is no longer out of reach. Today's computing power can be combined with increasingly high-definition cameras and advanced recognition algorithms to bring the costs of implementation way down. </p><p><strong>Access control in the cloud</strong></p><p>The access control server is the nerve center of an access control system, but it no longer needs to physically exist. The increasing prevalence of the cloud eliminates that necessity. </p><p>Rather than dealing with the maintenance of a physical server, the speed and convenience of the cloud can handle everything a hardware box used to. This advance allows for increased scalability. And it provides flexibility in how security professionals purchase and use access control servers. Now the integrator or manufacturer can reduce end user burden and cost by ensuring that systems are backed up and updated remotely.<strong> </strong></p><p><strong>What's next?</strong></p><p><strong></strong>Innovations in access control systems will drive the industry over the coming years. Novel credentials, such as mobile access and face recognition technology, combined with cloud-based servers will deliver an altogether improved experience. </p><p><em>John L. Moss is CEO of S2 Security.</em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465