• Home
  • Blog
  • Facebook
  • LinkedIn
  • Twitter
Menu

Peter Cavicchia

Street Address
City, State, Zip
Phone Number

Your Custom Text Here

Peter Cavicchia

  • Home
  • Blog
  • Facebook
  • LinkedIn
  • Twitter

Physical Security Plans That Mix the Human with the Hi-Tech Are Most Effective

October 1, 2024 Pete Cavicchia

While much has been made about the rise of artificial intelligence (AI), the world currently isn’t in an era where human expertise is being replaced by machines. It’s quite the opposite. Instead, the current reality is one in which machine learning and modern technology is a tool that augments human input.

In a new article for Security Magazine, Tomy Han writes about how the best physical security approaches involve human know-how combined with modern technology. This ranges from traditional, common sense approaches like effective tech training and security cameras to partnering human security experts with AI tech and advanced tools like drones.

Here’s an outline of some of the key contemporary technologies that today’s physical security experts and staff have at their disposal:

  • Guards with body cams: Citing a tool used by modern law enforcement, Han describes high-definition body cameras worn by security guards as an important tool that should be implemented on any business’s campus, at a retail store, or a school. Beyond leveraging data and footage captured by advanced video and audio recordings, there are other benefits. For example, the presence of a body camera visibly worn by a guard might deter potential bad actors. These cameras can also hold said guards accountable, since they that data can be reviewed if there are any accusations of potential transgressions on the job.

  • AI surveillance systems: Surveillance systems that are powered by AI that can leverage and assess vast quantities of security data in real time is the name of the game. If there is a big sporting or political event, a security team will want to have this kind of security tech. “These systems apply image recognition and computer vision to video feeds from stationary cameras…With these capabilities, lean teams can focus on the highest risks and threats while leaving routine monitoring to technology,” Han writes.

  • Rise of the drones: It might have sounded like science fiction 20 years ago, but now technology like drones and robots are common security features that can be harnessed by human staff. Drones can give security staff remote views of hard-to-see points of entry and access. Thermal imaging cameras that are embedded in many drones can allow a security team to remotely assess any potential threats.

  • Remote access control: Cloud-connected systems have made way for remote monitoring and access control of physical infrastructure systems that can be used by security staff who are stationed anywhere. This offers more convenience and improved vigilance, especially during off hours when a building or campus might be largely empty and left vulnerable.

These are just a few of the modern tech tools at a security staff’s disposal. All of them require human input and expertise. Human capabilities aren’t being replaced — instead, they’re being enhanced.

For more examples, check out Han’s full article.

Tags Tomy Han, AI

A Template for Education: Pennsylvania Invests in Robust School Security Measures

September 24, 2024 Pete Cavicchia

A season marked by family vacations and trips to the beach has given way to backpacks and a return to the classroom. Now, enduring concerns over the safety and well-being of students and school staff alike are at the forefront of American physical security concerns.

U.S.-based nonprofit Sandy Hook Promise reports that, each day, 12 children will die from gun violence in the country, with another 32 shot and injured. They add that since the 1999 Columbine High School shooting, a horrifically high number of students — over 338,000 —nationwide have experienced some form of gun violence while in school.

These bleak statistics put security front and center in the minds of administrators and school security personnel across the country. The National Institute of Justice reveals that almost 100% of all schools that serve students 12 to 18 years old “use at least one safety and security measure” on campus. They report that more than 90% of schools have safety protocols like visitor sign-in procedures and nearly 80% possess security cameras and locked doors as essential safety requirements.

One issue that plagues some school systems — especially those that have been historically underfunded — is the reality that not every building is outfitted with the proper physical security systems to best address every contemporary threat.

Pennsylvania might be offering a template for a path forward. Facilities Management Advisor reports on how the Keystone State has made it possible for schools to apply for a total of $120 million in grant support to better bolster both physical security and “behavioral health support. This was made possible by way of the state’s School Safety and Security Committee, a part of the Pennsylvania Commission on Crime and Delinquency (PCCD).

The grant funding falls under the auspices of the state’s 2024-2025 budget.

“Our kids can’t focus on learning if we aren’t meeting the basic need for safety within the walls of their schools and making sure students are in a positive mental and emotional space,” said Pennsylvania Lieutenant Governor Austin Davis, chair of PCCD and the School Safety and Security Committee, in a quote reported by Facilities Management Advisor.

This kind of commitment to physical security across the state’s schools stands as something of a beacon for others across the country to better prioritize upgrades, improvements, and training throughout campuses nationwide. This is absolutely crucial in order to better address threats students, teachers, and staff face daily. If more states follow suit, the nation’s schools can better stand as beacons of safety and security.

Tags Sandy Hook Promise, Gun Violence

Home Invasions and Attacks Reveal That Crypto Security is Physical — Not Just Cyber

August 22, 2024 Pete Cavicchia

Crypto is more than just a buzzword. Cryptocurrency ownership saw a 10 percent growth last year in the United States, according to Security.org. With that increased adoption of digital currency like Bitcoin comes understandable cybersecurity concerns. Outside of pressing cyber threats, experts are pointing to a concerning, growing wave of physical security attacks and threats targeting crypto owners.

In a recent piece for CryptoSlate, reporter and editor Liam 'Akiba' Wright sheds light on kidnapping and home invasions that have targeted those who possess crypto wealth. The events have underscored just how crucial it is that those who own and invest in crypto need to also keep their physical safety and security front and center. Even when discussing a very digital, modern asset like cryptocurrency, physical security has to be prioritized.

In the article, Wright highlights the February arrest of five Russian men in Phuket, Thailand who abducted a couple from Belarus. The kidnappers forced the couple to transfer what equates to a little over $901,000 in cryptocurrency as the terms of their release. Additionally, Wright discusses another incident — this one in Hong Kong — that saw two women arrested for allegedly kidnapping a little boy in exchange for HK$5 million in cryptocurrency.

Another example closer to home saw a United States-based gang convicted of carrying out a string of home invasions that directly targeted people who were crypto owners.

“Crypto holders are advised to enhance their security practices, including using multi-signature wallets, maintaining operational security, and limiting the disclosure of their digital asset holdings. The recent spate of violent incidents serves as a stark reminder of the physical risks associated with digital wealth, prompting a reevaluation of security protocols in the digital age,” Wright reports.

He added that those who have substantial crypto holdings should be absolutely vigilant about what they share online about their wealth and investments and physical location.

A tried and true security recommendation when it comes to social media in general: do not share real-time updates about one’s location or describe personal financial information on publicly accessible social media accounts.

“Further, many hardware wallets allow users to use separate pins to unlock different wallets. Setting up a honeytrap wallet containing negligible digital assets could enable victims to comply with attackers without relinquishing the majority of their holdings,” Wright adds.

Cryptocurrency will only continue to grow in popularity. As more people accrue significant crypto holdings, they have to be cognizant of the fact that this digital-based wealth can bring with it physical security risks and threats. Be mindful of the fact that these risks are not that different from those faced by people who have more traditional financial assets.

Tags CryptoSlate, Lian Akiba Wright

In an AI-Dominated World, Human Input is Still Essential for Physical Security

August 15, 2024 Pete Cavicchia

Right now, almost no industry can avoid the ever-present dominance of artificial intelligence (AI). This couldn’t be more true than physical security, a field where advanced cloud-connected, access control systems are increasingly embracing the future and looking to AI.

While, yes, this technology-forward approach is necessary, experts say the true beating heart of the physical security world is that of human input and expertise. One needs people who are trained in how best to implement physical security strategies and leverage new technologies in order to keep companies, their associated brands and data, and their staff and visitors safe and secure.  

In a recent piece for Security Magazine, Scott Solomon, the CEO of Operational Security Solutions, describes how both the physical security and the cash-in-transit — or the physical transportation of cash from one place to another — are sectors that rely on new technological innovations but that also wouldn’t function without human control. As Solomon writes, with proper security protocols in these two fields, “human judgment isn’t just a component, it’s the anchor.”

For just one example, armed personnel and highly trained security staff who can respond to real-time threats and disturbances represent a level of keen observation and intuition that “AI cannot yet replicate.”

“Unlike AI, which operates virtually on predefined algorithms and data, or binary ‘black & white’ terms, humans can interpret subtle environmental cues and navigate complex social dynamics to de-escalate potentially harmful situations,” he explains. “The ultimate responsibility in the security industry is carried by human real-time decision making.”

One of the elements that differentiates human response from that of machines the most is adaptability. Solomon writes that AI can clearly process large quantities of data at a scale that would be impossible for human beings to attempt. That being said, tech “lacks the intuitive grasp of human unpredictability … [security professionals] undergo rigorous continuous training to remain adept at facing new challenges in their environment.”

This further underscores one of the most constant maxims in security — training is key. A business will never be adequately protected without robust training of security staff.

None of this means it’s time to de-emphasize how important AI is. It’s unavoidable. Any firm that fails to implement AI will fall behind. The security of the company as a whole will be compromised if current technologies are discarded. Instead, the way of the future is physical security that reflects AI complementing human beings.

“As technology advances, the challenge will be to integrate AI in ways that complement and amplify human strengths, rather than diminish them,” Solomon asserts in the conclusion to his piece.

For the full article, head to the link here.

Tags Scott Solomon, Operational Security Solutions

Company Reveals Guidance for How to Use AI Responsibly in Physical Security

July 19, 2024 Pete Cavicchia

While much has been made about how AI can bolster physical security, concerns remain over privacy and data safety. As the AI boom churns on, the world will most likely face a new era of tech regulations and policies enacted to safeguard the public from AI tech that could be misused by bad actors. 

It’s also the time for private companies to reckon with how they can best make use of this ever-evolving technology. Security Sales & Integration recently reported on new guidelines for how companies can best use AI from professional security solutions provider i-PRO CO., Ltd. 

“Recognizing the profound impact of AI on society, i-PRO has always placed paramount importance on fostering an environment of responsible and ethical AI usage,” reports Security Sales & Integration of the i-PRO announcement. 

The tech company released its Ethical Tech Principles for AI as a guiding light for itself but also something of a blueprint for industry peers as AI continues to be integrated seamlessly in day-to-day practices. 

Here’s a look at i-PRO’s recommendations: 

  • Making society safer and more secure: While it’s important that new and ever more advanced AI tools are developed, they have to be created with their impact on society — and safety — in mind. After a new AI product is released, i-Pro writes that “we continue to evaluate their impact on our customers’ lifestyle, society, and the environment, and continue to reflect the results of such evaluations in our products and services.” 

  • Enshrine human dignity: Throughout history, the tech innovations that flourished never lost sight of the humanity of those who used it. Think of car safety protocols for automobiles. For i-PRO, “AI is based on the premise that people are central, and that AI should be used, developed, and deployed, to expand human capabilities and promote the pursuit of happiness.” 

  • Be transparent: Transparency is always central when it comes to rolling out new tech. The company writes that any new AI product has to “strive to eliminate discrimination and unfair influences.” This means aspects of one’s identity like gender, religion, or race should always be considered, respected, and protected. The company said they will “consider social justice” when using and developing AI tools, providing “appropriate information to our customers” about how this information will be used. 

  • Privacy is key: AI tech being used for physical security must focus on privacy. This means having top-of-line security measures in place that are in line with legal regulations, company policies, and make sure an individual's personal data is secure. 

  • Train the team: Everyone on a team must be trained. This involves provider, operator, and customer. This can apply to a number of fields but is especially important for individuals in the physical security sector. If the entire team — not just managers — isn’t well versed in how to operate AI-driven tech and how it integrates with existing tools, there is no way that a company’s security will be ensured. 

  • Cooperation and collaboration: There are so many stakeholders involved when it comes to security and any time a new AI tool is implemented, it means that conversations must be had where those invested in a company’s success have a say about how tech is used. If there is feedback or concerns about a new AI program or device, listen to the stakeholders and consider their advice. 

“As the physical security industry continues to embrace the promise of AI, we look forward to working together with our industry colleagues, partners, and customers to foster a culture of responsible AI development and usage,” Masato Nakao, CEO at i-PRO, said in the company announcement, as reported by Security Sales & Integration.

It’s a brave new world of AI technology, and for physical security professionals, safeguards must be put in place to use it ethically and safely. 

Tags AI, i-PRO

How a Revamp of London’s Heathrow Airport Points to Future of Airport Security

July 18, 2024 Pete Cavicchia

Routinely, whenever top physical security priorities are mentioned, airports number at the top of the list of major concerns. Over the past two decades, the post-9/11 world has emphasized innovations in security protocols for major airports — this includes everything from shifting protocols for how people are screened before going on a flight to shoring up safety once aboard. 

Now, a leading security tech provider is partnering with London’s Heathrow Airport — the busiest airport in Europe — to pave the way for a future of security innovations to keep the leading transportation hub’s passengers safe.

A piece for SecurityInformed.com, outlines how Genetec Inc. is launching a multi-year initiative with the airport to offer Heathrow a “unified view across large-scale airport operations to secure people and assets.” This is all being done while “bringing efficiency and enhancing the passenger experience while ensuring data privacy and cybersecurity compliance,” reads the article.

One of the big pieces of this robust security program is Genetec’s Security Center, which will strengthen the airport’s ability to manage the roughly 14 million tons of goods and 80 million people who pass through its doors and onto its planes each year. Additionally, the article states that 76,000 people work at the airport each day. Genetec’s security hub will help Heathrow manage all these disparate moving parts to ensure that not only operations run smoothly but also respond to the multi-factor threats the airport faces every day.

“Heathrow initially deployed Genetec Security Center to bring all its IP security systems on to one unified platform. What began as a 2,000-camera deployment in 2016 has since more than quadrupled in size, incorporating everything from video and access control to LIDAR, analytics, automatic license plate recognition (ALPR), and more,” the article states.

Danny Long, IT Product Owner for physical security products at Heathrow, told SecurityInformed that “we’re essentially running a small city operation that happens to be called Heathrow.” He states that the massive airport is responsible for keeping tabs on its retail space, surrounding roads, a bus terminal, three train stations, offices, a church, a high-voltage electrical network, and fuel stores in addition to monitoring internal and external threats.

Part of Genetec’s capabilities include tools to monitor passenger flow and provide real-time notifications “when security lines grow too long,” according to the article.

The partnership between Heathrow and Genetec is in many ways a test case for other major airports and transit stations. Travel security means more than just metal detectors and passenger background checks today. For locations as complex and sprawling as Heathrow, security stakeholders must make use of every modern tool at their disposal. This could entail private partnerships with entities like Genetec, as well as beefing up existing systems so that they don’t get out of date.

The security and safety of the world’s travelers depends on it.
For the full article, head to the link here.

Read more
Tags Heathrow, Genetec

Why Companies Need to Zero in on Employee-Tied Threats

July 12, 2024 Pete Cavicchia

Often, external physical security threats are the focal point when news comes out about physical security threats facing modern companies. The focus is often on active shooters, for instance. 

In a recent article for Security Magazine, Alan Saquella writes about a range of employee-specific threats that often go under the radar but cause legitimate day-to-day problems for many companies. Disgruntled former employees — whether laid off or fired on bad terms — pose a range of threats from physical violence to vandalism of a company’s office complex. 

A broad range of threats

“The prevalence of non-violent acts perpetrated by former employees is often underreported and underestimated, yet their impact can be just as devastating, if not more so, both financially and in terms of public safety,” Saquella writes. “For example, consider the case of a terminated telecommunications employee who sabotaged a fiber trunk line, resulting in a catastrophic communications outage that not only incurred millions of dollars in damages and fines but tragically led to the loss of a life due to the inability to reach emergency services. Similarly, deliberate tampering with natural gas distribution lines by a former employee of a gas company led to unsafe conditions and significant financial losses.”

In addressing this very broad range of rather complex, employee-specific security threats, Saquella explains that a holistic approach must be embraced — there isn’t a one-size-fits all way to handle these kinds of threats. Key among them is fostering a supportive and positive workplace environment in the first place mitigating any potential for future employee-directed violence.

 Some concrete solutions 

Saquella points to “post-termination monitoring” as one key component to making sure these kinds of retaliatory ex-employee threats don’t escalate further. This refers to discreetly monitoring former employees who might exhibit “red flag behaviors” on social media, for one example. 

Beyond this, he points to “robust softeners” like generous severance packages, continuation of benefits, and available counseling services to prevent resentments from forming. It’s better to end an employer-employee relationship positively — even if the staffer in question was far from ideal — than create a situation that can spiral out of control. 

As with any physical security threat, vigilance is key. 

“By adopting a proactive and comprehensive approach to addressing workplace violence, organizations can better safeguard their employees, assets and reputation. Collaboration between security, human resources and leadership is essential in identifying, assessing and mitigating potential threats at every stage of the employment lifecycle. From pre-termination assessments to post-termination monitoring, it’s imperative to remain vigilant and responsive to evolving risks,” he concludes. 

For more of Saquella’s recommendations, check out the full article here. 

Tags Alan Saquella, Security Magazine

Tips for Bolstering Physical Security in Corporate Spaces

July 7, 2024 Pete Cavicchia

Having a clear physical security strategy is crucial for any corporation in today’s environment. Threats from a range of bad actors endanger modern businesses. By being physical security-compliant, companies can minimize risk and bolster success.

In a new piece for SecurityInfowatch.com, two industry leaders — Cathal J. Walsh, VP and CSO at Guidepost Solutions, and John Bekisz, associate VP of physical security at Guidepost Solutions — outline best practices for how companies can mitigate physical security risks in their corporate spaces, like branch offices and headquarters. The two security executives point out that “security lapses in regulated industries can have severe consequences.” If security isn’t shored up, it can radiate out to impact the company and its clients and customers at large. This means robust security practices must be embraced from the executive level all the way down to staff on the ground.

“Amidst the myriad tools available to evaluate threats and risks, it's empowering to know that contemporary security risk management practices have evolved. These practices now emphasize proactive measures, including coordinating with internal and external parties to ensure a compliant risk-based solution is deployed and regularly maintained,” they write. "This enhanced approach to risk management bolsters our ability to stay ahead of potential threats, giving us a sense of control in an otherwise unpredictable environment.”

Walsh and Bekisz explain that security systems have to be centralized. Large-scale video surveillance camera systems need to be centrally connected, which means that remote access and cloud computing systems should be put in place. Disconnected, scattered technologies that fail to have any cohesion can result in major vulnerabilities and blind spots.

A major component of a unified approach involves staff training. At all levels of a given corporation, proper security protocols have to be hammered home. Staff at one facility can’t be familiar with one element of a corporation’s security approach that varies from the expertise of staff at another location.

“Although there is no prescriptive solution to mitigate all forms of physical security risks in the corporate environment, a security program can be deployed in alignment with the organization’s risk appetite with adequate planning. A layered approach starting at the perimeter and moving inward, incorporating a defense-in-depth strategy with various detection zones, aids the organization in its risk reduction efforts,” Bekisz and Walsh conclude. “Referencing industry-accepted frameworks anchored in asset protection principles, including operational, technology, and physical security elements, guides the practitioner to ensure a comprehensive program is incorporated into the design.”

Read the full article — which includes use case examples — here.

Tags SecurityInfoWatch, Cathal J. Walsh, John Bekisz
← Newer Posts Older Posts →