Security Expo Showcases Latest in Terror Prevention Gear
The International Security Conference East included such exotic fare as synthetic fabric designed to contain explosions, as well as more mundane alarms, home security systems, and surveillance products
John Crawford lifted a gray swatch of rubber mesh, a gold swatch of woven metal, and a yellow swatch of synthetic fabric. He held them up near images of explosives ripping through buildings. The materials, he said, represent some of the latest technology tools in terror prevention.
Crawford showed how the thin sheets can be anchored over windows and concrete to confine shattering glass and fractured concrete. Using computerized models and demonstrations in the desert, his company analyzes the force of explosions and shows how to improve bomb resistance in buildings.
Karagozian & Case has 20 employees, but its clients include the military, the Federal Aviation Administration, Los Alamos National Laboratory, the Pentagon and the U.S. Department of State. While Crawford's display looked simple compared to other high-tech gadgets at the International Security Conference East in New York City Wednesday, it was one of many aimed at fighting terrorism.
Alarms, home security systems and surveillance products were among the most commonly-featured products, but many of the 350 registered companies at the Jacob Javits Convention Center expo focused on anti-terror applications.
Adrian Gill, an electrical engineer for New York City's Department of Environmental Protection, said he was seeking security improvements for the department, which protects the city's water supply.
Fabio Teti, of Nascent Technology LLC in Charlotte, N.C., examined radiation detectors at Canberra's booth.
Nascent provides technology solutions - including automated gate systems, terminal operating systems, integration services, data collections, and solutions for yard management, inventory, and inspection – for the transportation industry.
Meridian, Conn.-based Canberra offers panels that scan pedestrians, trucks and cargo for radiation. They also provide locks that warn when a container has been breached.
The DataSeal System includes the portable, electronic, Hi-G DataSeal, which contains a transmitter and receiver, a time-stamping clock, a processor, memory and sensing circuitry. The seal can log 55 events. It comes with a handheld data terminal and a data reader.
The data terminal is encrypted and includes an option for a 13.5 MHz reader for identifying badges of cargo handlers. The information can be downloaded to a PC through an RS-232 connection. The data readers can communicate with several seals simultaneously. Users can choose modems for satellite, mobile phone or two-way radio communications.
Teti said Nascent has provided screening for several seaports and is working on ways to improve radiation detection from sea to land. It's also focused on identifying people handling cargo and keeping sites secure
"After 911, we to identify who the driver is when they drive through portals," he said. "When we put these up, we're preventing someone from coming in by land."
No deals were struck, but Teti and Mike Beal, of Canberra exchanged cards before Teti headed off toward Iritech Inc.'s iris-scanning display.
Teti said that his company is looking at biometric access control options, but prefers fingerprint scanning for speed.
SuperCom Ltd, which rolled out its Disaster Site Management System this month, also uses biometrics.
Lawrence Shertz, chief operating officer, showed how his DynaGate system can be set up on the perimeter of a disaster site. The system features wireless identification card authorization, an SC Server, a repeater for extending wireless coverage, SmartGate Pro software and an optional biometric fingerprint reader.
Schertz has already sold Columbus, Ohio first responders on the system. He's leaving his New York City base to meet with Israeli security experts next week.
"When there's a terror event, the press and everyone is trying to get in to find out what happened," he said. "Evidence has to be collected and there's no effective means of keeping people out. You've got military, police, religious officials and people without uniforms. And, people who look like officers could be bad guys in uniform."
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.