Innovation: Drones. The Guardian Angels of Critical Infrastructure

By David Strickland, Vice President of Kenton Brothers

Kenton Brothers is celebrating 125 years in business this year, and over those decades we’ve seen our share of innovative technology. KB was around for the first cars, motorized bikes, airplanes, rockets, robots and now security drones. As you may have read before, we believe strongly in the premise “Innovate or die”.

We get excited when technology innovates to solve a problem.

Drones for Commercial SecurityCritical infrastructure protection has become a paramount concern for the US government and private organizations alike. From power plants to transportation hubs, food manufacturing to water and waste facilities… these sites are critical to a properly functioning society.  Their importance makes them a prime target for a range of threats, from physical attacks to cyber-attacks. As far as commercial security goes, technology is playing a crucial role, and one such technological marvel is the drone.

Drones, once confined to hobbyists and aerial photography enthusiasts, have now emerged as powerful tools in the realm of physical security for critical infrastructure.

Terrorist organizations, criminal syndicates, and even disgruntled individuals may attempt to breach the security of critical infrastructure through physical means. These attacks can range from sabotage to theft of sensitive materials. To address these threats, security measures must be proactive, adaptable, and capable of providing real-time information. This is where drones come into play.

Guardian Angel – Aerial Surveillance

Drones offer a versatile platform for aerial surveillance. Equipped with high-definition cameras, thermal imaging, LIDAR and other advanced sensors, drones can provide a bird’s-eye view of critical infrastructure, offering security personnel unprecedented situational awareness. They can patrol vast areas efficiently and discreetly, making them ideal for spotting suspicious activities, unauthorized access, or potential vulnerabilities.

Incorporating machine learning algorithms and artificial intelligence, drones can be programmed to identify unusual behavior patterns, such as trespassing or loitering, and issue alerts in real-time. This proactive approach allows security teams to respond swiftly to potential threats before they escalate into security breaches. Unmanned aerial vehicles (UAVs) provide a rapid response and fast “eyes on” to the target area. They also provide live updates to control stations while active waypoint tracking can be maintained based on target parameters like thermal signatures.

A key advantage of a UAV is its ability to collect video.

Drones for Commercial SecurityThe video imagery captured by a UAV is ideally suited for reconnaissance or rapid situation awareness. It has the advantage for security personnel to detect and monitor potential threats from a safe distance. UAVs in perimeter security reduce the requirement for foot patrols by security guards. They provide real time situational awareness with the added perk of recording video for analysis later on.

The speed, size, maneuverability, and additional technologies make UAVs the perfect supplement to ground security. They allow security teams to perform monitoring tasks more quickly and efficiently. For this reason, drones have a competitive edge over stationary cameras, as the drone can be flown at different times and be guided to blind spots.

Another significant advantage of using drones for commercial security is their ability to provide rapid intelligence and response. In the event of an intrusion or emergency, drones can be deployed within minutes, whereas traditional security personnel may take much longer to arrive at the scene. This quick response time can be critical in preventing or minimizing damage to critical infrastructure. Additionally, upon alert a drone can cover up to 10 times the area of a vehicle response in a fraction of the time.

Drones can also access areas that may be challenging or dangerous for human responders. Scenarious include climbing steep terrain or inspecting hard-to-reach locations like the tops of tall structures. This ensures that security teams have eyes on the situation even in the most challenging circumstances.

Super Human Capabilities

Drones equipped with environmental sensors can play a vital role in safeguarding critical infrastructure from natural disasters.

By regularly monitoring factors like water levels, temperature, humidity, and seismic activity, drones can provide early warnings and data for disaster preparedness and response plans.

For instance, a drone surveying a dam can detect signs of structural weakness or unusual water flow patterns, allowing for timely maintenance or intervention to prevent a catastrophic failure.

Similarly, drones can monitor forests surrounding power lines for signs of wildfires, helping utilities take proactive measures to prevent electrical equipment from sparking fires during dry, windy conditions.

Routine inspections of critical infrastructure are essential to ensure their continued operation and safety. Traditionally, these inspections have been carried out by human inspectors, often requiring extensive downtime and posing safety risks. Drones can revolutionize this process. Equipped with high-resolution cameras, infrared sensors and low frequency radar, drones can conduct detailed inspections of infrastructure such as bridges, pipelines, and power lines. They can capture images and data that are difficult or impossible for human inspectors to obtain.

As critical infrastructure continues to be a prime target for a wide range of threats, the adoption of drone technology for physical security is becoming increasingly important.

Drones offer a unique set of capabilities, including aerial surveillance, rapid response, environmental monitoring, infrastructure inspection, and scalability.  Like we mentioned, our team at Kenton Brothers Systems for Security gets excited when technology innovates to solve a problem. In this case, drones and critical infrastructure are a match made in heaven and we couldn’t be more excited!

If you are thinking about ways to help secure your critical infrastructure location and would like to explore the use of drones, please let us know and we will set up a demo with you!

Video: Planning and Implementing Elevator Security

By Erik Andress, Sales Management Professional at Kenton Brothers

In today’s video we’re discussing elevators. In particular, how to secure them with cameras and access control. Elevators can be tricky… They require a lot of planning and coordination with the elevator company. We’ll get into some of those details today and what you need to know!

Step one is by far the most important stage and that’s planning.

Securing an elevator requires collaboration between the elevator company the security integrator as well as the client. The client lets the security innovator know how they want the elevator to function and behave. The security integrator works with the elevator company to make that possible.

Let’s use a an example: Where do you want the card reader mounted? Is it on the outside of the elevator denying access altogether or is it on the inside of the cab denying access just to certain floors? Or both? You may want to deny access to the elevator because it’s not for the public. You may also want to deny access to certain floors because it is a secure facility.

There are details we have to understand. Is there already traveling cable in the elevator? Is there space for us to install our equipment? Where is the control panel for the elevator, and where should our control panel go for access control? It can get complicated quickly.

Step two is integration.

We work with a professional elevator technician to make sure the proper cables are in place and integrate the card reader into the elevator’s controls.

Step three is configuration.

Now that the systems are integrated, we need to make sure that we go back to the client’s expectations of how they wanted the elevator to function. We need to make sure that our configuration is lining up with exactly what they asked for.

Step four is to test and calibrate.

When you put security inside of an elevator, you’re introducing a lot of moving pieces. With access control or commercial video surveillance, we need to make sure that we spend time testing the system. We need to make sure the camera’s field of views are dialed in correctly.

The final step is training.

We need to make sure that the admins and users of the system understands exactly how the system works and how changes can be made.

If you need help securing the elevators in your company buildings, we can help. Just give us a call!

You would be surprised how differently people behave when they know they’re being watched.

By Ryan Kaullen, Field Services Manager at Kenton Brothers

In the fall of 2022, Kenton Brothers performed a video monitoring installation with a large, regional banking customer. They were having issues with how their employees were being treated verbally and sometimes physically at their tellers’ stations. The theory behind the installation was that if people can see themselves on camera and see how they are acting, then perhaps they wouldn’t act poorly. And if it worked, it would reduce these incidents in the work place and make their employees feel safer and happier.

Commercial Video Surveillance - Customer Monitors Commercial Video Surveillance - Customer Monitors

Viewing Monitors = Safer Work Places

The results of the install have been extremely positive. The results were so positive that Homeland Security has since told our customer that this should become a standard across all of their banking footprints. Not only has it stopped violence against the bank employees, it also cut back on fraud as these monitors catch different angles, angles that overhead cameras don’t capture.

Kenton Brothers has been commissioned on several more of these projects for our bank customer and moving forward they will start unrolling them at their other branches.

The video from these monitors is housed within the customer’s video management system (VMS) and can be viewed within the VMS client software. (And their existing storage and retention policies dictate how long the video will be available.

Commercial Video Surveillance - Customer Monitors Commercial Video Surveillance - Customer Monitors

What does it take to do this install?

The installation of the monitors is relatively easy. The monitors can be mounted in many different spots with various angles depending on the end goal. Typically, the install of the cable and monitors is a two day install. During that time, the individual teller stations will be non-operational for an hour or two, so the down time isn’t extensive. Of course pricing is dependent on the number of monitors and number locations.

The bottom line is that this commercial video surveillance monitoring solution captures different angles, puts people on camera and changes their behavior in positive ways. This directly affects the safety and security of the employees and the facility.

For more information, please give us a call!

Why Physical Security has to be part of the convergence discussion of OT/ICS security.

By David Strickland, Vice President of Kenton Brothers

Why Physical Security has to be part of the convergence discussion of OT/ICS security. There is a real buzz in the security world right now around securing Operational Technology (OT) and Industrial Control Systems (ICS). This buzz comes from two sources: companies and organizations that are being attacked through cyber security and physical attacks, and government agencies trying to get information broadcast to counter these threats. Threat levels have been increasing over the last few years and the cost of these attacks have risen to devastating levels.

According to CISA, in the first half of 2022 there were at least 22 reported large impact attacks on critical infrastructure leading to billions of dollars in losses. As the second half of 2022 numbers are being compiled, the sense of urgency to shore up the vulnerabilities is at an all time high.

How is OT security different than IT Cybersecurity?

IT – Information technology is just that. It is the transfer of data or information through physical appliances such as routers, switches and servers. Security for this technology centers around the prevention, detection and mitigation of attacks from software.

OT or Operational Technology is the manipulation of real world physical devices such as pumps, valves and controls through software or human interaction.  These are called Industrial Control systems. In contrast to IT cybersecurity attacks, the outcomes of successful OT / ICS  attacks include the potential to impact human safety and damage physical equipment. For example, taking any industrial processes OT / ICS equipment offline for extended time periods. This can be done through software or physical attacks known as sabotage.

Many organizations point to the Purdue Model for protecting OT and ICS. 

Why Physical Security has to be part of the convergence discussion of OT/ICS security. The Purdue model, created in the 1990’s is a comprehensive look at protecting ICS and has been the standard for many years. The Purdue Model has five zones that are considered when creating a robust security model. Yes, this model is the current standard, but in our opinion does not adequately address physical security.

Cybersecurity of IT, IIT (Industrial IT) and OT systems is still a very high priority.

A recent comprehensive report provided by the Department of Homeland Security (DHS) pointed out a few concerns. “Many organizations lack visibility into their complete OT environments, including IT/OT interconnections and supply chain dependencies. Cybersecurity is overwhelming for organizations and entities with small staffs and budgets. As a result, many are not able to achieve the cybersecurity posture required to adequately secure their IT/OT infrastructure. The majority of legacy OT equipment was never designed for internet connectivity, and may not easily be replaced, making it increasingly challenging to secure in converged environments.”

We must not make the mistake of ignoring the real probability of physical attacks on these same organizations that are overwhelmed with cybersecurity.

“A top priority must be to prevent unauthorized physical access, damage and interference to the organization’s information and information processing facilities. Essentially a key aspect of this standard is to implement effective access control and protection of systems and equipment from damage.”

Physical Security for the OT Starts here:

Policies and Procedures:

Why Physical Security has to be part of the convergence discussion of OT/ICS security.It’s a well-known fact that most breaches (95%+) are a failure of procedure or policy over systems. A good red team will tell you that their most effective weapon for entry is a poorly trained or poorly disciplined employee. Polices and procedures must be created, trained, followed and tested constantly.

Establishing your perimeter:

As with most things involving physical security, you must start with a strong perimeter. This perimeter must be extended as far as physically possible. Access should be granted to only authorized personnel that have been through proper background checks and assigned clearance based on their job function. The perimeter is your best chance at early detection, reaction and mitigation.

Access Control:

Only authorized personnel with the proper clearance and certifications should ever be allowed access to your OT systems. These authorized personnel should constantly be vetted. Many organizations don’t remove terminated employees from this list quickly. No visitors or vendors should ever be allowed access without proper vetting and escort. Your access control systems should be set up in concentric circles with stronger policy the closer you get to critical infrastructure. All access control devices should be kept in proper working order and updated with proper firmware and cyber security practices.

Alarms:

Why Physical Security has to be part of the convergence discussion of OT/ICS security.Too many times we see organizations practice poor alarm management. Alarms in any form (Fire, Access Control, Intrusion Detection, Car) should never be ignored yet many times are. OT devices are vulnerable to physical attack and to things like flooding, fire and electrical damage. A system alarm can help bring immediate attention if properly managed.

Surveillance:

Who inspects the inspector? Your IP video surveillance system. It keeps honest people honest and identifies those who are not. Critical infrastructure devices should have surveillance on the device itself and the human interaction point. This of course is on top of all perimeter entrance areas and key points throughout your property.

Knowledge and Cooperation:

The United States can leverage an existing body of knowledge to secure OT infrastructure. Prioritizing and applying these best practices, recommendations, and standards more broadly, in a comprehensive and accelerated manner, would strengthen security and achieve strategic outcomes.

Kenton Brothers Systems for Security stands by to do our part. Please let us know how we can help your organization.

Everything is Sunny in the Cloud… Maybe Even Sunnier When the Robots Take Over?

By Neal Bellamy, IT Director at Kenton Brothers

Cloud-based physical access control systems offer several advantages over on-premise access control servers.

Here are a few key reasons why this is true:

Commercial Security and Artificial Intelligence1. Scalability: Cloud-based systems can easily scale to accommodate a growing number of users and devices, without the need for expensive hardware upgrades. This makes them a cost-effective solution for businesses that are expanding or experiencing high levels of turnover.
2. Remote Management: Cloud-based systems can be managed remotely, allowing administrators to manage access control from anywhere with an internet connection. This is especially useful for businesses with multiple locations or employees who travel frequently.
3. Increased Security: Cloud-based systems are often more secure than on-premise systems because they are managed by experts who specialize in security. They also benefit from automatic software updates and backups, which can help protect against data breaches and other security threats.
4. Cost-Effective: Cloud-based systems generally require a lower upfront investment than on-premise systems, as they do not require expensive hardware or software. Additionally, they eliminate the need for costly IT staff to manage and maintain the system.
5. Flexibility: Cloud-based systems can integrate with a wide range of devices and platforms, making them more flexible than on-premise systems. This allows businesses to easily add new features and functionality as their needs evolve.

It might surprise you that the content above was written by Artificial Intelligence (AI).

Commercial Security and Artificial IntelligenceIt’s certainly not the best blog I’ve ever written, but it might not be the worst either. It’s factual, it is the top 5 reasons IT companies got to the cloud, and it has no grammatical errors. The coolest part about this content is that I asked only a single question to the AI… “Can you write a blog post on why cloud based physical access control is better than on premise access control server?”

As you can see from the question, I didn’t give much information. Yet the AI had gathered enough information to create five bullet points, use a beginning and ending paragraph and come up with valid statements. This particular AI is not specifically programmed to write blog content. It can also tell you about world events, write a Haiku in the voice of Captain Kirk, and solve math problems.

“Galaxy vast and wide
Stars that shine so bright and bold
Adventure calls forth.”

From a technological point of view, this is groundbreaking.

Computers have started to “think” for themselves. AI has been around for several years, but until now the “thinking” has been mainly contained to “What color is this object?” or “What fruit is in this video?” This is the first example I’ve seen where an artificial intelligence can take a subject and formulate a response on almost any topic based on its trained knowledge.

I can see AI launching into the commercial security world in an impactful way. While everything is “AI” right now, there is a major difference between telling a program what to look for to determine an outcome versus letting a program learn and make decisions based on past learning. I can certainly see a future where we don’t have to monitor commercial security systems for every single alert. Instead, an AI will monitor the incoming data and alert us when there is an anomaly. And we can define the rules that define an anomaly. I can see where an AI will alert us intelligently. Not that a person is in the parking lot. But the fact that there is a person in the parking lot, they have a saw, and they just disappeared under a car.

It will be interesting to see where this new AI charge leads us. I will certainly be paying attention to how AI can keep us safer while making it easier to manage commercial security systems.

If you need help designing and implementing a commercial security system to protect your people, property and possessions, please give us a call.