Airport security is the responsibility of not only the airport itself but also all the agencies responsible for national security protection: from the police to the customs authorities ... Each such authority has its own system and its own database. These resources should be distributed among all the security services: airport operators, airlines, immigration authorities, police, customs and national intelligence service. The distribution of intelligence information and mutual cooperation are the most powerful tools against the criminal underworld, and these things do not require large investments and much time.
High-tech industry today offers new faster ways to identify criminal intents through controlling the archive and operational data while combining multiple information streams to significantly improve the reliability of intelligence information. In simple terms, the result will be an optimized decision-making processes for all concerned parties. The latest information should be made available to the airports, security agencies, government and other bodies without delay.
We made provision for the centralized system to integrate airport security requirements that is connected to all required subsystems and encompasses high-tech alarm management system. Usually, such integration includes intelligent video surveillance, detection systems, perimeter monitoring, building management, vehicle control, tracking of passengers in terminals and biometric access control. We also provide a number of intelligent processes which will help to provide greater volume and better quality of intelligence information for the security officers. That is what forms the basis of the “Smart System”.
EXAMPLE: A MORNING IN THE LIFE OF THE AIRPORT OF THE FUTURE
“Today is Monday, 8:00 am. Security Control Center. Call for action! The dog is trying to make a passage in the fence. The agent receives an automatic notification from the real-time video from the scene, and recommendations for ultrasound activation to chase the dog away. The agent presses the proposed action button, and sees the dog is running away.
The clock shows 8:05 am. Airside Access Point. Officer Philip is trying to pass through the access control point but the system automatically detects that although Philip is an airport employee he has the day off today. Security checkpoint agent receives notification and calls Philip to clarify the reasons for his presence: Philip forgot his tools last night and wants to take them. This can be absolutely legitimate. But at that moment the agent is notified to detain him for suspicious behavior. Indeed, during last 6 months, Philip accessed the airside at the time when there was a landing of the flight from the country known for its drug trade.”
Here is an example of how an integrated approach can help the agents to better focus on real threats!