Security Technology Executive

NOV-DEC 2015

Issue link: https://securitytechnologyexecutive.epubxp.com/i/618378

Contents of this Issue

Navigation

Page 18 of 67

November/December 2015 • SECURITY TECHNOLOGY EXECUTIVE 19 www.SecurityInfoWatch.com interoperability issues that exist today. Agencies go to great lengths to secure their systems. This secu- rity protects content, but creates a barrier to inter- agency sharing. Firewalls, proprietary networks and other technical challenges limit the ability to share data effectively. Because the data is broadcast securely over a sin- gle TV channel, controlling who has access is simply a matter of allowing or not allowing decryption of the received content. This enables multiple agencies to use the system concurrently and send data only to recipients within their agency by targeting just those specific receiv- ers. However, with proper creden- tials and access, receivers in other jurisdictions can also be targeted, improving interoperability without adding any other infrastructure or compromising security. Access can be modified at any time allowing for changing situations. The model that was used in this pilot was that the owner of the con- tent decides with whom they want to share their information. Because it is a push model, the content owner can push it to their own users with the option to include other agen- cies. They can just as easily revoke permission as needed, maintaining control of their content. Partnering with a television sta- tion like KUHT may seem obvious in hindsight, but looking outside the box for public-private partnerships to solve the growing need to deliver video and other data is innovative. Combining commercial off the shelf (COTS) tools with proprietary sys- tems to create hybrid solutions that are uniquely adapted to specific tasks is innovative and will lead to creative problem solving in the future if it is adopted. Datacast Technology Overview Da t a c a s t i n g t e c h n o l o g y t a k e s advanta ge of the unused d ata capacity in existing over-the-air broadcast television signals to encode and transmit additional proprietary data unrelated to deliv- ering enter tainment content to television sets. Secure law enforce- ment and public safety data is one example, but consumer content including movies, alerts, map data and more can also be incorporated. Null packets are used to pad the total bitstream to the required 19.39 Mb/s (cross hatch shown in figure 1). Datacasting replaces the null packets with encrypted IP packets which are then received and interpreted by registered recipients with the required devices and software In general, the datacasting system is configured Superior Detection. All the Time. • Reduce false alarms with more reliable motion detection • Most affordable intrusion detection and video alarm verification system • Easy integration – PoE/12VDC, IP/ MPX(HDCVI)/analog, ONVIF T H E R M A L M I N I - B U L L E T C A M E R A The most accurate motion detection camera available. Find out more at w w w.flir.com/ste Images shown are for illustrative purposes only, and may not have been taken by the camera depicted. ©2015 FLIR Systems, Inc. Request information: www.SecurityInfoWatch.com/10213696

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - NOV-DEC 2015