2009 Security Electronic Contractor Report

Transcription

2009 Security Electronic Contractor Report
An Emlen Publication
www.correctionalnews.com
SECURITY
ELECTRONICS
State of the Market
This report is published by Correctional News, the information source for the correctional construction market. Address correspondence
to: 1241 Andersen Drive, Suite N, San Rafael, CA 94901, 415-460-6185, fax: 415-460-6288, www.correctionalnews.com
2009 ANNUAL SECURITY ELECTRONICS
CONTRACTOR LIST
Company Name
Contact number
Location
Area of Expertise
Geographic
Areas Covered
Annual
Revenue
Largest Contract
Awarded
Current
Projects
Value of
Current Projects
Number of
Employees
MCS Detention
(210) 495-5245
San Antonio, TX
Integrated control systems, touch
screens PDAs
International
$40 million
$7.5 million
98
$61 million
195
South Western
Communications Inc.
(256) 351-2445
Decatur, AL
Correctional and justice systems,
integration of touch screens, graphic
panels, intercom and CCTV. Specializing
in new construction and retrofits.
United States
$37.8 million
$2.4 million
47
$24 million
48
Com-Tec Security LLC
(920) 882-8856
Appleton, WI
Custom-designed integrated security
systems.
International
$20 million
$9.6 million
30
$21.2 million
43
Sierra Detention Systems
(303) 278-6879
Golden, CO
Detention electronics, hardware, hollow
metal and installation.
United States
$19.8 million
$8.5 million
24
$14 million
65
EO Integrated Systems Inc.
(586) 752-3200
Washington, MI
Integrated electronic security systems
for new and existing detention facilities.
United States
$18.5 million
$3.5 million
72
$30.9 million
52
Norment Security GroupTrentech
(334) 281-8440
Montgomery, AL
Door controls, video visitation,
electronics integration.
International
$18 million
$10 million
40
$22 million
54
Accurate Controls Inc.
(920) 748-6603
Ripon, WI
Engineering, software development,
assembly and installation of security
automation systems using only nonproprietary systems and software.
United States
$16 million
$3.5 million
50
$22 million
57
ESI Companies Inc.
(901) 386-7340
Memphis, TN
Manufacturer and installer of CCTV
and security electronics, and
electronic systems integrator.
United States
$15 million
$20 million
40
$9 million
65
Southern Folger Detention
Equipment Co.
(210) 531-4117
San Antonio, TX
Designer, manufacturer and installer
of security systems.
International
$15 million
$2.6 million
51
$15 million
25
Engineered Control Systems (509) 483-5102
Spokane, WA
Correctional systems integrator
Western U.S.
$12 Million
$8.1 Million
32
$14 million
32
Secure Control Systems LLC (210) 530-5245
San Antonio, TX
CCTV, intercom, access control, PLC
systems and retrofits.
United States
$10 million
$6 million
8
$14 million
30
Simpson Security
Systems Inc.
(318) 443-3391
Alexandria, LA
Supplier and integrator of CCTV,
PLCs, fire safety and control systems.
Southeastern and
South Central U.S.
$10 million
$6 million
42
$9 million
65
Black Creek Integrated
Systems Corp.
(205) 949-9900
Irondale, AL
Touch screen security control systems.
United States
$8 million
$3 million
N/A
N/A
45
Status Automation,
Division of Status Electrical
Corp.
(877) 859-1892
Seattle, WA
Security Electronics integrator and
Installer
Pacific Northwest,
California, Arizona,
Nevada and Texas
$5 million
$2.5 million
7
$4 million
20
Professional Systems
Engineering LLC
(800) 839-5060
Lansdale, PA
Integration, design and commissioning
of security and detention control
hardware and systems for courts, jails
and corrections.
United States
$2 million+
$19 million
25
$50 million
20
Easter-Owens
(303) 431-0111
Arvada, CO
Security Electronics
North America and
Puerto Rico
$1.2 million
$393,919
3
$421,434
55
SafetyTech Inc.
(765) 534-4309
Lapel, IN
Fire alarms, fire suppression and
fire extinguishers.
Midwest U.S.
$500,000
$300,000
4
$800,000
20
LARGEST SEC EMPLOYERS
COMPANY NAME:
# OF EMPLOYEES
1. MCS Detention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .195
2. Sierra Detention Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
3. ESI Companies Inc. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
4. Simpson Security Systems Inc.. . . . . . . . . . . . . . . . . . . . . . . . . .65
5. Accurate Controls Inc. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57
6. Easter Owens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55
7. Norment Security Group-Trentech . . . . . . . . . . . . . . . . . . . . . . .54
8. EO Integrated Systems Inc. . . . . . . . . . . . . . . . . . . . . . . . . . . .52
9. South Western Communications Inc. . . . . . . . . . . . . . . . . . . . . .48
10. Black Creek Integrated Systems Corp. . . . . . . . . . . . . . . . . . . . .45
page 2
On the Fence
Baruch Koren Discusses Security Electronics Solutions and Trends
By Roibín Ó hÉochaidh
Baruch Koren has been involved in the
design and installation of more than 100
perimeter security and intrusion detection
systems at correctional facilities while serving as vice president at DeTekion Security
Systems Inc. He is a former member of the
Israeli Defense Forces and served seven
years with the security division of the Israeli
Foreign Office.
Koren spoke with Correctional News
via telephone about the perimeter security
market, trends and technology and issues
in the corrections market.
Q: How has the perimeter security
market changed in the past 10 to 15 years?
A: From the perspective of operational design, we’ve seen a major move
away from watchtowers, which are manpower intensive, to more flexible and less
staff-intensive electronic solutions. New
prisons and jails are far more likely to be
built with perimeter intrusion detention
systems than a string of watchtowers.
Today, when watchtowers are incorporated, they tend to be located at the
main entrance or sally port, where staff
can directly monitor facility access and
inmate movement during the day.
Staffing levels can be reduced at night
when inmates return to housing units.
The watchtower functions as a central
control station from which staff monitor and manage a perimeter security
system that combines PIDS, integrated
sur veillance and lighting systems, and
mobile patrols and response teams.
With approximately five staff, at say
$50,000 per officer per year, required to
man each tower, moving from a watchtower-based system to one that relies on
electronic solutions can generate significant annual operational savings through
lower staffing costs.
Q: How has the technology for perimeter
security changed?
A: As a result of progress on the technology side and in increased processing
power, we’ve seen the systems become
more reliable with a significant reduction
in false and nuisance alarm rates.
In the 1970s, technology was an alien
concept and most staff were reluctant to
rely on it to guarantee facility safety and
security. Today, security operations and
SEC WITH THE MOST CONTRACTS
MCS Detention
98
EO Integrated Systems Inc.
72
Southern Folger Detention Equipment Co. 51
Accurate Controls Inc.
50
South Western Communications Inc.
Simpson Security Systems Inc.
47
42
Norment Security Group-Trentech 40
ESI Companies Inc.
40
Com-Tec Security LLC
30
Professional Systems Engineering LLC
0
25
25
50
75
100
page 4
Koren
maintenance staff are more knowledgeable and comfortable with using technology. There was a definite trend toward
integrating as much technology as possible and systems got very complex. Not
every technology is the right fit for every
facility or project. In my opinion, the simplest approach is always best.
Q: What about equipment changes on
the technology side?
A: One more recent change has been
a trend toward the integration of electronic intrusion detection systems on
both the inner and outer perimeters to
enhance the detection and delay functions of the system.
Most facilities integrate a PIDS on the
primary or inner fence with the secondar y outer perimeter consisting of a
barbed or razor wire fence without any
electronic component. The inner fence
detects a breach and activates the alarm
and the outer fence acts to delay the
escape attempt.
However, the secondary perimeter
can be breached and the delay function
defeated from the outside without activating the primary perimeter’s detection and
alarm functions. Integrating electronic
intrusion detection measures on the
outer fence or between the primary and
secondary perimeters creates built-in system redundancy and inward and outward
oriented detection and delay capacity that
increases system effectiveness.
Employing different types of intrusion detection measures on the inner and
outer perimeter also reduces the probability of a breach successfully circum-
venting both perimeters without detection and delay.
Q: What’s the secret to creating the best
perimeter security system?
A: There isn’t one universal solution
for every problem. The key to creating
the best perimeter security system is
evaluating facility requirements and constraints and defining the right combination of manpower and electronics to meet
those needs.
It is imperative to assess each facility in
terms of needs and constraints. Evaluate
potential solutions and deploy a system
that is right for the facility, one that will do
what the owner wants and expects.
Q: What should a facility owner consider
when evaluating perimeter security systems?
A: Systems should fulfill the five
essential functions of perimeter security:
deterrence, detection, delay, assessment
and response. Owners need to ensure
that systems perform in each of these
areas because security staff will not have
confidence in a system that fails to deliver consistently in any of these areas. A
system that does not inspire the confidence of your staff is worthless.
Q: What other factors are important to
consider in evaluating a system?
A: The system needs to be matched
to the type of facility, the surrounding
environment, its proximity to population
centers and the general public, and the
type and security level of inmates.
Different solutions and systems are bet-
ter suited to different facility types and
security levels.
Owners also need to take account of
system compatibility, flexibility and scalability. Look out for proprietary issues and
factor the projected life cycle and maintenance and operational costs into the evaluation and decision-making process. It is
important to clearly understand and define
facility needs, evaluating the consequences
of a breach and developing a precise specification for the system, from the outset.
A clear, well-defined, detailed specification will get an owner what he wants,
but a loose specification will never meet
facility requirements.
Q: What should facility owners look at
when considering different technologies?
A: System performance is also affected by environmental conditions —
topography, grading flow of water, lines
of sight, prevailing climatic conditions
and seasonal weather patterns. Different
sensors are more or less suited to different environmental conditions.
In terms of system performance and
sensitivity, the probability of detection
and false alarm and nuisance alarm
rates pull in opposite directions. Each
sensor has its particular strengths and
weaknesses, advantages and disadvantages. From this perspective, it is
imperative that owners take the time to
do research.
Vendors often discuss system performance in terms of specified rates of
detection and false and nuisance alarms,
but such statements are founded on a
Five Essential Sensor
Technology Factors:
Topography/Occlusions: Line-ofsight microwave sensors function
best in terrain that is flat and clear
of obstacles. A terrain-following
sensor is designed to work in
uneven terrain.
Volumetric/Line Mode: Sensors in
volumetric mode detect intruders in
a defined volume of space or zone
above or below ground. The zone
of detection for sensors in line mode
is confined to a defined line or
plane, such as a fence or wall.
Active/Passive: Active sensors
transmit energy and detect a
change in received energy entering
a field or perimeter space. Passive
sensors detect the vibration, pressure and heat of an intruder’s presence and movement.
Overt/Covert: Sensors can be
installed above or below ground,
fence- or wall-mounted, or free
standing. Readily accessible, visible
sensors act as a deterrent and are
easy to install and maintain, but are
more susceptible to tampering and
defeat. Difficult to detect and defeat,
hidden or embedded sensors are
more difficult to install and maintain.
True-False Alarm Rate: The rate of
nuisance and false alarms generally
pulls in the opposite direction to the
probability of detection. This inversely proportional relationship between
rates of true-positive and false-positive alarms should inform the facility
needs assessment and perimeter
security evaluation as part of a costbenefit analysis.
TOP 10 SECURITY EQUIPMENT CONTRACTORS
COMPANY NAME:
ANNUAL REVENUE
1. MCS Detention . . . . . . . . . . . . . . . . . . . . . . . . . . . . .$40 million
2. South Western Communications Inc. . . . . . . . . . . . . .$37.8 million
3. Com-Tec Security LLC . . . . . . . . . . . . . . . . . . . . . . . . .$20 million
4. Sierra Detention Systems . . . . . . . . . . . . . . . . . . . . .$19.8 million
5. EO Integrated Systems Inc. . . . . . . . . . . . . . . . . . . . .$18.5 million
6. Norment Security Group-Trentech. . . . . . . . . . . . . . . . .$18 million
7. Accurate Controls Inc . . . . . . . . . . . . . . . . . . . . . . . . .$16 million
8. ESI Companies Inc. . . . . . . . . . . . . . . . . . . . . . . . . . .$15 million
9. Southern Folger Detention Equipment Company. . . . . . .$15 million
10. Engineered Control Systems . . . . . . . . . . . . . . . . . . . .$12 million
page 5
ceteris paribus scenario, where many factors are held to be constant. Attending
tradeshows and talking to vendors, manufacturers, industry professionals and
other owners is a great way to get valuable information about particular systems and technologies.
Facility owners need to consider
what kind of facility they have, where it is
located and what they want the system to
do. Ideally, owners should test the system in the field before full deployment in
their facility.
Q: What trends are you seeing in
perimeter security?
A: As with all aspects of design, con-
struction and operations, the bottom
line and financial considerations are
ever present. Many departments and
jurisdictions have begun to use inmates
to install their perimeter security systems in order to reduce costs.
The project tends to take a little
longer to complete but can generate significant cost savings depending on the
technology — the more labor- intensive
the system and installation, the greater
the cost savings. Some jurisdictions now
have dedicated inmate installation and
maintenance crews that have developed
a great deal of experience, which speeds
project completion times.
From a security standpoint, all the
programming and installation work tasks
for field termination points, head-end
components and system control functions are performed by facility staff or private contractors, rather than inmates.
The issues and concerns are generally
outweighed by the economics and the
benefit for the inmates.
Q: How is the technology changing?
A: Some of the newer systems coming on line now achieve a greater integration across facility systems, such as with
sur veillance cameras and lighting.
Incorporating more advanced neural
technologies and logarithms, systems
offer increasing refinement and display
resolution capabilities with regard to the
point of alarm and classification or
method of breach.
Systems are increasingly able to differentiate between events, such as a sawing action and a wind gust, which increases system accuracy and performance and
minimizes nuisance alarms.
Q: Are there innovations in the application of existing technologies?
A: Existing technology is also being
refined in terms of configuration with a
marked trend toward the deployment of
hybrid systems that combine two different technologies — where one technology is better at detecting one kind of
breach, such as climbing, and the other
technology is better at detecting a different kind of breach, such as cutting — on
one perimeter fence.
For example, microphonic sensor
cables and taut wire systems can both
detect cutting and climbing, but we can calibrate the taught wire component to detect
only climbing and deploy it only on the
upper portion of the perimeter fence and
outrigger. At the same time, we can calibrate the microphonic sensor component
to detect only cutting and deploy it only on
the lower portion of the perimeter.
Q: What is the benefit of such a
hybrid system compared to single-technology systems?
A: Taut wire systems have a low nuisance alarm rate and high detection probability but are very costly. Microphonic
sensor systems are relatively inexpensive
but have a higher nuisance alarm rate
due to wind susceptibility.
Combining the two technologies creates a system that is less expensive than
a full taught wire system but offers a
higher probability of detection and lower
nuisance alarm rate than a system that
relies solely on microphonic sensors.
Q: What other trends are impacting
the industry, systems and performance?
A: Current trends in the market
include the redesign of systems to
locate as much of the electronics as
possible inside and to isolate system
power requirements from other electronic components.
Systems are also being designed to
provide uninterruptible power supply for
the control room or watch tower and system power components are being located
FIVE HIGHEST CONTRACT AWARDS
1. ESI Companies Inc . . . . . . . . . . . . . . . . . . . . . . . . . . .$20 million
2. Professional Systems Engineering LLC . . . . . . . . . . . . . .$19 million
3. Norment Security Group-Trentech . . . . . . . . . . . . . . . . .$10 million
Mission-Critical Functions
of Perimeter Security
Deterrence: A perimeter security
system should establish, secure and
discourage breaches of a welldefined protected area.
Detection: Solutions should integrate intrusion detection capabilities
to provide real-time detection, location and notification of unauthorized
breaches of perimeter security.
Delay: System architecture should
incorporate measures that delay intruders or escapees and allow security personnel to reach the detected breach.
Assessment: Systems should have the
capacity to reliably and consistently
assess and confirm the validity, source
and type of perimeter breach to deliver a high degree of true-positive and
low degree of false-positive detection.
Response: A perimeter security system should facilitate an immediate,
efficient, directed response from
security personnel by providing the
location and vector of validated
perimeter breaches.
in facility equipment or building systems
spaces.
Fiberoptics are increasingly replacing
traditional copper wiring, which is susceptible to power surge damage from
lightning strikes, to transmit alarm and
sensor data back to the control room.
Q: Are there any new technologies on
the horizon?
A: Our industr y is constantly striving to refine existing technology and
systems to further reduce nuisance
alarm rates and to increase accuracy in
pinpointing the location and type of
breach event.
System processors are key in this
regard and overall system performance
and reliability will continue to improve
as processing power and capacity develops. In terms of future trends, there is a
new sensor system in development that
uses solid-state electronics with no
moving parts and technology similar to
an automobile airbag, which should
provide more robust performance in
the field.
4. Com-Tec Security LLC . . . . . . . . . . . . . . . . . . . . . . . . .$9.6 million
5. Sierra Detention Systems . . . . . . . . . . . . . . . . . . . . . .$8.5 million
DeTekion Security Systems Inc.
page 6
www.detekion.com
What Keeps Me Up at Night
How Intelligent Is My Video Surveillance System?
By Gregory J. Offner
At AECOM Design, I work with a
group of industr y experts who are
immersed in the world of security electronics. They rigorously evaluate the
performance of new products and technologies before making project specification recommendations to clients on mission-critical facility systems.
The video surveillance market is
worth about $1 billion worldwide. The
intelligent video and Internet protocol
network sectors represent a small, but
growing, percentage of the overall surveillance market.
The shift to networked digital surveillance has generated criticism from
some corners of the industry. However,
market indicators and product performance metrics suggests intelligent video
systems are performing well and are
winning a larger share of the market
from CCTV surveillance equipment and
systems manufacturers.
Information technology companies,
such as Cisco and EMC, are accelerating
product innovations and enhancements,
while video surveillance systems competitors like Axis Communications,
Indigo Vision, IVI and others are benefiting from the growth of the IP networked
surveillance market.
Shifting Technology
The current generation of intelligent
video and IP-based cameras and systems
are able to satisfy the high-performance
needs of the security industry, and the
market dominance of CCTV/DVR technology is slowing as understanding and
utilization of NVR hardware and software gathers momentum.
Intelligent video and IP-based systems
offer capabilities that the CCTV/DVR systems cannot provide, including objectbased video capabilities and the use of
metadata to analyze object movement.
One key component that allows IPnetworked systems to offer additional
features and capabilities beyond the
conventional CCTV cameras is the use
of IP cameras. Similar to analog cameras, IP cameras include a day/night
mode that provides bright images
when monitoring objects at dusk and in
dimly lit environments.
IP cameras offer slower shutter
modes for enhanced image brightness
and variable settings that help capture
high-contrast images with better resolution. The IP units include PTZ functions
and also provide bi-directional audio
options. Voice and motion alert functions
for pre-recorded audio files allow users
to conser ve bandwidth by viewing
images at lower resolutions.
Intelligent video has gone beyond
simple motion detection, object and person tracking, and tamper notification by
adding security-enhancing applications,
such as automatic license plate and facial
recognition capabilities and life safety
functions.
Technology can be integrated into
fire detection systems to search video
streams for visual heat-source indicators
of a fire and provide facility staff with an
early warning.
Conventional fire detection systems
are activated when smoke from a fire
reaches a smoke detector. Intelligent
video systems can be calibrated to trigger an alarm when the light of a flame is
detected in the camera’s specific coverage zone, which is typically limited by
the camera’s field, depth of view and line
of sight.
However, fire codes in certain jurisdictions do not permit the use of video
identification as the sole fire detection
system, which has limited widespread
adoption of the technology for such life
safety functions.
Facility Must Haves
At the top of my must-have list is
license plate recognition capability,
which can enhance security at high-risk
locations, such as courthouses and cor-
page 7
Offner
rectional facilities.
License plate recognition technology
can be used as a protective measure to
verify the identity of individuals and
their vehicles and to monitor and control
facility access. Parking lots can become
an additional layer of security screening
to augment conventional measures, such
as photo identification checks for staff
and visitors, and enhance perimeter and
interior security.
Cameras, which can automatically
track vehicles entering a parking lot for
length of stay, can be used to screen
vehicle license plates and run a rapid
background check against law enforcement databases for a full or partial match
of suspect or flagged vehicles.
A facial recognition system is another must-have on my list. Facial recognition is similar to license plate scanning
technology and linking to the data pool
is often the biggest challenge in deploying the system.
The system scans and compares the
face of a target individual against a photographic database of faces, such as
booking or driver’s license images.
Security staff in correctional and court
facilities can also use facial recognition
technology to enhance access control
and security, monitoring visitor traffic
for flagged individuals or convicted
offenders entering the facility.
Is Big Brother watching?
Intelligent video surveillance systems have the capacity to enhance facility safety and security. However, the technology has drawn criticism on account of
the perceived threat to privacy posed by
potential applications.
Facility managers can use a staff
tracking capability to ensure scheduled
patrols and checks are executed or that
deployment of a fixed-point security
detail is in place as required.
Some agency or jurisdictional regulations or management-union work agreements/contracts may preclude or
restrict audio-video surveillance of staff
or staff areas. Before designing and
installing an intelligent video system,
systems integrators should find out if
such restrictions are in place.
In my experience, performing a regular, verifiable purge of audio-video data
files provides relatively simple means of
allaying any staff privacy concerns.
Optimized Deployment
Whether you host intelligent video
on a single on-site server across network
endpoints or via remote access depends
on the equipment and the demands of
the operational environment. Beyond
this decision, there are several technical
considerations that can improve the performance and accuracy of your facial
recognition application.
No intelligent video surveillance system is infallible, so when you decide to
deploy this technology, you need to
have realistic expectations. For
instance, deploying a system that yields
a 90 percent accuracy rate is relatively
expensive in comparison to a conventional CCTV system.
Deploying a system with an accuracy rate greater than 90 percent in a realworld criminal justice setting will generally prove extremely challenging and
cost-prohibitive.
Technology Shift
Like other security electronics market segments, video surveillance will
continue to grow and the integration of
intelligent video and IP cameras has the
potential to change the way we monitor,
control and protect the safety and security of criminal justice facilities and
their occupants.
IP-networked video sur veillance
cameras and object-based video surveillance systems experienced a banner
year in 2008. A logical conclusion is to
assume the dramatic growth in market
penetration and system installations for
intelligent video signals the decline and
potential death-knell of CCTV-based
video surveillance equipment and conventional video surveillance.
However, leading CCTV manufacturers insist that analog systems are
still very much in demand in the criminal justice market. Like all new technologies, IP video has a ways to go
before it supercedes analog-based systems as the tried-and-true mainstream
technology of choice.
Taking the macro view of the arc of
technological innovation, development
and life cycle, video analytics is in its
infancy. For now, both analog and IP
cameras are being used with intelligent
video technology.
All things being equal, the future of
object-based intelligent video as the next
transformational catalyst in the development of prison, jail and courthouse security appears assured. I just hope this tectonic shift doesn’t keep me from getting
a good night’s sleep.
Gregory J. Offner is vice president of
AECOM Design in Arlington, Va. He
is a member of the Correctional News
Editorial Advisory Board.
Emlen Publications does not warrant or make any representations regarding the use or the results of
the use of the materials in this publication in terms of their correctness, accuracy, timeliness, reliability,
or otherwise. The user understands that no claims, implicit or explicit, are made for the statistics,
rankings, and other information contained herein and that any conclusions or inferences drawn from the
data are wholly the responsibility of the reader. Given inherent error margins associated with any single
survey result, it may be inappropriate to use the results from this survey for precise rankings in any
particular circumstance. The user understands that, while every effort has been made to harmonize
findings, some differences and errors may persist due to differences in the way questions were posed or
answers were recorded.
page 7