Skip to main content

Home/ Hospitality Technology/ Group items tagged homeland

Rss Feed Group items tagged

Amy Sena

Homeland Security Approves Their Right To Search and Seize Your Electronics Without Sus... - 0 views

  • the Department of Homeland Security quietly released a strangely worded document reaffirming their own right to search and seize your electronics without suspicion or cause, anywhere along the United States border (which they define as 100 miles in from the border – an area twice as long as Rhode Island).  In reality, this is nothing new, Homeland Security been doing this since at least 2009
  • For now, the business community has figured out a way around having the government search and confiscate devices with company secrets – give their employees blank laptops, and put the important information in the cloud.
  • Courts around the country are struggling to decide how to balance security with privacy.
  • ...1 more annotation...
  • In today’s world of cloud computing and ubiquitous screens, these protections are horribly inadequate
  •  
    Since 2009 Homeland Security has been searching and seizing electronics without suspicion or cause anywhere along the United States border. The business community has figured out how to get around the government searches by providing their employees with blank laptops and putting important information in the cloud. It has now been 25 years since Ronald Reagan signed the digital privacy protection laws which in today's rapidly advancing technology era these protections are inadequate.
jlewinsky

Facial Recognition Market Expected to Reach $9.6 Billion Worldwide by 2022 | News | Hos... - 0 views

  • According to a new report published by Allied Market Research, titled, World Facial Recognition Market - Opportunities and Forecasts, 2015 - 2022,  the global facial recognition market is expected to generate revenue of $9.6 billion by 2022, growing at a CAGR of 21.3% from 2016 to 2022.
  • North America is expected to dominate the market throughout the forecast period, owing to the high expenditure on security systems by government agencies in the region.
  • Facial recognition technologies include 2D, 3D, and facial analytics. The 3D facial recognition technology segment holds a significant share in the world facial recognition market, owing to its high accuracy in terms of recognizing facial features as compared to the 2D facial recognition technology.
  • ...6 more annotations...
  • 2D technology is also widely used due to its low installation cost and operational ease as it uses 2D appearance
  • Among the component segments, hardware accounted for the maximum revenue share in 2015, owing to high cost of 2D and 3D cameras. The facial recognition software market is estimated to grow at a CAGR of 23.9% during the forecast period. Development of effective and efficient facial recognition software applications is expected to drive this market.
  • In the year 2015, homeland security contributed the highest revenue share, accounting for around 21% of the overall market revenue. From a growth perspective, intelligent signage is likely to be the most prominent application of facial recognition, anticipated to witness the highest CAGR of 25.1% during the forecast period.
  • North America offers lucrative opportunities for market growth, exhibiting a huge demand of facial recognition technology for homeland security and criminal investigation.
  • Some of the leading players in the facial recognition market include Cognitec Systems GmbH, NEC Corporation, FaceFirst, Inc., and 3M amongst others.
  • These players have adopted product development, acquisitions, agreements, and partnerships as their key strategies to strengthen their market position and expand their geographical presence. For instance, in 2015, Cognitec Systems GmbH launched and incorporated a superior version of the face recognition algorithm B9 in FaceVACS-DBScan, one of the its leading facial recognition products.
  •  
    According to this article the technology of facial recognition is expected to grow tremendously by 2022. Also, mentioned industries such as homeland security who has been using this form of technology since 2015. When comparing the 2D and 3D technology, 2D technology is more widely used due to its low cost and ease of use. The use of 3D technology has its place in the industry as well due to its ability to recognize facial features more accurately than 2D technologies.
Lu Zhang

Hotel Security in an Insecure World | Past Issues | Past Issues - 0 views

  • For the last nine years, the concept of heightened security has guided our nation ever since we witnessed the terrorist attacks of 9/11.
  • With the violent November 2008 hotel attacks in Mumbai, India, the September 2008 attacks in Islamabad, Pakistan, and the July 2009 Jakarta, Indonesia, bombings of American-branded hotels, the need for a new security awareness is now finding widespread acceptance across the U.S. lodging industry.
  •  
    The cases of terrorist attacks of hotels increasing. To reflect this situation, the American Hotel & Lodging Association (AH&LA) cooperate with Department of Homeland Security to classify the security situation and work on security environment of lodging. To improve the security environment, the AH&LA had meetings discussing about attacks alert, security apparatus, and practical and logistical aspects to hotel security. For many years, AH&LA provided e-mail notices to its members alerting hoteliers improve the immediate security environment. With more and more terrorism and tremendous risks, AH&LA coordinated media and government, and produced security training to help hoteliers to protect and guard the hospitality industry.
Laura Alonso

Biometrics | Homeland Security News Wire - 0 views

  • In a study which evaluated some of the latest in automatic facial recognition technology, researchers at Michigan State University were able quickly to identify one of the Boston Marathon bombing suspects from law enforcement video, an experiment that demonstrated the value of such technology.
  • Under controlled conditions, when the face is angled toward the camera and if the lighting is good, this technology can be up to 99 percent accurate.
  • While the technology has made great strides in recent years, it does not mean that improvements are not needed. Also, more police agencies have to put the technology to use.
  •  
    This article talks about how with the help of Biometrics technology, one of the Boston Marathon bombers were identified. This is a great example as to why biometrics technology is crucial in today's society. It has helped law enforcement and government agencies track down and arrest criminals. 
Cecilia Lucas

New airport tech could shrink security checks to 5 seconds -- Government Computer News - 0 views

  • new contraption June 7 that could get you through an airport security line in five seconds
  • Instead, airline travelers would pass through one of three 21-foot tunnels based on the passengers’ status as known travelers, normal travelers or enhanced security travelers
  • TA and the Homeland Security Department have not commented on the cost of collecting and storing millions of travelers’ iris scans. According to IATA, the association is working with the Homeland Security Department on DHS' Checkpoint of Tomorrow program to revamp a tedious and often contentious security process at airports.
  •  
    The International Air Transport Association introduced a new security system at the 67th Annual General Meeting and World Air Transport Summit in Singapore in 2011. This new system would divide travelers in three different categories: known travelers, normal travelers and enhanced security travelers. Each level would have different security procedures and then passengers would pass through different tunnels, one for each category of traveler. For example, if you are a known traveler you would need to pass a iris recognition system which would confirm your identity and you would pass through a tunnel with minimal scanning technology. The scanning procedures get more invasive for normal passengers and even worse for enhanced security travelers.
Alejandra Kravets

International Cruise Ship Security Issues | Travel Tips - USAToday.com - 0 views

  • The International Ship and Port Safety Code, implemented in 2004, requires all cruise ships to engage in strict screening measures. This means that all passengers must pass through metal detectors before they enter the ship, and that their clothes and baggage are X-rayed as well .
  • Cruise ships also rate ports for incidents such as smuggled goods, contraband and stowaways; such statistics allow them to find the most tourist-friendly ports to visit.
  •  
    After 9/11 incident hotels, airlines, cruises are planning and implementing more security measurements to ensure customers' safety. Particularly, in this article security is the biggest concern while traveling. Any terrorist or criminal can book a cruise as a regular passenger and put passengers in danger. That is why in 2004 The International Ship and Port Safety Code requires that all passengers must pass by metal detectors and their baggage has to be X-rayed as well. Cruise ships also work very closely with the FBI, U.S. Coast Guard, and the Department of Homeland security to stay aware of possible pirate activity or terrorist attack. Ports of call are heavily reviewed and compared to ensure traveler's safety since they are in another country and other laws may apply. They check with local security and police forces, and monitor incidents that other cruise ships experience at a given port.
takesharolle

Hospitality & Tourism Investment: Forces for the Future - 0 views

  • Chinese investors have quickly become a major force to reckon with in the global hospitality industry.
  • Since 2014, Chinese buyers set their sights on corporate entities and brand/operating platforms,
jmore044

Homeland Security Warns Against Threats to US Infrastructure | By Bob Braun - Hospitali... - 0 views

  • Hotels rely on third-party vendors to help run their properties efficiently, and often must give them access to sensitive guest data. This leaves hotels vulnerable to cyber attacks; they're only as secure as their vendors are, and may find themselves directly liable for a data breach
  • on a single day, several well-known hotel brands and managers, including Four Seasons, Trump Hotels, Hard Rock Hotels & Casinos and Loews Hotels all announced that customer data may have been compromised as a result of a security failure. Each of the incidents is related to Sabre Hospitality Solutions' credit card data breach in its SynXis hotel-reservations system,
  • . In analyzing the breaches, there is something that is common to almost all incidents: the vulnerability was not with a hotel, its manager or brand, but with a vendor.
  •  
    This article describes how often, the security breaches that hotels suffer are actually not a result of their own lack of security, but that of their third party vendors. Brands such as Four Seasons and Hard Rock Hotels have suffered breaches because of security failure from their reservations system, SynXis. The challenge is that to the guest the fault lays with the brand, and the brand thus suffers from the loss of loyal guests.
jalilahst

NIST Offers Cybersecurity Guide Tailored to the Hospitality Industry - Homeland Securit... - 0 views

  • “Our practice guide documents how we enabled cybersecurity concepts such as zero trust architecture, moving target defense, tokenization of credit card data, and role-based authentication in a reference design that addresses cybersecurity and privacy risk
  • hospitality ranked third among industries compromised by cybersecurity breaches in 2019, and the industry suffered 13% of the total incidents
  • The design protects data moving within this environment, and it prevents user access to the various systems and services.
  • ...2 more annotations...
  •  zero trust architecture, a cybersecurity paradigm focused on resource protection. Its premise is that trust is never granted implicitly but must be continually evaluated.
  • authentication and authorization of both subject and device are required before users can access a network’s resources.
  •  
    This article is about the National Institute of Standards and Technology providing hotel owners in the hospitality industry a new practical cybersecurity guide, to reduce risks of high vulnerability that attracted target for hackers in areas such as hotel's PMS that is used to store guests' personal information and credit card data.
  •  
    Hospitality was ranked third in the top five industries to be comprised by cybersecurity breaches in 2019. Over half the breaches were attacks on on site property servers. NIST offers a guide to hotel owners to reduce risk of cyber attacks. Their guides addresses cyber and privacy risk on PMS. The PMS design protects data moving in the environment and prevents user access. Zero trust architecture requires authentication and authorization of both subject and device to access a network's resources.
teresastas

Railroads say they don't need cybersecurity mandates - The Washington Post - 0 views

  • The Biden administration plans to impose new cybersecurity mandates on railroad and rail transit systems.But a leading railroad association insists it's already voluntarily following the practices that are now going to be required by the federal government.
    • teresastas
       
      Biden administration is planning on imposing new cybersecurity mandates on railroad and rail transit systems. This includes passenger rail systems like Amtrak and large subway systems like those in New York. Homeland Security Secretary announced the new proposed regulations under TSA eelier this week. The new regulations came as a surprise to the rail industy who feel that they are already taking cyber security seriously and don't need the government's heavy hand involved. They have three day's to submit feedback.
  • Our freight rail system is essential not only to our economic well-being, but also to the ability of our military to move equipment from ‘fort to port’ when needed,” the secretary said at the virtual Billington Cybersecurity Summit, where he announced the intended new regulations.
    • teresastas
       
      We often forget about Rail when we think about Transportation but it is essential for our military and for our major cities like New York. As well as the transport of goods across country.
  • In fall 2020, ransomware hit the Southeastern Pennsylvania Transportation Authority, which operates Philadelphia’s transit network. And in April, a hacker group believed to be linked to the Chinese government breached the computers of the Metropolitan Transportation Authority (MTA), which operates New York City’s subway system — the country’s largest.
    • teresastas
       
      We often don't hear about the hacks that aren't successful but how awful would it have been if hackers would have breached into MTA and taken over NYC's subway system!
1 - 10 of 10
Showing 20 items per page