BIG DATA: The Next Frontier for Physical Security

According to McKinsey (1), Big Data refers to “datasets whose size is beyond the ability of typical database software tools to capture, store, manage and analyse.” It does not define big data in terms of being larger than a certain byte size, since technology advances over time and the size of datasets that qualify as big data will also change.

There are three main characteristics of Big Data: Volume, Velocity and Variety. Volume refers to big data size. Velocity is the speed and frequency of data been generated. Data is flowing at faster speed, hence making it challenging for traditional systems to handle. With the advancement of technologies and proliferation of Internet of Things, sources of data become increasingly varied and this constitutes the characteristic of Variety.

What are Big Data Applications ?

In the Infocomm Technology Roadmap 2012 (2), Big Data was identified as one of the nine key technology themes. It also identified several areas of opportunities for both the public and private sectors to leverage on for business improvement. In particular interest to the Security and Law Enforcement communities are Predictive Analysis, Complex Event Processing and Video Content Analytics (VCA). The value of Big Data is turning the 3 “V”s (i.e. Volume, Velocity and Variety) into 3 “I”s (i.e. Intuition, Intelligence and Insight)

There are many suppliers providing these 3 systems in the market. Each of these applications can be leveraged in many different ways to enhance physical security protection. For example, VCA could be used to monitor perimeter fence line to detect intrusion. It can also be used to detect suspicious vehicles or persons outside the fence line. Such applications can greatly enhance security and possibly reduce manpower costs. In the long run, only a lean security manpower team is required to protect a large-sized property. This will definitely address many of the current challenges faced by security professionals.

Where are you now?

Bob Banerjee (3) developed a Big Data Maturity Model that describes the progression of physical security solutions on a big data continuum. At the bottom (layer 1) of the pyramid is “datafication”. The first step towards Big Data is to convert data into digital format. It can mean migrating from analogue CCTV system to digital CCTV system. You would have started the big data journey if you have digitised your processes/ systems.

With digital data, you can move on to the next step (layer 2) for big data collection. At this layer, various sources of data are fed into one common platform (e.g. Physical Security Information Management System or PSIM). Depending on the advancement and sophistication of the PSIM, the system would be able to produce intelligence and insight to enable the security operators to take further actions. At the higher levels of the pyramid, it involves the ability to predict the future. This sort of capability can be easily imagined by referring to those scenes we saw in the “Minority Report” movie where criminals are apprehended moments before they commit crime

Conclusion

Big Data will be the next frontier for Physical Security. Now is the right time to take small steps toward the “big future”. Start by “datafication” and gradually move towards more sophisticated analytic solutions. Think Big.

References

1) James Manyika, et al. Big Data: The next frontier for innovation, competition, and productivity [online]. McKinsey Global Institute, May 2011 [viewed 24 Oct 2015]. Available from: http://www.mckinsey.com/insights/business_technology/big_data_the_next_frontier_for_innovation

2) IDA. Infocomm Technology Roadmap 2012 [online]. Singapore: IDA, 2012 [viewed 24 Oct 2015]. Available from: http://www.ida.gov.sg/Tech-Scene-News/Technology/Technology-Roadmap

3) Bob Banerjee. Demystifying Big Data’s Next Conquest: Physical Security [online]. USA: Homeland Security Today, 2014 [viewed 24 Oct 2015]. Available from: http://www.nxtbook.com/nxtbooks/kmd/hst_201402/#/14

 

This article was originally published in the Dec 2015 Security Professional newsletter.  http://www.asis-singapore.org.sg/p/chapter-newsletter.html

Close-up of the Commendation

I have shared in my social media postings that I was presented the “Commendation of Outstanding Service to ASIS Singapore Chapter” during the ASIS International (Singapore Chapter) Q4 Networking Dinner on 1 Nov 2018.

I am now sharing the close-up shot of the commendation write-up exclusively here in dexyuan.com

I am delighted to learn that both SRVP Anthony Lee and RVP Leonard Sng have recommended to ASIS CEO Peter O’ Neil my contributions to the security community here in Singapore.  I am especially glad to read the last paragraph on “Built to Last”, an idea I have applied to steer the direction of the Chapter.

I also like to correct an error to paragraph 2 where it was mentioned that the membership number grew from 183 to 256.  It should be from 198 to 288, a 45% increase in membership number.

ASIS international (Singapore Chapter) Annual General Meeting 2018

The ASIS international (Singapore Chapter) Annual General Meeting was held on 1 Nov 2018. The event was attended by 50+ members. We delivered strong results for Year 2018 and saw growth in performance in many areas, including financial, membership and certifications.

Refer to the infographics for some of the details. I take this opportunity to thank the following Management Committee members for their contributions, without them, we would not have made this progress. Choon Kwang LIM, Melvin Pang , Alfred Leong, Xinhua Liu, Hwee Fong Yong , Anthony Lee, Leonard E.J. Sng, Muhammad Iskandar, Gwee Khiang Tan, Tang Teck Wah, Collin Goh

At the AGM, a new management committee was elected for 2019/20. Congratulations to incoming Chair Choon Kwang LIM and his other 11 committee members. We look forward to the new team bringing the association to a new height !

 

ASEAN Summit in Nov 18 – Heighten Security

The ASEAN Summit Nov 2018 is a high profile event in Singapore.  The government spares no effort to ensure water-tight security, especially in the areas near to the Summit.  This is observed based on the deployment of large number of homeland security and army resources as a show of force to would-be attackers to think twice before striking here in Singapore.

This may displace the attacks to other more vulnerable locations in Singapore.  The homeland security resources cannot be deployed to everywhere.  Hence, other private organisations should tighten their security during this period of heighten security too.

https://www.channelnewsasia.com/news/singapore/tighter-security-around-suntec-asean-summit-november-10899676

Hello world!

“Hello World !” is the usual 1st default post that appears in a blog.

I am going to leave the title as it is.

I have created many websites and blogs since my school days but have spent little time in the past few years on it.  The only blog I helped maintained in the past few years was the www.asis-singapore.org  Didn’t really put in much effort to design or improve it, having taken over it from the previous webmaster of the ASIS International (Singapore Chapter).

I have decided to create a personal blog again to share some of my thoughts on leadership, security and ideas that I have.  Of course, I could have done it through the LinkedIn account which I have been active in the past 2 years, but sharing through my personal website will give me more control over the contents.  Please come back for more contents as I progressively build this site.