The Active Shooter Epidemic: One Major Preventive Measure Launching Today
By: Anil Chitkara, President & Co-Founder, Evolv Technology
Too many mass shootings.
Too many venues without security checkpoints.
Too few technology solutions identifying the individuals who require a closer look.
Too many conversations with security professionals and venue operators asking for something better.
At Evolv, we have had enough. The “new normal,” as some have called it, is unacceptable. We’ve dedicated ourselves to keeping people safe by using technology to stop active shooters. The safer world we envision should be something that everyone simply expects without having to think about it.
Six years ago, Mike Ellenbogen and I started Evolv Technology with a mission to save lives.
Prior to the founding of Evolv, we spent more than two years conducting research. We met with security professionals across the globe and developed a deep understanding of modern threats and what security professionals need to prevent mass casualty events. We visited university labs and small tech companies to understand the latest innovations in sensors, data synthesis, image reconstruction, machine learning, and design thinking. Then, leveraging our combined 40+ years of experience using technology to solve critical, complex problems, we started Evolv.
At Evolv, we set out to solve a very tough problem: how do you recognize that the vast majority of people pose no threat, while simultaneously identifying those few who may be a threat and require a closer look. It’s a simple problem statement, but a difficult question to answer.
Our First Product: Evolv Edge
We launched the Evolv Edge system in 2017, after about 3 ½ years of research and development. Evolv Edge is one of a kind. It’s the first product in the industry to screen people and their belongings at high speed without requiring them to stop or remove items from their pockets and bags. From a technology perspective, Edge’s combination of sensors, signal processing, detection algorithms, and user-centered design is like nothing else on the market. Gone are the white bowls for your keys, coins, wallets, belts and cell phones; gone is the need to stop and put your hands in the air. There is no need to place your bag on a table for a guard to search prior to walking through the Edge. With the Edge, you just walk through.
Since its launch, the Edge has screened more than 25 million people around the world, primarily at entertainment venues, sports stadiums, tourist locations, workplaces, hospitals, and houses of worship. In that time, the Edge has detected more than 5,000 weapons. Prior to selecting the Edge, many of these venues tried walk through metal detectors, but found the experience for their visitors to be too slow and cumbersome. These outdated pieces of equipment also resulted in long lines, creating a potentially new security target and concern.
Feedback on the Evolv Edge has been very positive. We’ve seen first-hand the reactions of visitors going through the system and guards operating it. The most common question we are asked is “Why don’t they have these everywhere?”
What We’ve Learned
As we deployed the Edge and spoke to thousands of security professionals and venue operators, we again asked how we could advance screening technology to make many more venues even safer, while continuing to deliver a positive visitor experience. These conversations were enlightening. We heard significant concern about several different scenarios:
- Workplace Violence Prevention:
One of the biggest areas of concern was the proliferation of workplace violence. People should not be concerned for their safety while at work. Many employers, however, are not willing to put a traditional checkpoint in place. They are looking for a system that screens people with little-to-no inconvenience.
- Event Screening:
Another scenario we heard was about screening large crowds for events. The shootings in Las Vegas, Gilroy and Jacksonville Landing highlight the need to screen large numbers of people at special events.
- Tourist Screening:
The third scenario we continued to hear was around screening at tourist locations. Many of these locations, whether an observation deck, museum, or landmark, carry their own unique complexities. Many visitors are carrying food, clothing, cameras, and a host of other personal items for a day’s outing. Often there are international visitors speaking a range of languages.
These three scenarios were just a few of the many that were highlighted.
In many cases, security teams had tried traditional checkpoints with walk through metal detectors and found them to be unsustainable solutions. Traditional screening created massive lines, frustrating visitors or employees, and resulted in an unacceptable overall experience. These stories, which we continue to hear on a daily basis, inspired the design for our newest product.
Introducing Evolv Express
We’re now launching our second product, Evolv Express™. Whereas the Edge screens individuals one-at-a-time as they pass through the system for venues who want a control point, Express screens large groups of people at a time with no stopping, no emptying of pockets or removing bags. After eighteen months of development, we’re now releasing Express, the fastest threat screening product on the market that ensures every individual and their belongings are screened as they pass through without even breaking stride. We have incorporated the latest high-speed sensors that move data in real time to a detection algorithm that renders a decision as people pass through; with Express, 60 people can be screened every minute, that’s 3,600 per hour. The system screened more than 250,000 individuals during our pilot testing this spring and summer. As with the Edge, Express detects those individuals who require a closer look, and automatically alerts guards and security personnel to confirm those individuals are not a threat.
How Express Works
Evolv Express combines the latest technologies and user-driven design principles to provide this high throughput, truly frictionless approach to screening thousands of people per hour. It all starts with the brains of our system, the Evolv Cortex AI Software Platform™. This is a machine learning-based AI system that uses data sets we have generated from the system to train the algorithm. The training is conducted on a methodical basis, starting with a designated threat set, such as firearms. A range of threats is scanned, and classifiers are developed, refined, tested, tuned, and hardened to detect the threat set. Similarly, a range of non-threatening items such as cell phones is scanned through the system. A similar approach is undertaken to create classifiers. As the range of threats and non-threats are analyzed by our development team, the algorithm is continually refined. Over time, as new threats emerge and data is collected, the algorithm will continue to be refined. This process is done in our labs in a controlled manner. Once we are confident in the performance of each new algorithm, it will be released and upgraded to Express systems operating at customer sites.
A key Express component is the sensors that collect data to drive the algorithm. These sensors were designed by Evolv to optimize the separation of the signals for both threat and non-threat items. After scanning millions of people with the Evolv Edge system, we had developed a tremendous body of knowledge regarding sensors as well as the typical items that are carried by visitors through our systems. This body of data informed the design for the Express sensor set.
We have also optimized the data flow through our system. For each individual screened, the Edge system moves nearly 1 million data points to the algorithm, with a resulting red light / green light decision as the person exits. For Express, this ultra-high speed data-processing engine has been further optimized to render a decision in less than one second from the time a person starts walking through.
A significant amount of time was spent on the Express user experience. The UX has a number of components: the industrial design of the system, the interaction with visitors being screened, the operator’s interaction with the system, and the people moving and setting up the system. Each of these elements has been carefully thought through and tested with the respective user group.
- Industrial Design:
The Edge was a significant step forward in designing a system that is welcoming to people passing through it. We have taken some of those key design elements and made improvements to streamline the look even further. Additionally, we recognize these systems need to visually fit into the environment, so we added the ability for users to add custom branding or signage on a key component of the system.
- Visitor Experience:
We widened the overall design to make it easier for people to pass through with minimal disruption.
- Operator Experience:
Our focus on the operator experience has resulted in a system that is easy to operate as thousands of people pass through each hour. There are a mix of audio and visual cues for the operator. If an individual alarms, there is a picture of the person alarming, with the alarm location clearly outlined for further evaluation.
- Ease of Deployment:
Finally, a key element of the system is the ability to move it around to enable screening at different locations. The system has built-in mobility capability, for easy breakdown, movement, and set-up. When the system is powered on, an automatic software calibration routine runs through diagnostics, resulting in the system being up and operational in two minutes.
We are starting a roadshow to preview the Express to security professionals around the U.S. Next week we will be unveiling at the ASIS GSX Security Show in Chicago. After that, we will be in major cities around the U.S. And, you will start to see the Express working at venues around the country keeping people safe.
We set out to solve a very tough problem: how do you recognize that the vast majority of people pose no threat, while simultaneously identifying those few who may be a threat and require a closer look; how do you improve public security without disrupting the public? Over the past 6 years we’ve dedicated our resources and our expertise to answering these questions.
We’re humbled to have the opportunity to ‘make our dent’ in the universe and couldn’t be more excited to launch Evolv Express.
TSA Sickout Creates Opportunities to Improve Airport Security
By Bill McAteer, Account Executive at Evolv Technology –
Prior to the government shutdown being temporarily lifted, a TSA ‘sickout’ resulted in a disruption of service that had a direct impact on the security and experience of today’s travelers. This provides a good lesson on how we can shape the future of airport security.
Driven by the prospect of continuing to work without pay, more than 10 percent of TSA agents protested by holding a sickout. To compound matters, many TSA agents also chose to leave the industry entirely, finding new jobs during the shutdown.
The protests had a direct impact on security and the customer experience as the lack of screeners forced airports such as Miami International and Atlanta’s Hartsfield-Jackson International Airport to shut down some screening areas, causing longer lines and longer delays.
Here’s the reality – the majority of travelers dread airport security as it is. The thought of long lines, combined with potentially invasive searches on them personally by TSA personnel, creates angst for many travelers.
But what this problem exposed is that our current model of airport security is broken. Security shouldn’t be beholden to workforce issues and performance concerns. Airports need to use this opportunity to modernize the infrastructure, their processes and the screening solutions supporting their security workforce.
In addition to existing checkpoints, technology such as advanced sensors, AI and biometrics can be deployed at the landside area of the airport to dramatically improve the customer experience of security, while improving security itself.
In this model, travelers walk through portable security gates before reaching terminal security. The advanced screening solutions can detect explosives and firearms in a rapid manner – without any of the false positives from items like keys, phone and belt buckles. And, as threats evolve, solutions on the landside area of the airport become much more important.
These technologies have also proven incredibly effective in employee screening deployments at airports such as Oakland International.
In addition, advanced weapon and bomb protection improves security throughput dramatically – with fewer requirements for manual labor. This allows airports to allocate security personnel to where they can have the most visible and positive effect – and helps eliminate customer experience concerns caused by workforce issues.
There’s no doubt that TSA agents were in a difficult situation, being forced to work without pay. But this broader issue has shined a light on the ongoing security problem that airports struggle with. Advanced screening technology can be used in critical areas throughout an airport, helping balance security needs with the requirements to provide superior customer service.
Photo Credit: Floris Van Cauwelaert
The Kravis Center: Protecting Our Guests, the Experience, and Customer Service
By Judy Mitchell, CEO, Kravis Center for the Performing Arts
Ask any senior executive in charge of a public venue what keeps them up at night and one of their top answers is likely to be “security.” The sad reality of our modern society is that popular venues of all kinds – concert halls, stadiums, schools, places of worship – have emerged as potential targets for terrorists and active shooters.
At the Kravis Center, like every performing arts venue, we’re focused on proactively addressing these security threats to ensure our audiences, artists and staff members remain safe. At the same time, we’re committed to providing the best customer experience possible to our patrons.
Security and the customer experience can sometimes be at odds. Making everyone line up single file and go through a metal detector, empty their pockets and take off their belts isn’t exactly good customer service, but many venues have been conditioned to think this is the only approach.
This is why we’re working to transform how we scan and identify deadly threats while ensuring that our patrons are provided a fast and secure entry.
We have a new approach to screening for weapons and explosives that provides significantly better detection rates than metal detectors while allowing for mass scanning of crowds – speeding up the security process.
Here are a few reasons why we implemented the Evolv Edge and what it means for our customers:
Unlike traditional screening solutions, the Evolv Edge allows our guests, artists and staff members to enter and exit the venue without the need to stop, pose, or empty their pockets.
Optimized Traffic Flow
By eliminating the need to stop each individual guest as they enter, the Evolv Edge enables us to provide a quicker and seamless guest experience, preventing bottlenecks and long lines from occurring.
Advanced Detection Abilities
Today’s threats are no longer limited to firearms and we wanted to make sure our security measures weren’t either. With the Evolv Edge we detect explosives and other weapons concealed on an individual, including fully non-metallic explosives. It even offers multiple sensitivity settings to respond to different threat scenarios should our risk-based security policies change.
Because threats, technology and security are constantly changing, we wanted to identify a partner that would help us keep pace with those changes and ensure we evolve with the industry. Evolv’s industry pedigree, paired with its multi-disciplinary team of experts are keeping us on the front-lines of performing arts security today and in the future.
While all of these advanced capabilities have significantly improved our security measures, we strongly believe that good communication and training for our security team members, staff and ticket holders are key pieces of our security puzzle. By pairing the Evolv Edge with our high-quality customer service, we can be confident in our ability to provide high-quality security and guest experiences.
After working with Evolv and the Evolv Edge for over a year now, we’ve been nothing but thrilled with the results. We even have patrons regularly approach our staff to express their appreciation for the increased security measures. We look forward to continuing our partnership with Evolv to bring our guests, staff and artists safe and enjoyable experiences.
Judy Mitchell is CEO of The Kravis Center for the Performing Arts, a professional performing arts center in downtown West Palm Beach, Florida. Read more about the “Five Steps to Implementing a Balanced Security Plan at Performing Arts Venues” by Anil Chitkara, president of Evolv Technology.
Photo Credit: Nick Juhasz.
DHS Warns of Continued Soft Target Threat in Latest Terror Bulletin
By Melissa Cohen, Evolv Technology, VP of Marketing –
In September, the Department of Homeland Security issued its latest National Terrorism Advisory System (NTAS) bulletin, notifying state and local organizations and the public that the U.S. continues “to face one of the most challenging threat environments since 9/11.”
That sounds pretty newsworthy, yet you probably didn’t hear much around this latest warning from DHS. Very few publications covered the bulletin, because it was very similar to the last two NTAS bulletins, in May and last November. But the bulletin should not be dismissed. In fact, it reiterates the troubling, long-term shift in the threat landscape since the NTAS system was rolled out in 2011. Rather than assign their own members to conduct carefully-planned, 9/11-style attacks on hardened facilities such as airports and government buildings, foreign terrorist organizations such as ISIS are using the Internet to “inspire, enable, or direct individuals already here in the homeland to commit terrorist acts,” the bulletin reads.
DHS’s concern isn’t only about the ability of groups like ISIS to radicalize Americans to do their bidding. It’s also about how and where those attacks will be made. Recent bulletins have all warned of attacks on “public places and events” using “easy-to-use tools.” As we have seen all too often in places like Nice, London and the U.S., attacks are on the rise at lightly-defended targets such as office buildings, entertainment venues and marketplaces, often with handguns, knives and rented trucks.
This long-term shift requires a substantial rethink of the security technology needed to protect visitors to these softer targets. Traditional metal detectors can find the tiniest pen-knife if given the time, but they will also find every last key and piece of spare change. That means long lines of frustrated people, just trying to get on with their everyday lives. For our companies, schools, businesses and entertainment venues to actually invest in weapons detection infrastructure, they will need higher throughput, smarter screening systems that are optimized to find weapons and explosives capable of inflicting mass casualties.
The need is especially pressing for low-hassle systems that can reliably spot major threats. There have been more than 20,000 shootings this year alone, many by lone wolf killers such as troubled teens attacking classmates to a shooting at concert goers from a hotel window. But the NTAS bulletin is an important reminder that ISIS and its ilk are also still out there. Indeed, DHS expects that the more ground ISIS loses in the Middle East militaries of the US and other nations, the more it will focus on fomenting soft target attacks on U.S. soil.
The Dangerous Dawn of the DIY Gun Industry
By Mike Ellenbogen, CEO, Evolv Technology –
In the first episode of his new show “Who Is America,” comedian Sacha Baron Cohen did a surreal bit in which he persuaded three U.S. Congressmen and former Senator Trent Lott to support his character’s desire to train children as young as four years old to carry guns to help stop school shootings. “Kinder Guardians,” he called them.
Well, how’s this for surreal? On July 10, five days before the episode aired, it became legal for anyone in most parts of this country — convicted murderers, known terror suspects and, yes, even children — to easily and legally make a gun in their own basement. And not just any gun, mind you. An untraceable gun.
This development is the result of the U.S. State Department’s decision to settle a lawsuit brought by Austin, Texas-based Defense Distributed, which sued the government in 2015 for the right to publish plans to 3D print a handgun, along with other designs including milling instructions to program a desktop 3D CNC machine to create guns and gun parts. Today was the day Defense Distributed had planned to relaunch the company’s online repository of files, which is calls DefCad.
Fortunately, a Federal judge in Seattle issued a temporary restraining order yesterday in a case brought by eight states, preventing the distribution of the CAD files, pending the trial. While it turns out Defense Distributed had already started distributing the files, the website relaunch was sure to attract the attention of people who our society has decided should not have access to guns. As the blurb on Defense Distributed’s website (now turned upside down, in protest of the restraining order) proclaimed: “The age of the downloadable gun formally begins.” Rarely has the phrase “dodging a bullet” rung so true.
Defense Distributed’s vision is a big deal. While there’s been a DIY gun movement for years, you needed some expertise in metal-working and a hobbyist’s passion for guns, manufacturing or both. Not anymore. Defense Distributed has made making a real gun at home as easy as buying a home-brew kit to make your first batch of beer. Say you want to build your own AR-15 without the government having any knowledge. There are just four simple steps. First, put down a $250 deposit to get one of Defense Distributed’s Ghost Runner metal milling machines (while the full price isn’t listed on the website, this excellent article in Wired says the machine costs $1,200.) Second, buy legally-available gun parts, such as the muzzle and the grip of an AR-15, as well as a slightly-unfinished “lower-receiver” from Defense Distributed or another gun supplies website. (The sale of finished “lowers” for all guns has been regulated until now, as the lower contains the trigger mechanism and therefore is the part that controls whether a gun is single-shot, semi-automatic or automatic). When the “80%” complete lower arrives in the mail, follow the instructions to set it properly in the Ghost Gunner. Fourth, download the file for the part you want to make from Defense Distributed’s website, and then drag and drop the file onto the icon for your Ghost Gunner on your PC. With the push of a button, the machine will complete the milling of the lower, so it can be combined with other AR-15 parts you’ve purchased legally.
Note that the news today is not just about plastic guns. Defense Distributed became well known back in 2013 when it unveiled designs for a handgun called the Liberator that could be printed with a 3D-printer. While a technical milestone of sorts, this and other plastic firearms are only capable of a limited number of shots before they self-destruct. The real threat is the ability to make your own high-quality, fully functional mil-spec semi-automatic weapon.
As an American citizen, I am concerned that the State Department’s decision nullifies the one thing that everyone from the NRA to Parkland student activist Emma Gonzalez could agree on: that people who are known to be dangerous to the public should not be able to get a gun capable of inflicting mass casualties. Suddenly, every Federal measure put in place to make life difficult for mass shooters—the disgruntled teenage boy tired of being bullied at school, the furious ex-husband with a jealous grudge, the radicalized religious zealot—is rendered ineffective. Unless there are state or local laws in place, would-be murderers will not need to submit to background checks, or take the chance that a sharp-eyed gun shop owner will notify authorities of suspicious behavior. They’ll also have an easier time skirting “Red Flag” laws, such as the one passed by Massachusetts on July 3, that gives family members and house-mates the right to request confiscation of guns from people they consider to be dangers to themselves or others.
No doubt, some state and local laws will provide legal checks on Defense Distributed’s “guns-on-tap” vision. On July 30, two days before it planned to relaunch distribution of its CAD files, the company agreed to block access to the site in Pennsylvania to avoid legal action by the state’s Attorney General. It’s also illegal to sell guns and gun parts made with a Ghost Gunner to others without a Federal Firearms License, and in some cases may be illegal to even let someone else use their Ghost Gunner, according to Defense Distributed’s website.
Regardless of what happens with the lawsuit filed by the eight states and the District of Columbia, some checks on Defense Distributed’s “guns-on-tap” vision will remain. The State Department’s decision to allow distribution of the CAD files did not lift Federal prohibitions on the use of DIY milling machines for commercial purposes, without a Federal Firearms License. The machines are supposed to be only for personal use. Defense Distributed warns would-be customers on its website that it may be illegal to even let someone else use your Ghost Gunner in some jurisdictions. Many states and municipalities also have laws regulating use of DIY gun technology–and that will no doubt rise now that the topic has become front-page news.
Contact your elected officials and ask them not to lower the bar.
Read more here about today’s threat vectors and tomorrow’s security threats.
5 Years Old, 3 Years of Development, 1+ Million Visitors Scanned
By Mike Ellenbogen, CEO, Evolv Technology
The Future of Risked Based Security and What’s Ahead For Evolv
This month marks our fifth-year anniversary as a company and the celebration of more than one million people screened with our Evolv Edge physical threat detection technology. We spent three years developing cutting edge technology, more than a year in the field working with users and government testing labs and have been actively screening visitors for just over a year. These milestones are both motivating and critical for our company as we fulfill a vision of a world where safety and security can be possible in all the places we expect to visit safely. Our vision for the industry has no boundaries and is a promise to put safety first at a time when the threat landscape is ever changing. The time to act is now and we are doing so by re-thinking technology that hasn’t been touched or advanced for decades.
When we started Evolv in 2013, Anil Chitkara, my co-founder and our company’s president, and I set out on a mission to preserve everyone’s fundamental right to be safe in all the places people gather. We engaged with industry contacts in different markets to uncover unique pain points, meeting with professors and PhD students to learn about the latest technologies being applied in a diverse range of industries, and exploring security issues with U.S. and international security and counter terrorism experts. We saw a need to rally our networks around the common cause of addressing urgent and evolving security gaps that threaten this fundamental right to safety.
On the heels of these milestones, we’d like to take this opportunity to share with you what we’ve been up to and what’s on the horizon for our company.
Today: Customer Experiences are Pushing Us Forward
Since our founding in 2013, we’ve expanded to 45 employees and have solidified several installations and engagements that have been instrumental to informing the continued evolution of our products. In addition to having scanned more than 1 million people, we completed pilots at 30 different customer locations in 2017, have sales distributors with demonstration units in 14 countries across the U.S., Europe, the Middle East and Asia, and have been tested at five different government labs.
Because of the nature of our business, we can’t always describe our customers’ specific deployments. A few highlights that we can publicly discuss include installations at Oakland International Airport (OAK) and The Raymond F. Kravis Center for the Performing Arts, along with installations at a number of venues in New York City, the most targeted city for terrorism outside of war zones. The Evolv Edge was purpose-built to help proactively keep people and assets safe by detecting and preventing threats before they happen. For these use cases, Evolv Edge offers proactive protection against current and emerging threats, speeding the security process and reducing lines.
OAK is a great example of the Edge used for employee screening for metallic and non-metallic threats at the pace of life.
In the case of performing arts centers, Evolv’s suite of products are being applied as part of an overarching risk-based security approach. Edge and Pinpoint, our integrated face recognition technology, screen well known and unknown patrons at the entrances to individual theaters, while Pinpoint can be deployed backstage to properly clear known, employed individuals and their guests. This approach makes securing venues a seamless process for a security team, while ensuring visitors have the positive and safe experience they expect when going to see a show or performance.
As these different examples illustrate, “one size fits all” doesn’t work for physical security today. Evolv is laser-focused on helping organizations embrace a risk management strategy that recognizes lower risk, pre-screened or “known” audiences and enables them to pass quickly and unobtrusively into a venue so security can focus their most rigorous screening on the few unknown visitors. For us, embracing technology that takes the friction out of the physical screening process is as much about the guest experience as it is about improving the physical security posture for our customers.
Tomorrow: Evolving Security for the New-World Paradigm
Ultimately, there’s a need for security that didn’t exist a few years ago and yesterday’s tools were not designed to address new threats. The same handheld or walk-through metal detectors and X-ray imaging systems that were deployed more than 50 years ago are still the primary screening solution used today. Combining the power of AI, more specifically machine learning, with smarter sensors and human IQ provides a more intelligent, informed solution. As we look to the future and the need to be more nimble than our adversaries, we’ll see sensors, deep learning and biometrics increasingly leveraged to seamlessly detect threats while making it easier for the general public to “just walk through,” giving guards and security professionals the information they need to quickly and confidently assure a safe environment for their visitors.
Throughout our journey, we’ve had the benefit of a tremendous support network, including our investors, advisors, employees and, most importantly, our customers. We remain grateful for the guidance and never-ending energy from all our stakeholders. We hope to make a difference in this world, and our ever-expanding team is critically important to making that happen. We hope you’ll continue to join us on our journey, as we work to scan millions more and enable safety anywhere, at the pace of life.
Want to be a part of our journey? Check out our open positions.
Safeguarding Against Insider Threat, Oakland International Airport Enhances Employee Screening Program
Dave Mansel is the Aviation Security Manager at Oakland International Airport, California. –
Oakland International Airport is known for its commitment to advancing innovative solutions to complex security operations. Recently, the Airport was selected as a TSA Innovation Task Force Site, a prestigious distinction that promotes improved efficiency and allows the Airport to try technologies to benefit its growing passenger base, to help the TSA apply lessons learned around the country.
We had an opportunity to talk with Dave Mansel, aviation security manager for the Airport about his decision to implement a new solution for threat detection and prevention. Oakland International installed an Evolv Edge system to enhance its employee screening program.
Q: What led you to seek a new threat detection solution to enhance your employee screening program?
A: Oakland International is the second busiest airport in northern California, and we’ve been growing on a consistent basis for four years. We had more than 13 million people travel through the airport in 2017, the most traffic we’ve ever seen. We expect that growth to continue. Obviously, we need more people working here to accommodate such growth, and we need innovation to make sure we provide a safe work environment and an efficient, non-disruptive screening experience for our employees.
Q: How is that threat detection screening experience different now that you’re using the Evolv Edge?
A: Prior to Evolv Edge, employees were screened using a variety of techniques and equipment, including walk-through and handheld metal detectors, and full-body pat downs. Now, employees pass through the Evolv Edge at walking speed, without having to empty their pockets or submit to invasive search procedures.
Q: How did you learn about the Evolv Edge?
A: We knew that a few other airports in the US were using it for employee screening, so we agreed to meet with the Evolv team at the ACI-NA Public Safety and Security Conference last fall. We recognized immediately that it was a good fit. Evolv helped us quickly get a test unit in place, and it has performed well.
Q: What are the main reasons you decided to proceed from testing to deploy the system?
A: We like that employees like it more than other inspection methodologies. For aviation workers, screening is part of the daily routine during shift check in. Traditional screening methods have been slow and invasive, including pat downs and physical examination of personal belongings. Simply stated, they are viewed as inconvenient.
Being able to speed up the screening process and make it less invasive is a big win. With Evolv Edge, employees “just walk through” – the system screens the employee and their belongings which provides for a fast, friction-free screening process. This is a welcome change compared to manual screening and traditional methods that were slow and required divestment and physical searches. These features are a plus for today’s employees and will support our growth.
The fact that the system is mobile is a plus. We can use it throughout the entire airport, to try it for different use cases. Safety and security is our number one priority, and Evolv Edge provides a good balance between comprehensive employee screening and a seamless experience. With this installation, we feel confident in our ability to protect against today’s threats while also minimizing inconvenience for our employees.
Q: Do you have plans to expand OAK’s use of the Evolv Edge platform?
A: Yes, but this is a future step that will require additional planning.
Read more about examining today’s threats vectors to address tomorrow’s security threats here.
Examining Today’s Threat Vectors to Address Tomorrow’s Security Threats
By David Cohen, security and intelligence expert, former CIA and NYPD, advisor to Evolv Technology –
One quick scan of violent public attacks in the headlines in recent years will convince even the most casual observer that society needs an improved approach to security. Lone gunman kills 58 and wounds more than 500 in Las Vegas. Former student kills 14 students and three staff members at Parkland, Fla., high school. Coordinated terrorist attacks murder 130 in Paris. Three drivers ram pedestrians on London Bridge, killing 8 and injuring 48.
Each incident is alarming and horrific in its own right. When we take a step back, what is also alarming is that these attacks vary in style, type of target and choice of weapon. Adversaries are getting more innovative, less predictable and, thus, more dangerous – underscoring society’s need to stay one step ahead of them.
Identifying the five threat vectors
One critical aspect of combatting adversaries is more clearly defining their motivations. Motivation can range from an ideologically driven, well-planned attack to a targeted release of emotional rage. With this range of motivations in mind, we identified the five threat vectors that incorporate the range of motivations that would produce violence against soft targets:
- Terrorism: Homegrown or instigated from abroad, driven by ideological, religious or political perspectives. Think Paris shootings, London car attacks.
- Active shooter: Irrational decision to kill or injure as many people as possible. Think Las Vegas shootings.
- Workplace (or institutional) violence: Retribution for perceived harm to the perpetrator. Think Florida school shooting.
- Gang-related: Result of planned or spontaneous conflagration.
- One-on-one, spontaneous event: Spontaneous explosion of emotion – rage – by weaponed person.
By incorporating these motivations into a threat assessment, risk managers and security professionals can better recognize adversaries’ strategies and design security plans with a multi-layered security approach that deploys tools that cover the five threat vectors.
Adversaries are innovating…
A major change visible in today’s adversaries is the number and nature of individuals carrying out mass casualty/violent events. Terrorists are no longer trained just at specialized training camps and directed from central locations. Today, the free flow of information and communication across internet and social channels makes it substantially easier for individuals to radicalize, organize and procure weapons.
Perpetrators of mass violence are also able to build improvised explosive devices that contain no metallic content and create easily constructed homemade devices. Newer non-metallic weapons, such as 3D printed guns, pose yet another new threat that traditional security technology cannot detect – which points to the fact that perpetrators of mass murder are much more knowledgeable about the types of countermeasures defenders are deploying.
… So we, too, must innovate
To combat adversaries’ tactics, defenders need to create more versatile and aggressive security plans. Plans need to include intelligence, physical security infrastructure, weapons detection technologies and trained guards or law enforcement professionals. These components form a comprehensive counter violence plan based on both a threat assessment and a vulnerability assessment.
The elements of a new, more innovative approach to security can be found in a “risk-based security” (RBS) methodology. The RBS methodology – the opposite of a one-size-fits-all approach – promotes flexibility and adaptability. This approach helps security leaders evaluate different threats based on a variety of risk factors, plan for the threats and continually revise them as new information becomes available.
Incorporating the right technology
A successful new approach to security must also include a strong focus on weapons detection. Plans should include the ability to detect person-borne weapons including firearms, explosives and other threats. New detection technologies with multiple types of sensors are capable of detecting non-metallic threats as well as more traditional metallic weapons. Ultimately, the weapons detection technologies must be able to change over time with new sensors and improved algorithms.
Security also needs to identify known individuals who may do harm to people or facilities. These may be individuals on a BOLO (be on the lookout) list, former disgruntled employees, individuals previously removed from the premises, or others known to cause trouble. Facial recognition technology can be used to identify these individuals as they enter a facility and provide an alert to the guards or the security operations center. Moving intelligence to the front line is a key enabler to address evolving threats.
The steady flow of horrifying events in newspaper headlines hammers home the point that security threats are not going away nor are they any more predictable over time. Different situations will require different tactics, and tomorrow’s evolving threats will push defenders to exercise new levels of innovation to fend off increasingly dangerous attacks – and the only way to combat the threats is to adopt a new, more holistic approach to security.
Read more here about risk-based security.
About the author
David Cohen is one of the world’s leading authorities on intelligence analysis and operations, with expertise developed over a nearly five-decade career with the Central Intelligence Agency (CIA) as well as with the world’s largest metropolitan law enforcement organization, the City of New York Police Department (NYPD). He served for 12 years as the NYPD Deputy Commissioner for Intelligence, a position established in the wake of the 9/11 attacks. He revolutionized the way the NYPD collected, analyzed and used intelligence, and leveraged traditional intelligence methods and relationships abroad to successfully protect New York City from another terrorist attack.
Risk-Based Security Gets in the Game
By Chris McLaughlin, Vice President, Global Solutions, Evolv Technology –
If you’re coaching a soccer team in the World Cup this summer, you’re going to want to adapt your defensive strategies for each opponent. To stop an aggressive, high-scoring offense, you’ll keep your defenders back and play cautiously. To beat a cagey, clever foe, you’ll apply some pressure to try to force turnovers.
Successful strategists in the security arena face the same kind of tactical issues. The stakes are much higher, of course, but security pros need to deal with their own group of “attackers” who are skillful, resourceful, and motivated to succeed. Soccer coaches can’t deploy a “one-size-fits-all” strategy, and neither can today’s security strategists.
In security, this strategy has a name. It’s called “Risk-Based Security,” RBS for short. If this sounds like a simple, common-sense approach to a serious, complicated issue, it is – sort of. At its core, RBS defines a commitment to flexibility and adaptability to deal with ever-changing threats. It also values the use of “tailored” systems that are designed to mitigate risk, evoke a sense of safety for users, and not present an undue burden on the user population.
The traditional, one-size-fits-all approach to security is cumbersome. It usually involves having security officers physically inspect every person entering a facility, relying heavily on the limited capability of metal detection. This approach provides a service, deflecting obvious traditional threats. But it is costly and slow, and often ineffective without additional capabilities to screen more aggressively.
Security systems that implement a risk-based approach to screening, for example, tend to be more accepted by the public than those that don’t provide any differentiation. A good example of this practice is the TSA PreCheck program. TSA PreCheck leverages a preliminary vetting process that separates “low-risk” passengers from those who are unknown or may require additional screening. By extending the process beyond the airport, TSA has significantly increased the throughput of its PreCheck screening lanes for passengers while mitigating risks and reducing staffing and equipment costs.
A risk-based approach recognizes that while there are no perfect security solutions, those that strategically balance security, access, usability, and cost can ultimately provide the best long- term protection against an evolving adversary.
An effective RBS strategy considers changes in the environment over time, and changes in the risk profile of different groups of people – employees, visitors, and dignitaries – over time. It also puts equal emphasis on technology solutions and more people-focused factors like organizational, managerial, and operational capabilities.
It relies primarily on a short list of components: gauging threats; understanding vulnerabilities; vetting users; identifying users and attaching risk assessments to them and their belongings; routing high-, low- and unknown-risk users through the appropriate security channels; and using equipment to screen personnel and belongings.
A successful risk-based security strategy is reliant on an enterprise approach that not only provides excellent technology to perform physical screening but also ensures that the personnel performing the screening are using the technology appropriately, that people presenting themselves for screening have already been assessed, and those vetted to a higher standard are provided a screening process that is not unduly burdensome.
There is no “silver bullet” or “cookie cutter” enterprise approach. What might work particularly well in office buildings and places of worship, where it is possible to learn more about the regular user, will be different than in public venues where most people presenting themselves may be unknown, and this may present a different threat.
As attackers have expanded their focus, major sporting and public events have become more of a target. The challenge commercial entities have in implementing a risk-based program is two-fold. First, a “known patron” program must be established along with a quick way to validate membership in that program at the entry to the screening system of a facility. Second, a program must tailor the screening process to account for the different risk levels of those entering the venue.
The potential benefits to implementing a risk-based screening program are significant. This approach can create a better experience for known, repeat customers. A risk-based screening program can also improve overall brand perception of a venue by implementing “smart” security solutions. These risk-based solutions help make entering a venue easier while maintaining a level of safety, allowing faster throughput, and thereby mitigating the risk of long queues. Overall security costs can potentially be decreased since people can be screened at a faster rate, requiring less security staff.
Further, while people want the safety that screening systems provide, they do not want to lose the culture, openness, and sense of welcome that make their venue, stadium, or house of worship special. Implementing a risk-based security program provides the best option and allows an organization to tailor a program that fits their culture, so they do not have to sacrifice what they represent for safety.
“One-size-fits-all” security can work in specific, limited situations. But it’s no match for today’s attackers. Successful security strategists, like World Cup contending soccer coaches, make sure they’re prepared. They have their tools, their plans, and their training intact, and they’re ready to defend.
Six Ways to Prevent Soft Targets from Terrorist Attacks
We bet five years ago that soft-target attacks would become the favored tactic of terrorists, particularly if ISIS began to lose ground on the battlefield. Unfortunately, we were right.
Many stadium and arena operators no longer allow visitors to bring backpacks or other bags into their venues. Policies like these were instituted to ensure that the venue can balance the need for effective screening with the need to avoid miserably long security lines.
But there’s no getting around it: for anyone wanting to pack an extra sweater, a snack for the baby or raincoat just in case, this is a big deal–a serious degradation of the customer experience. Unfortunately, such are the compromises security professionals have had to make in this post-ISIS era. Soft-target attacks–everything from sophisticated assaults on iconic arenas to lethal “lone wolf” attacks on unsuspecting neighborhood nightclubs—are on the rise, forcing operators of public venues of all sizes to rethink their security strategies. All too often, venues have had to resort to the oldest, bluntest response: hire more security guards and request more police support and do more thorough physical searches.
We all know that’s not a sustainable response. Throwing labor at the problem is costly in the short-term and economically unsustainable in the long-term. It’s not sure to dissuade a determined terrorist, but may impact your brand. After all, your business is to provide a carefree, entertaining experience for your customer—not to turn a night out into what feels like a visit to a hardened military installation. And when customers complain, we all know who will bear the brunt of the pressure. You will.
Therefore, here are six ways that screening technology can protect soft targets from terrorist attacks:
1: Create an Enhanced Visitor Experience – Deliver security at the pace of life. Visitors are not asked to “pause and pose”. Because it uses high-speed millimeter imaging, the system can screen people at walking speed. Since we need to search for mass casualty weapons, there’s no need to empty one’s pockets and purses into “dog bowls”.
2: Don’t Treat All Threats Equal – Our industry responded impressively after 911, with powerful systems designed to find anything a highly trained terrorist could use to attempt a repeat of that infamous day. The unsophisticated lone wolves who carried out most of the more recent soft-target attacks needed powerful weapons and explosives to cause mass casualties. We’ll look for those—not screwdrivers, razor blades, or other everyday objects with minimal potential for terror.
3: Don’t Deploy Security That is All or Nothing. It’s Complicated. – In the past, the main question for many organizations was whether to deploy screening technology. Like it or not, ISIS has changed that calculation. Now, almost any place where crowds gather can be a target. Look into technology that improves your defenses at all your facilities – whether it is adding another layer of protection to a sports stadium or introducing one to a previously unprotected nightclub or corporate office.
4: Know that Flow Matters – Living in a free society means accepting some risks. Security cannot come at the cost of freedom of movement, freedom from intrusive searches and freedom from inconvenience.
5: Understand that Customer Experience Matters – Minimizing the unpleasantness of screening is not a secondary consideration—not for your customers and visitors, and not for your boss. Our working assumption is that if our technology hurts your ability to retain and attract business, you won’t use it for long. You need to protect your customers and help your business.
6: Consider Future-Proofing Through Software – Powerful software platforms help you easily adjust as new threats emerge. This is crucial to keep you prepared for today’s sophisticated terrorist networks, who use social networks and other tools to quickly share instructions for building more lethal bombs or executing new types of attacks.
It’s time the security industry stepped up with solutions for the reality of today’s world. Our technology is specifically designed to expose the threats behind mass casualty attacks that have become all too common to help your front-line personnel take quick action without inconveniencing your customers.
To learn more, read the three questions security directors need to ask before the next soft target event here.