Danger looms at the 2014 Winter Olympic Games in Sochi, but is Russia's security up to snuff?
Threats of terrorism and extensive security measures suggest that Sochi is preparing to host an Olympics like none other
By Grant Hatchimonji, Senior Editor
The flier states that she may be involved in organizing "a terrorist act within the 2014 Olympic region."
Bringing it all together
What's most important according to Besse, however, is that none of the individual security systems stand alone. "These systems have to be integrated into a single operating package so that very smart people can take all this data that's being gathered and put some analysis to it," he said. "Then, the whole security package can be proactive and preventative in nature."
In other words, the Russians are using their tools for access controls, surveillance, etc., but then taking the data that they generate and coming up with an intelligent package. That way, the data can be put to use for deciding where resources can be allocated or reallocated.
"This seems to be a trend where a major city or enterprise that covers a large geographical area has all kinds of operational issues that they want to be able to control and do so in an intelligent manner," said Besse. Numerous factors including traffic, crowd control, approaches from the nearby Black Sea, railways, airlines, and highways all play into the physical security surrounding the Olympic Games.
"The thing that will really make [the security approach] successful is if they can integrate all these things and set up an intelligent security operation and command center," Besse reiterated. "That way, security forces will have an early warning if some sort of anomaly is going on."
The specific technology that was chosen by Russia to integrate all of the information that security teams are receiving from arms systems, access systems, etc., comes from NICE (Neptune Intelligence Computer Engineering) Systems, an Israeli company that specializes in security and data analysis.
"[NICE] has a large integration system platform that has all kinds of features associated with it," said Besse. "But it takes points of data – video images, radio communications, phone calls, access control alarms – and blends it all into a single operating system that interacts with all of that so that intelligent decisions can be made across a large spectrum of events and geography."
Finally, Besse pointed out that the key to the command centers is that they receive all of the information from the various security measures in real time.
"It's another reason why they need to be integrated into a robust system," he said. "Then they can develop plans, reactions, and responses that are intelligence-based, not just reactive-based."