• Archive for the Category » Physical Security Systems «

    White Paper- A Box 4 U SAFETYsuite: Productivity Inside Blast Resistant Outside

    We are pleased to introduce Mr. Ross Draney, who heads up A Box 4 U’s Safety and Security Division , as he and the company’s founder discuss the SAFETYsuite and its underlying technology. KTC has chosen A Box 4 U based on our history providing safe spaces throughout our industry. We offer both a standard leasing fleet and custom SAFETYsuites which include: • Control Rooms • SCADA Node Structures • Change Rooms • Continue Reading

    White Paper-KTC and Cyber Defense: Why the Cyber Pearl Harbor Comment Should Hit Home

    The US Secretary of Defense is not known as a “hyper” person; it is hard to expect that he suddenly has fallen into hyperbole. Indeed, KTC has been working in cyber warfare and cyber defense for many years. Many other firms and many people have been as well. But the work has been mostly in the darkness, not only so-called “Black” programs – but literally in the closed office/carrel where someone sits glued to a computer screen. In fact most hackers are lone wolves, and most corporations and government groups think those wolves are their enemy and so they create a smallContinue Reading

    White Paper-Jamming at the Gate, Part Two

    In Part One (“Offensive Side”) we discussed the use of jamming technology to effect spectrum control and protection (active, purposeful denial or “blanking” of some or all of the communication frequencies of potential use by adversaries or Opposing Forces [OPFORS]). The “Defensive Side”, which is discussed here, is the OPFORS’ use of jammers designed to defeat Friendly Forces’ sensors and communication subsystems and the Counter-Electronic Countermeasures used to defeat these attacks. These countermeasures are often called PSIM or Physical Security Information Management – known to most designers of large scale security systems as the preferred all-encompassing electronic security system. “Physical Security Information Management,Continue Reading

    White Paper- Jamming at the Gate, Part One

    Not a reference to music but a hot topic nonetheless. This two-sided issue is often the “non-issue” or the topic professionals prefer to overlook or not discuss with clients. Side one (“Offense”): the use of jamming technology to effect spectrum control and protection (active, purposeful denial or “blanking” of some or all of the communication frequencies of potential use by adversaries or Opposing Forces [OPFORS]). All systems are monitored, extensively. IT Security   Side two (“Defense”): OPFORS’ use of jammers designed to defeat Friendly Forces’ sensors and communication subsystems and the Counter-Electronic Countermeasures used to defeat these attacks. This blog entry is focused onContinue Reading