Subscribe to Monitor This! RSS Feed

Monitor This!

by: Leif Kothe - Monday, August 25, 2014

General George W. Casey, the 36th chief of staff of the U.S. Army, will deliver the keynote address at the CSAA Annual Meeting, slated for Oct. 17-22 at the Fairmont Southampton in Bermuda.

Casey, who led the U.S. Army from April 2007 to 2011, commanded from 2007 to 2007 a multi-national force in Iraq, guiding a coalition of more than 30 countries through some of the most difficult stretches of the Iraq war, a news release from CSAA noted.

“General Casey has a unique story to share with our members,” Steve Doyle, CSAA EVP, said in the release. “His background and experience have formed the basis for his viewpoints on leadership, vision, organizational culture and leading transformational change. I know our members will be impressed with his insights and how they can use them to improve their own businesses.”

Since retiring from his post with the U.S. Army, Casey has lectured on leadership at Columbia, Yale, Denver University and the University of North Carolina business school, while also addressing a number of large corporations.

In addition to the keynote, the education sessions will focus on several themes germane to the monitoring world. Seminars on the schedule will deal with the rise of DIY and self-monitoring systems, monitoring and the Internet of Things phenomenon, and the continued value of central station alarm monitoring.

In the release, CSAA president Jay Hauhn said senior leadership from the national Authorities Having Jurisdiction (AHJ) first responder associations will be present, giving members the chance to talk industry issues with them one on one.

by: Leif Kothe - Wednesday, August 20, 2014

Having written a report this week about SentryNet’s latest campaign to encourage dealers to add accounts and sell new services (while giving them the chance to earn tickets to a cruise), I came across news of another monitoring company making it a bit easier for dealers to do their jobs.

SecurTek, based in Yorkton, Saskatchewan, is offering customers air miles through a recently unveiled partnership with AIR MILES Reward Program. When customers sign standard monitoring contracts, they can now top-up their loyalty rewards tally to earn miles, according to a company statement.

New customers can earn 50 reward miles upon signing a 36- or 60-month contract, and then can earn an additional 50 reward miles on their contract anniversary date if they remain SecurTek customers.

Whether at events put on at industry tradeshows or through promotional campaigns, central stations go to great lengths not only to make dealers feel appreciated but to ensure they’re equipped with the knowledge they need to thrive in the current climate. It’s no surprise. In a boundary-less, IP-based environment where more and more centrals are looking to vault from regional players into national ones, competition is going to increase. As a result, central stations are going to explore new ways to engage dealers and stand out against competitors.

by: Leif Kothe - Wednesday, August 13, 2014

Security Electronics, a home and business security company based in Muskego, Wis., near Milwaukee, recently purchased the accounts of Milwaukee Dynamic Security, a company headquartered on the north end of the Milwaukee metro area.

In a news release from the Davis Mergers and Acquisitions Group, which assisted Milwaukee Dynamic Security in the transaction, Don Larson, founder of Security Electronics, suggested the backyard account purchase will unite a pair of like-minded companies with similar regional roots.

The companies are also compatible on the technical level.  

“We both are in the same central monitoring facility and use much of the same equipment,” Larson noted in the release.

Jim Veith, owner of Milwaukee Dynamic, will remain with the company during the transition period, after which he plans to retire, the release noted.  

In the coming days I plan to connect with personnel at Security Electronics to discuss the implications of the deal, and how the backyard account purchase fits into the company’s near- and long-term strategies.

by: Leif Kothe - Wednesday, August 6, 2014

Dynamark's adoption of Videofied is a further sign the company’s monitoring aspect, more than three years into its renaissance, is continuing to cement its presence in the central station space.  

The company is offering dealers video verification alarms through Videofied’s platform, allowing them to purchase and install the service through Dynamark’s product division, or add the platform to existing installations. The latter alternative will be welcome news to dealers, who have the opportunity to upgrade existing customers drawn to video verification.

In a news release, Dynamark president and CEO Trey Alter said both the product and the monitoring are available to the dealer through the same program. “This makes tech support and sales support virtually seamless, and that makes life easier and more profitable for our dealers,” Alter said in a prepared statement.

Dynamark Monitoring, launched in 2011, last year acquired Dayton, Ohio-based Security Services Center, which brought 40 alarm companies scattered across Ohio, Indiana and Kentucky into its dealer network.

Later in 2013, the company also launched its partner program, a newly created unit led by Hank Groff, SVP of sales, designed to propel the company from a regional to a national player.

In the coming days I plan to get the skinny on the company’s new video verification effort, and to hear what else might be in store for the resurgent Hagerstown, Md.-based central.

by: Leif Kothe - Wednesday, July 30, 2014

Tech publication Wired magazine may not focus too closely on alarm monitoring or residential security, but it does devote a good deal of ink to assessing network security threats, no matter what the context.

Just last month a writer for the magazine, Mat Honan, painted a funny dystopian sketch of the connected home in revolt, commandeered by morally wayward hackers on some perverse quest for Internet notoriety. Identifiable only by screen names evoking bad cyberpunk films from the 90s, these lonesome code junkies are intent on doing everything from dousing homes by activating sprinkler systems to invading your privacy in all the imaginable ways in a home amply stocked with network cameras.

The piece, titled “The Nightmare on Connected Home Street,” is of course meant to be hysterical: The narrator is jarred awake at four a.m. by the blaring pulse of dub step music exploding from his connected pillow. The vignette ends, a few hours later, with a bare and awesomely memorable paragraph: “The skylights open up. The toaster switches on. I hear the shower kick in from the other room. It’s morning.”

It’s all just a thought experiment, but the piece is entertaining and well worth a read.

Interestingly enough, about a month later, Wired turned its attention to security again, this time focusing on concerns that, surprisingly, have nothing to do with Internet connected devices. This time, the article dealt with security vulnerabilities related to wireless home alarms, which, according to a pair of researchers cited in the article, could be comprised—the alarm being either suppressed (via “jamming”) or made to deliver false signals. The researchers found identical problems with a number of brands.

The issue, according to the report, has to do with radio frequency signals. While the conversation is understandable for a layman, it can seem a bit arcane. In sum, the researchers found that the systems “fail to encrypt or authenticate the signals being sent from sensors to control panels,” according to the report, “making it easy for someone to intercept the data, decipher the commands, and play them back to control panels at will.” Would-be malefactors, the report says, can do this relatively easily.

The researchers cited in the article—Logan Lamb and Silvio Cesare—plan to present their findings at the Black Hat security conference, a computer security conference held in Las Vegas next week. I’m eager to here more about their findings and to see what kind of impact the research could have.  

by: Leif Kothe - Wednesday, July 30, 2014

Tech publication Wired magazine may not focus too closely on alarm monitoring or residential security, but it does devote a good deal of ink to assessing network security threats, no matter what the context.

Just last month a writer for the magazine, Mat Honan, sketched a funny, dystopian picture of the connected home in revolt, commandeered by morally wayward hackers on some perverse quest for Internet notoriety. Identifiable only by screen names evoking bad 90s cyberpunk films, these lonesome code junkies are intent on doing everything from dousing homes by activating sprinkler systems to invading your privacy in all the imaginable ways in a home well stocked with cameras.

The piece, titled “The Nightmare on Connected Home Street,” is of course meant to be hysterical: The narrator is jarred awake at four a.m. by the pulse of dub step music exploding out of his connected pillow. The vignette ends, a few hours later, with a bare and awesomely memorable paragraph: “The skylights open up. The toaster switches on. I hear the shower kick in from the other room. It’s morning.”

It’s all just a thought experiment, but the piece is entertaining and well worth a read.

Interestingly enough, about a month later, Wired turned its attention to security again, this time focusing on concerns that, surprisingly, have nothing to do with Internet connected devices. This time, the article dealt with security vulnerabilities related to wireless home alarms, which, according to a pair of researchers cited in the article, could be comprised—the alarm being either suppressed (via “jamming”) or made to deliver false signals. The researchers found identical problems with a number of brands.

The issue, according to the report, has to do with radio frequency signals. While the conversation is understandable for a layman, it can seem a bit arcane. In sum, the researchers found that the systems “fail to encrypt or authenticate the signals being sent from sensors to control panels,” according to the report, “making it easy for someone to intercept the data, decipher the commands, and play them back to control panels at will.” Would-be malefactors, the report says, can do this relatively easily.

The researchers cited in the article—Logan Lamb and Silvio Cesare—plan to present their findings at the Black Hat security conference, a computer security conference held in Las Vegas next week. I’m eager to here more about their findings and to see what kind of impact the research could have.  

by: Leif Kothe - Wednesday, July 30, 2014

Tech publication Wired magazine may not focus too closely on alarm monitoring or residential security, but it does devote a good deal of ink to assessing network security threats, no matter what the context.

Just last month a writer for the magazine, Mat Honan, sketched a funny, dystopian picture of the connected home in revolt, commandeered by wayward hackers on some perverse quest for Internet notoriety. Identifiable only by screen names evoking bad cyberpunk movies, these lonesome code junkies are intent on doing everything from dousing homes with sprinkler systems to invading your privacy through in-home network cameras .

The piece, titled “The Nightmare on Connected Home Street,” is supposed to seem nearly implausible. The narrator is jarred awake at four a.m. by the pulse of dub step music exploding from his connected pillow. The piece ends, a few hours later, with the bare and awesomely memorable paragraph: “The skylights open up. The toaster switches on. I hear the shower kick in from the other room. It’s morning.”

It’s all just a thought experiment, of course, but the piece is thought-provoking and well worth a read.

Interestingly enough, about a month later, Wired turned its attention to security again, this time focusing on vulnerabilities that have nothing to do with IP devices. This time, the article dealt with security concerns related to wireless home alarms, which, according to a pair of researchers cited in the article, could be compromised—the alarms either being suppressed (via “jamming”) or made to deliver false signals. The researchers found identical problems among a number of brands.

The issue apparently has to do with radio frequency signals. While the conversation is understandable enough for a layman, it can drift into the arcane. In sum, the researchers found that the systems “fail to encrypt or authenticate the signals being sent from sensors to control panels," the report said, “making it easy for someone to intercept the data, decipher the commands, and play them back to control panels at will.” Would-be malefactors, the report says, can do this relatively easily.

A vulnerability is a vulnerability, and certainly no security company wants there to be any possibility of a system being hacked. But it should probably be mentioned that while these techniques may come across as elementary to the reading community of Wired Magazine, these methods would probably be, for your run-of-the-mill burglar, well above the norm from a sophistication standpoint.

The researchers cited in the article—Logan Lamb and Silvio Cesare—plan to present their findings at the Black Hat security conference, a computer security conference scheduled next week in Las Vegas. For my part, I’ll be eager to hear more about their findings and to see what kind of impact the research could have.

by: Leif Kothe - Wednesday, July 30, 2014

Tech publication Wired magazine may not focus too closely on alarm monitoring or residential security, but it does devote a good deal of ink to assessing network security threats, no matter what the context.

Just last month a writer for the magazine, Mat Honan, painted a funny dystopian sketch of the connected home in revolt, commandeered by morally wayward hackers on some perverse quest for Internet notoriety. Identifiable only by screen names evoking bad cyberpunk films from the 90s, these lonesome code junkies are intent on doing everything from dousing homes by activating sprinkler systems to invading your privacy in all the imaginable ways in a home amply stocked with network cameras.

The piece, titled “The Nightmare on Connected Home Street,” is of course meant to be hysterical: The narrator is jarred awake at four a.m. by the blaring pulse of dub step music exploding from his connected pillow. The vignette ends, a few hours later, with a bare and awesomely memorable paragraph: “The skylights open up. The toaster switches on. I hear the shower kick in from the other room. It’s morning.”

It’s all just a thought experiment, but the piece is entertaining and well worth a read.

Interestingly enough, about a month later, Wired turned its attention to security again, this time focusing on concerns that, surprisingly, have nothing to do with Internet connected devices. This time, the article dealt with security vulnerabilities related to wireless home alarms, which, according to a pair of researchers cited in the article, could be comprised—the alarm being either suppressed (via “jamming”) or made to deliver false signals. The researchers found identical problems with a number of brands.

The issue, according to the report, has to do with radio frequency signals. While the conversation is understandable for a layman, it can seem a bit arcane. In sum, the researchers found that the systems “fail to encrypt or authenticate the signals being sent from sensors to control panels,” according to the report, “making it easy for someone to intercept the data, decipher the commands, and play them back to control panels at will.” Would-be malefactors, the report says, can do this relatively easily.

The researchers cited in the article—Logan Lamb and Silvio Cesare—plan to present their findings at the Black Hat security conference, a computer security conference held in Las Vegas next week. I’m eager to here more about their findings and to see what kind of impact the research could have.  

by: Leif Kothe - Wednesday, July 16, 2014

The Electronic Security Association has installed Marshall Marinace, owner of Yorktown Heights, N.Y.-based Marshall Alarm Systems, as its president for the next two years.

Marinace’s presidency was one of five new officer appointments announced at ESA’s annual membership meeting held during ESX 2014 in Nashville.

Marinace has been involved in the security industry for 38 years, and his alarm company was founded in 1976. He also has a longstanding involvement with ESA, serving in several different capacities with the association, including multiple terms as vice president, chairperson of the Membership Committee and liaison to the Standards and Fire Life Safety Committee, among other roles, according to an ESA news release.

“Having been involved with association boards and committees for the past 30 years and counting, my personal goal is to continue the legacy and ongoing development of strong leadership that has made ESA the foremost industry association,” Marinance said in a prepared statement. “I am therefore honored and humbled to have been given the opportunity to fill the role as ESA president for the next term.”

The following industry practitioners were also elected to ESA roles:

-- Dee Ann Harn, CEO of RFI Enterprises, elected to one-year term as vice president

-- Chris Mosley, president of Complete Security Systems, elected to two-year term as vice president

-- Angela White, executive vice president of Central 1 Security, elected to two-year term as vice president

-- Jon Sargent, industry relations / government affairs for Tyco Integrated Security, elected to two-year term as secretary

by: Leif Kothe - Tuesday, July 8, 2014

The ADT Corporation announced yesterday that it has closed its acquisition of Canadian monitoring giant Protectron.

ADT, which executed a definitive agreement to acquire Reliance Protectron in April, acquired the company for total cash consideration of CAD $555 million.

ADT has now officially added 400,000 customers and 31,000 accounts north of the border, worth approximately $11 million in RMR.

ADT, which already has two central stations in Canada, adds four more through the acquisition. Protectron, a portfolio company of investment funds managed by Alinda Capital Partners, has 900 employees. Its customer base is 75 percent residential.

ADT’s plan, as stated at the time it agreed to acquire the company, is to use the acquisition as the platform for a stand-alone business in Canada with a dedicated management team, a move designed to address the country’s specific market needs. In a news release, ADT said it planned to continue to using the Protectron brand under ADT ownership.

In late April, following the acquisition agreement, Lee Jackson, regional VP Canada, said it was too early to say whether ADT would keep all six Canadian central stations in operation. He noted that ADT has yet to determine which resources and administrative functions it will transfer to Canada to supports its expanded account base in that country, now up to 800,000.

The acquisition goes down as ADT’s largest since becoming an independent company, far surprassing its 2013 Devcon deal, according to John Mack, EVP and managing director at Imperial Capital, who spoke to SSN when the agreement to acquire became public. At the time, Mack said the deal signals a return to “growth initiatives [through] high quality acquisitions” and predicted the deal would help ADT’s attrition profile while bolstering its enhanced services sales.

It will be interesting to wait and see if Mack's words prove to be prophetic.

Topic:

Pages