Download as pdf or txt
Download as pdf or txt
You are on page 1of 45

The Five Technological Forces

Disrupting Security: How Cloud, Social,


Mobile, Big Data And IoT Are
Transforming Physical Security In The
Digital Age 1st Edition Edition Steve
Van Till
Visit to download the full and correct content document:
https://ebookmass.com/product/the-five-technological-forces-disrupting-security-how-
cloud-social-mobile-big-data-and-iot-are-transforming-physical-security-in-the-digital-a
ge-1st-edition-edition-steve-van-till/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Critical Security Studies in the Digital Age: Social


Media and Security Joseph Downing

https://ebookmass.com/product/critical-security-studies-in-the-
digital-age-social-media-and-security-joseph-downing/

People-centric security : transforming your enterprise


security culture 1st Edition Hayden

https://ebookmass.com/product/people-centric-security-
transforming-your-enterprise-security-culture-1st-edition-hayden/

Physical Security Principles

https://ebookmass.com/product/physical-security-principles/

The EU, Irish Defence Forces and Contemporary Security


Jonathan Carroll

https://ebookmass.com/product/the-eu-irish-defence-forces-and-
contemporary-security-jonathan-carroll/
IoT for Defense and National Security Robert Douglass

https://ebookmass.com/product/iot-for-defense-and-national-
security-robert-douglass/

The Big Picture: How to Use Data Visualization to Make


Better Decisions■Faster Steve Wexler

https://ebookmass.com/product/the-big-picture-how-to-use-data-
visualization-to-make-better-decisions%e2%80%95faster-steve-
wexler/

Cybersecurity and Decision Makers: Data Security and


Digital Trust Marie De Fréminville

https://ebookmass.com/product/cybersecurity-and-decision-makers-
data-security-and-digital-trust-marie-de-freminville/

Machine Intelligence, Big Data Analytics, and IoT in


Image Processing Ashok Kumar

https://ebookmass.com/product/machine-intelligence-big-data-
analytics-and-iot-in-image-processing-ashok-kumar/

Cloud Computing: Concepts, Technology, Security &


Architecture Thomas Erl & Eric Barceló Monroy

https://ebookmass.com/product/cloud-computing-concepts-
technology-security-architecture-thomas-erl-eric-barcelo-monroy/
The Five Technological
Forces Disrupting Security
This page intentionally left blank
The Five Technological
Forces Disrupting Security
How Cloud, Social, Mobile, Big Data
and IoT are Transforming Physical
Security in the Digital Age

Steve Van Till


Bethesda, MD, United States
Butterworth-Heinemann is an imprint of Elsevier
The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, United Kingdom
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States

© 2018 Elsevier Inc. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or any information storage and retrieval system,
without permission in writing from the publisher. Details on how to seek permission, further information
about the Publisher’s permissions policies and our arrangements with organizations such as the
Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website:
www.elsevier.com/permissions.

This book and the individual contributions contained in it are protected under copyright by the Publisher
(other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden
our understanding, changes in research methods, professional practices, or medical treatment may
become necessary.

Practitioners and researchers must always rely on their own experience and knowledge in evaluating and
using any information, methods, compounds, or experiments described herein. In using such
information or methods they should be mindful of their own safety and the safety of others, including
parties for whom they have a professional responsibility.

To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any
liability for any injury and/or damage to persons or property as a matter of products liability,
negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas
contained in the material herein.

Library of Congress Cataloging-in-Publication Data


A catalog record for this book is available from the Library of Congress

British Library Cataloguing-in-Publication Data


A catalogue record for this book is available from the British Library

ISBN: 978-0-12-805095-8

For information on all Butterworth-Heinemann publications


visit our website at https://www.elsevier.com/books-and-journals

Publisher: Candice Janco


Acquisition Editor: Candice Janco
Editorial Project Manager: Hilary Carr
Production Project Manager: Punithavathy Govindaradjane
Cover Designer: Mark Rogers

Typeset by SPi Global, India


To the kids out there still trying to build the
SmartBox—best of luck.
This page intentionally left blank
Contents

ABOUT THE AUTHOR ...................................................................................xiii


PREFACE ....................................................................................................... xv
ACKNOWLEDGMENTS.................................................................................. xix

CHAPTER 1 From Packages to People .................................................... 1


The Consumerization of Security ..................................................... 3
Early Clouds, Sunny Skies................................................................ 4
An IoT Story ...................................................................................... 5
From Premobile to Mobile First ...................................................... 7
Big Data in Its Infancy ...................................................................... 8
Social Spaces.................................................................................... 9
Dot-Com Redux in Physical Security ............................................. 11
Technology Adoption in Physical Security ..................................... 11

Section 1 The Cloud


CHAPTER 2 The Run-Up to Cloud .......................................................... 17
Cloud Meets an Industry of Late Adopters.................................... 17
Skating to Where the Puck Has Been ........................................... 18
SaaS by Any Other Name ............................................................... 19
Marketers Run With It .................................................................... 20
Internet Protocol Blazes the Trail ................................................. 21
Before We Called It "Cloud"........................................................... 22
Five Essential Characteristics and Why They Matter....................22
Service Models: Applications vs Infrastructure ............................ 25
Deployment Models: Public Clouds vs Private Clouds .................26
CHAPTER 3 The Tipping Point ................................................................ 29
The Drivers of Adoption.................................................................. 29
A Balanced View of Cyber Risks .................................................... 30
Beyond Stack-a-Box ....................................................................... 30
Are We More Conservative Than Our Customers? ....................... 31
vii
viii Contents

A Foothold for Cloud ...................................................................... 32


Leading Indicators .......................................................................... 33
The Barriers Are Down .................................................................. 33
Easier for New Entrants................................................................. 34
Start-Ups Show Up to the Game.................................................... 35
The Innovator’s Dilemma ............................................................... 35
Disruption ....................................................................................... 36
What Is My Cloud Strategy? ........................................................... 37

Section 2 Mobile
CHAPTER 4 Going Mobile ....................................................................... 41
The Desk in Our Pockets................................................................ 42
Mobile First..................................................................................... 43
The Interactive Paradigm ............................................................... 44
The Toothbrush Test ...................................................................... 45
Retention Matters........................................................................... 46
Adoption .......................................................................................... 47
CHAPTER 5 Security Ecosystems........................................................... 49
The Desktop Reincarnated ............................................................. 50
Apps Have a Field Day.................................................................... 51
Mobile Credentials.......................................................................... 52
Interactive Security......................................................................... 53
Middleware for the Real World...................................................... 54
One Key to Rule Them All .............................................................. 56
ApplePay for Spaces....................................................................... 58
Don’t We Get Any Standards Out of This? ..................................... 58
CHAPTER 6 Altered Presence ................................................................ 61
Presence ......................................................................................... 61
Passive Surveillance....................................................................... 62
Known Knowns, Known Unknowns, and Unknown
Unknowns ....................................................................................... 63
Anthrometrics: Web Metrics IRL ................................................... 65
A Jewelry Case in Point ................................................................. 66
Breathing the Data Exhaust ........................................................... 67
CHAPTER 7 What Can Mobile Do for Me?.............................................. 69
What’s in It for Me? ........................................................................ 69
Real-Time Situational Awareness ................................................. 70
Small Business............................................................................... 71
Multilocation Businesses ............................................................... 71
Property Management.................................................................... 72
Contents ix

What About Residential? ................................................................ 73


Biometrics & Multifactor Authentication....................................... 74
Transformation ............................................................................... 75
What’s My Mobile Strategy?........................................................... 76

Section 3 The Internet of Things (IoT)


CHAPTER 8 Why IoT Matters in Security ............................................... 83
Security: Already an IoT Business ................................................. 84
Ground Zero.................................................................................... 85
What Is IoT, Anyway?...................................................................... 86
A Projection .................................................................................... 87
It’s All About the Data .................................................................... 89
Cheaper, Smaller, and More Discreet ........................................... 90
Big Wave or The Biggest Wave? .................................................... 91
IoT Will Become Part of Everything............................................... 92
The Industrial Internet of Things ................................................... 94
CHAPTER 9 All Security Is Now Cybersecurity...................................... 97
Life Imitating Art............................................................................. 98
A Global, Residential, Commercial, and Even
Universal Risk................................................................................. 99
Cloud Security Redux…But Worse .............................................. 100
Device Authentication: Do I Know You? ....................................... 101
Orphans Without Governance ...................................................... 102
The Update Treadmill................................................................... 103
A Path Forward............................................................................. 105
CHAPTER 10 IoT Technology and Standards ..........................................107
The Need for Standards ............................................................... 109
Architecture Matters .................................................................... 111
Building Blocks............................................................................. 112
Gateways to the Future ................................................................ 114
Wireless Whirlwind....................................................................... 115
The Standards Battlefield ............................................................ 117
Current State of Play.................................................................... 119
Standards Organizations and Consortia ...................................... 120
Proprietary Frameworks .............................................................. 123
CHAPTER 11 The New Playing Field.......................................................127
What’s Old Is New—At Least for Startups .................................. 128
Large Tech & Telecom Eye Physical Security—Again ................ 130
Consumerization and IoT ............................................................. 132
Will IoT be Disruptive? ................................................................. 134
x Contents

Adoption ........................................................................................ 134


Strategy......................................................................................... 135
Coda: Is IoT Really a Category? ................................................... 135

Section 4 Data: Bigger, Smarter, Faster


CHAPTER 12 Bigger.................................................................................139
Can Big Data Save Your Life? ...................................................... 140
Big Data Defined: The Four V’s.................................................... 141
The Case of the Missing Data ...................................................... 142
The Road to Volume ..................................................................... 144
How Not to Think About Big Data ................................................ 145
CHAPTER 13 Smarter ..............................................................................147
What Do We Want to Know? ........................................................ 147
Not One Size Fits All .................................................................... 148
From Variety to Video and Back................................................... 150
Big Security Data and ROI ............................................................ 152
Methods to Cut Through the Madness ........................................ 153
CHAPTER 14 Faster .................................................................................161
Data Velocity ................................................................................. 162
Lessons From Cyber Security...................................................... 164
Artificial Intelligence .................................................................... 166
Machine Learning ......................................................................... 168
Real Time Analytics...................................................................... 170
CHAPTER 15 Data-Driven Security .........................................................173
The Emergence of Data Analytics in Security ............................. 174
Where Are the Solutions? ............................................................ 175
Big Data, Now Arriving in the Cloud ............................................ 175
Data Priorities............................................................................... 176
The Lack of Standards for Security Events ................................. 177
Adoption, Transformation, and Strategy...................................... 178

Section 5 Social + Identity


CHAPTER 16 Who Are You?.....................................................................183
What’s in a Token? ....................................................................... 184
Social Me Is the New Me.............................................................. 185
The Holy Grail of Universal Identity ............................................. 186
Identity Is the New Perimeter...................................................... 188
Contents xi

CHAPTER 17 Social Saves Lives..............................................................191


Virtual Social Media Working Group ............................................ 192
The United Nations....................................................................... 192
Social Media for Emergency Management (#SMEM).................. 193
Power Shift ................................................................................... 193
Not Your Kid’s Social Media ......................................................... 195
CHAPTER 18 On the Internet, No One Knows You’re a Dog ..................197
Identity as a Service ..................................................................... 198
What Is an Identity Standard? ...................................................... 199
Authentication vs Authorization ................................................... 199
Authentication Standards ............................................................. 200
CHAPTER 19 Social Spaces .....................................................................203
What Does it Mean to be a Social Space? ................................... 204
It’s All About Identity .................................................................... 206
Communication and Crowdsourcing............................................ 206
Security as a Customer Experience............................................. 207
Disruption ..................................................................................... 208
Strategy......................................................................................... 209

Section 6 The Future


CHAPTER 20 The Secrets of the Universe..............................................213
Adoption Scorecard ...................................................................... 214
My Generation............................................................................... 218
A New Mission for Security .......................................................... 219
What Goes Around Comes Around .............................................. 219

INDEX ...........................................................................................................221
This page intentionally left blank
About the Author

Steve Van Till is the cofounder, president, and CEO of Brivo Systems, a pioneer-
ing cloud services provider of access control, video surveillance, mobile, and
identity solutions delivered as a SaaS offering. He also served since 2011 as
chairman of the Standards Committee of the Security Industry Association.
He is a frequent author and speaker for numerous security publications and
forums and the inventor of numerous patents in the field of physical security.
In 2009, Steve was honored by Security Magazine as one of “the top 25 most
influential people in the security industry.”
Mr. Van Till was previously Director of Internet consulting for Sapient Corpo-
ration, where he led client strategy engagements for the first wave of the dot-
com era. At the health-care informatics company HCIA, Steve was responsible
for Internet strategy for data analytics services. Steve also has over 10 years’
experience in wireless communications as Vice President of software develop-
ment at GeoStar and as Director of Systems Engineering at Communications
Satellite Corporation (Comsat).
Steve lives in Fulton, Maryland, with his wife, Robin.

xiii
This page intentionally left blank
Preface

We are fortunate to be living in one of the most exciting times in the history of
modern technology. Dozens of technological currents have converged and
amplified and remixed with each other to accelerate the pace of innovation
beyond anything mankind has ever seen. We are simultaneously living in a time
when physical security—or, more to the point, lapses in physical security—has
become a regular and unfortunate part of the daily news. But physical security is
no longer just physical. Modern security systems are now thoroughly cyber-phys-
ical systems, which means that they have inherited both the power and the pit-
falls of the digital world.
The past 30 years have witnessed many major technology explosions that have
changed the way we interact with each other and our world. Millions gained
their first computing experience during the PC era. The Internet—with a little
help from some friends—coalesced these individual computing experiences
into the collective experience of social networks that have the potential to con-
nect every person on the planet. The smartphone then assured that we didn’t
have to leave home without it. And now, before our eyes, we are watching
the rise of the Internet of things, along with the big data and analytic systems
necessary to make sense of the unprecedented volumes of data they create.
Physical security is right in the middle of these upheavals. It is being trans-
formed by the five technological forces that have become the signature change
agents of our era: cloud, mobile, IoT, big data, and social networks. How and
where these changes are taking place, as well as the effects they will have on the
practice and business of security, are the subjects of this book.
The technology adoption life cycle is a widely used framework for understand-
ing the acceptance of new technologies, and it fits the change we are witnessing
across the physical security market. The life cycle consists of five stages of adop-
tion. The so-called “innovators” and “early adopters” and “early majority” are
at the front end, while the “late majority” and “laggards” take up the rear.

xv
xvi Preface

When I venture to observe to industry insiders that the physical security indus-
try has generally fallen in the middle of the adoption pack—somewhere
between the early and late majority—most of them remark that I might be a
little too generous. The industry is slower than that, they say. The languid adop-
tion rate of Internet Protocol (IP) technology is a case in point, where security
products were late to the game by a good 10 years compared with our brethren
in IT. More recently, for a market shift as major as cloud computing, the indus-
try has been just barely in front of the laggards. Need proof? Contrast the cur-
rent sub-five-percent cloud adoption rate in commercial security with the
eighty-plus-percent adoption across the rest of the IT spectrum.
This circumspection isn’t all bad: customers know what to buy, producers know
what to make, and investors know where to place their bets.
But the playing field is changing. The five forces of technological transforma-
tion—cloud, mobile, IoT, big data, and social networks—have become too
strong to ignore, even in a context of cautious adoption. In combination, they
are producing security products that are vastly better than their forebears. In
combination, they are lowering the cost of entry for innovators. In combina-
tion, the historical barriers will not stand.
While the interplay and interdependence between the five forces are impossible
to ignore, this book is organized to examine each of these forces in turn. Nat-
urally, there is some crossover within each topic, but for the most part, you can
follow your interests along the lines of the five major sections.
In Section 1, we look at the current state of cloud computing in the physical
security industry and how it is disrupting the on-premise computing paradigm.
While the industry has always recognized the power of centralized computing
for alarm monitoring, it has been paradoxically slow to widen that stance for
cloud computing in general. By the same token, the subscription model of
software-as-a-service (SaaS) should have been a cinch for an industry that
has been largely structured around recurring revenue business models. Instead,
the inertia of perennial concerns about cloud security and reliability has damp-
ened the acceleration common across other markets. We’ll look at what’s hap-
pening next as fears subside, distribution models adapt, and new entrants
disrupt the status quo.
In Section 2, we look at how mobile technologies are changing security admin-
istration, the interaction between buildings and their occupants, and identity
and access management. As in almost every other software domain, the notion
of “mobile first” is changing the product priorities of security system developers
and changing the job description of practitioners from guards to CSOs. Previ-
ously constrained to the desktop, professionals who interact with modern elec-
tronic security systems are freed from their desks yet retain the same richness of
Preface xvii

data, command, and control. As every major security event reminds us, the
ubiquity and connectivity of mobile networks are an indispensable tool in
emergency response. On a less dramatic note, mobile is changing the customer
experience of employee, tenant, and guest interactions from an inconvenience
to a positive “customer interaction” opportunity for security organizations.
In Section 3, we see that the Internet of things (IoT) phenomenon finds one of
its most fertile fields of use in the physical security domain. That’s no surprise,
because conceptually, the electronic security industry has been using IoT since
well before it crested the current hype cycle. The largest contribution that IoT
will make to security is in the proliferation of sensors that add to the data avail-
able for decision-making. Even devices that are not formally a part of the secu-
rity system will generate “data exhaust” with security value we can all mine. But
along with this rise of available data, there will be a huge increase in the avail-
able attack surface to be exploited by hackers. The challenge for practitioners
will be to leverage these technologies while harnessing the data and protecting
both physical and network infrastructures.
In Section 4, smart data, the use of large scale data analysis is examined as an
up-and-coming tool in the future of security. But we are not there yet. While big
data has made huge inroads in fields from medicine to physics to retail behav-
ior and stock market analysis, it has been curiously absent from the physical
security domain. The delayed adoption of cloud computing has been a major
impediment in this regard, because it is the platform on which big data systems
naturally flourish. Instead, what we find across the electronic security landscape
is an archipelago of millions of small systems that each keep their data separate
from the others, thereby thwarting large scale analysis.
In Section 5, social networking technologies are viewed as an example of how
identity and access management (IAM) is moving onto new platforms. Using
the organizing principle of “social spaces,” we identify how social technologies
will impact the physical security domain. The use of social log-ins, previously
confined to accessing virtual spaces such as web sites, is becoming available as a
means to authenticate ourselves to real physical spaces. This works because
social identities are a unique identifier that can replace the many tokens we
carry around for each individual space we interact with today. Currently used
by billions of people, social networks may also prove to be a valuable commu-
nication channel to enhance the practice of security. With the networks in
place, crowdsourcing may become a way to harness the power of the crowd
for participatory security.
In closing, we look at adoption rates for each technology and what these
changes might mean to the future of the physical security. The consumerization
of commercial security is a thread that runs through many of the anticipated
xviii Preface

changes, shadowing the consumerization of IT that has been remaking that


industry since the new millennium.
I’ve taken the literary license of opening this book with a somewhat personal
narrative that describes the origin story of Brivo Systems. This start-up was my
vehicle into the security industry and followed a path that wove its way through
all five of these forces. I hope that in sharing this journey, I can convey the deep
passion and optimism that I have for our industry and our future.
Steve Van Till
Bethesda, MD, United States
Acknowledgments

A book never has just one author, because experience is the author of every-
thing, and it’s a large stage with many players.
First, I thank my wife Robin, who quietly supported me through the many
weekends of foregone social plans, the 4:00 a.m. daily writing regimen, and
my almost constant obsession with “the book” over these past 2 years.
I offer special thanks to Bob Fealy—an investor, a mentor, and, most impor-
tantly, a friend. While Bob was the president of Duchossois Technology Part-
ners, he was among the first to understand the vision of Internet-enabled
devices improving life for millions of people. His ongoing support and advice
were critical to the growth of the company that took me on this journey, as I am
sure they are to the many others he has advised.
I would also like to thank the cofounders of Brivo—Carter, Mark, and Tim—for
convincing me to leave my day job to create a successful dot-com company and
live to tell about it.
And I thank all employees of Brivo—present and past—for the part of your-
selves that you contributed to the success of this story and for your help in
changing an industry.

xix
Another random document with
no related content on Scribd:
Zeph. ii. 4;
Zech. ix.
5, 7
ELAH, Valley 1 Sam. xvii. Wâdy es Sŭnt 14 The scene of the
of 2, 19; xxi. conflict and
(R.V. ELAH, 9 death of Goliath.
Vale of, ‘or Now called
Terebinth’) Wâdy es Sŭnt,
which passes
Shocoh and
Gath
immediately on
the north. (Mem.
III.; Sh. XVII.)

ELAM Gen. xiv. 1, The Susiana and


9; Isa. xi. Persia of the
11; xxi. 2; Greeks.—
Jer. xxv. Grove’s Bible
25; xlix. Index.
34–39;
Ezek.
xxxii. 24;
Dan. viii. 2

ELATH, or Deut. ii. 8; Close to — ‘Beside Ezion-


ELOTH 1 Kings ix. ʾAkabah geber, on the
26; 2 Ailah shore of the Red
Kings xiv. Sea, in the land
22; xvi. 6; of Edom.’ The
2 Chr. viii. present town
17; xxvi. 2 ʾAkabah, or
Ailah, at the
head of the Gulf
of ʾAkabah.

ELEALEH Num. xxxii. el ʾAl 15 The present ruin


3–37; Isa. ‘el ʾAl,’ near
xv. 4; xvi. Heshbon.
9; Jer.
xlviii. 34
ELEASA 1 Macc. ix. Kh. Ilʾasa* 14 Now the ruins
5 Ilʾasa, between
the Upper and
Nether Beth-
horon. (Mem. III.
36; Sh. XVII.)—
Conder.
ELEPH Josh. xviii. Lifta (?)* 14 One of the towns
28 allotted to
Benjamin. The
present village
Lifta (Conder), 2
miles west of
Jerusalem.
ELEUTHERUS, 1 Macc. xi. Nahr el Kebîr — The modern ‘Nahr
The River 7; xii. 30 el Kebîr,’ north of
Tripolis.
ELIM Exod. xv. Not identified — The second
27; xvi. 1; camping station
Num. of the Israelites
xxxiii. 9, after crossing
10 the Red Sea,
and noted for 12
springs and 70
palm-trees.
Thought to be
‘Wâdy
Ghŭrŭndul,’ on
the route from
Suez to Jebel
Mŭsa.

ELKOSH Nah. i. 1 Not identified — The birth-place of


Nahum the
prophet.
Probably
somewhere in
Galilee.
ELLASAR Gen. xiv. 1 Senkereh — Now Senkereh,
on the left bank
of the
Euphrates.
ELON Josh. xix. Not identified 10 Probably the
43 Perhaps present village
same as ‘Beit Ello,’ a
Elon-beth- town on the
hanan border of Dan, 8
miles north-west
of Bethel
(Conder). (Mem.
II. 293; Sh. XIV.)

ELON-BETH- 1 Kings iv. Beit ʾAnân 14 The present


HANAN 9 (?)* village Beit
ʾAnân (Conder),
8½ miles from
Jerusalem, on
the ancient road
leading to
Gimzo. (Mem.
III. 16; Sh. XVII.)

ELTEKEH Josh. xix. Beit Lîkia (?)* 14 One of the cities


(R.V. ELTEKE 44; xxi. 23 in the border of
Josh. xxi. 23) Dan. Probably
the present Beit
Lîkia, 2 miles
south of Beth-
horon the
Nether. (Mem.
III. 16; Sh. XVII.)
—T. Drake.

ELTEKON Josh. xv. 59 Not identified — One of the towns


of Judah, named
next to Beth-
anoth.
ELTOLAD Josh. xv. Not identified — One of the cities
30; xix. 4; in the south of
1 Chr. iv. Judah,
29 transferred to
Simeon = Tolad,
1 Chr. iv. 29.
EMMAUS, 1 Macc. iii. ʾAmwâs 14 The present
Nicopolis 40, 57; iv. village ʾAmwâs,
3; ix. 50; 2 15 miles from
Wars xx. Jerusalem, near
20, 4; 3, the modern road
iii. 5; J. to Jaffa,
Ant. xiii. 1, mentioned by
3 Josephus, 16
Ant. x. 7, 9, etc.
(Mem. II. 63; Sh.
XVII.)

ENAM Josh. xv. 34 Kh. Wâdy 14 Possibly the


ʾAlîn (?)* present ruin
ʾAlîn, near Beth-
shemesh.—
Conder.
ENDOR Josh. xvii. Endôr 10 Now the modern
11; 1 Sam. village Endôr, 6
xxviii. 7; miles to the east
Ps. lxxxiii. of Nazareth.
10 (Mem. II. 84; Sh.
IX.)
EN-EGLAIM Ezek. xlvii. Not identified — Eusebius places
10 a town of this
name 8 miles to
the south of ‘Ar
Moab’; this
would probably
mean ‘Kerak.’
ʾAin Hajlah, the
ancient Beth
Hoglah, has
been suggested
by Tristram. See
Eglaim.
ENGADDI Ecclus. ʾAin Jîdy — See En-gedi.
xxiv. 14
EN-GANNIM (1) Josh. xv. 34 Kh. Umm Jîna 14 A city in the low
country of
Judah, named
between Zanoah
and Tappuah.
Now the ruin
Umm Jîna, west
of Beth-
shemesh. (Mem.
III. 42; Sh. XVII.)
—Clermont-
Ganneau.

EN-GANNIM (2) Josh. xix. Jenîn 10 Now the modern


21; xxi. 29 town Jenîn, on
the extreme
south corner of
Esdraelon. On or
near the border
of Issachar.
(Mem. II. 44; Sh.
VIII.)

EN-GEDI Josh. xv. ʾAin Jîdy 14 Original name


62; 1 Hazazon-tamar.
Sam. xxiii. The well-known
29; xxiv. 1; spring and ruins
2 Chr. xx. of ʾAin Jîdy, on
2; Cant. i. the west shore
14; Ezek. of the Dead Sea.
xlvii. 10 (Mem. III. 384;
Sh. XXII.)
EN-HADDAH Josh. xix. Kefr Adân* 10 On the border of
21 Issachar, and
named next to
‘En-gannim.’
Probably the
present village
Kefr Adân, 3
miles to the west
of Jenîn.—
Conder. (Mem.
II. 45; Sh. VIII.)

EN-HAKKORE Judg. xv. Not identified — The scene of one


19 of Samson’s
exploits.
EN-HAZOR Josh. xix. Kh. Hazîreh 6 One of the fenced
37 cities of
Naphtali. Now
the heap of ruins
Hazîreh, on the
Naphtali side of
the boundary by
Wâdy el ʾAyûn.
(Mem. I. 204;
Sh. IV.)

EN-MISHPAT Gen. xiv. 7 Also called


Kadesh. See
Kadesh-barnea.
EN-RIMMON Josh. xv. Kh. Umm er 13 The Ain and
32; xix. 7; Rŭmâmîn Rimmon
Neh. xi. mentioned
29; 1 Chr. together in Josh.
iv. 32; xv. 32; xix. 7; 1
Zech. xiv. Chr. iv. 32, are
10 supposed by
some to be one
place (?) and
identical with the
En-rimmon of
Neh. xi. 29. The
proposed site is
that of Kh. Umm
er Rŭmâmîn.
(Mem. III. 32;
Sh. XXIV.)
EN-ROGEL Josh. xv. 7; ʾAin Umm ed 14 A landmark on
xviii. 16; 1 Dêraj the boundary
Kings i. 9; between Judah
2 Sam. and Benjamin.
xvii. 17 The traditional
place is ‘Bîr
Eyûb’ (a spring
well), but the
arguments in
favour of ‘ʾAin
Umm ed Deraj’
(spring of the
mother of steps),
known to
Christians as the
‘Virgin’s
Fountain,’ are
stronger and
more generally
accepted.—
(Conder’s
Handbook to the
Bible, p. 334.)
See Jerusalem
vol., p. 94.
EN-SHEMESH Josh. xv. 7; ʾAin Haud 14 A landmark on
xviii. 17 the boundary
between Judah
and Benjamin,
apparently ‘ʾAin
Haud,’ east of
Bethany (the
well of the
Apostles—called
the Apostles’
fountain by
Christians).
(Mem. III. 42;
Sh. XVII.)
EN-TAPPUAH Josh. xvii. 7 Yasûf (?)* 10 The spring near
Yasûf, at the
head of the
branches of
Wâdy Kânah,
south of
Shechem
(Samaritan
Chronicle).
(Conder’s
Handbook to the
Bible, p. 263.)

EPHES- 1 Sam. xvii. Not identified — Or Pas-dammim,


DAMMIM 1; 1 Chr. ‘the boundary of
xi. 13 blood,’ the place
where the
Philistines
encamped
before the
conflict between
David and
Goliath took
place. Between
Socoh and
Azekah.
EPHRAIM, 2 Sam. xiii. Taiyibeh (?) 10 Named with
EPHRAIN, or 23; 2 Bethel and
EPHRON Chron. xiii. Jeshanah.
19; John Apparently
xi. 54 Ophrah of
Benjamin, which
see.
EPHRAIM, Gate 2 Kings xiv. One of the gates
of 13; 2 Chr. of the city of
xxv. 23; Jerusalem,
Neh. viii. probably on the
16; xii. 39 north-west.
EPHRAIM, Josh. xvii. The hill country of
Mount 15; xix. Ephraim,
(R.V. 50; xx. 7; extending from
EPHRAIM, Hill xxi. 21; Bethel and
Country of) xxiv. 30, Ramah on the
33; Judg. south, to the
ii. 9; iii. 27; Great Plain on
iv. 5; vii. the north.
24; x. 1;
xvii. 1, 8;
xviii. 2, 13;
xix. 1, 16,
18; 1
Sam. i. 1;
ix. 4; xiv.
22; 2
Sam. xx.
21; 1
Kings iv.
8; xii. 25;
2 Kings v.
22; 1 Chr.
vi. 67; 2
Chr. xiii. 4;
xv. 8; xix.
4; Jer. iv.
15; xxxi. 6;
l. 19;
Judith vi. 2
EPHRAIM, The 2 Sam. Not identified — Somewhere on
Wood of xviii. 6 the east of
(R.V. Jordan. The
EPHRAIM, The forest in which
Forest of) the great battle
took place
between the
forces of
Absalom and
David. Not far
from Mahanaim.
(Heth and Moab,
p. 180.)

EPHRAIM, Tribe Josh. xvi.; 5 — ‘The tribe of


of Ant. i. 22 Ephraim had by
lot the land that
extended in
length from the
river Jordan to
Gezer; but in
breadth as far as
from Bethel, till it
ended at the
Great Plain’ (5
Ant. i. 22).

EPHRATH or Gen. xxxv. Beit Lahm — The original name


EPHRATAH 16, 19; of Bethlehem of
(R.V. xlviii. 7; Judah, which
EPH­RATHAH) Ruth iv. see.
11; 1 Chr.
ii. 24, 50;
Ps. cxxxii.
6; Mic. v. 2
EPHRON 1 Macc. v. Not identified — One of the strong
46, 52; 2 cities on the east
Macc. xii. of Jordan,
27 between
Ashteroth
Karnaim and
Beth-shean—
was in a valley,
and destroyed
by Judas
Maccabæus.

EPHRON, Josh. xv. 9 — Between the


Mount waters of
Nephtoah and
Kirjath-jearim.
ERECH Gen. x. 10 Warka — One of Nimrod’s
cities on the
Euphrates, in the
neighbourhood
of Babylon.
ESDRAELON, Judith i. 8; Merj Ibn ʾAmr 10 This name is the
The Great iii. 9; iv. 6; Greek form of
Plain vii. 3 the word
Jezreel. Now
called ‘Merj ibn
ʾAmr.’ (Sh. V.
and VIII.)
ESEK, The Gen. xxvi. Not identified — A well dug by
Well 20 Isaac’s herdmen
in the valley of
Jerar.
ESHCOL, Gen. xiv. Not identified — The name ‘ʾAin
Brook or 13, 24; Kashkaleh,’
Valley of Num. xiii. perhaps a
23, 24; remnant of the
xxxii. 9; ancient one, is
Deut. i. 24 applied to a
spring on the
north side of
Hebron, near the
head of a valley
where some of
the most
extensive
vineyards of
Palestine exist.
ESHEAN Josh. xv. 52 es Sîmia (?)* 14 One of the cities
(R.V. ESHAN) in the mountains
of Judah.
Possibly the ruin
‘es Sîmia,’ near
Dumah. (Mem.
III. 313; Sh.
XXI.)—Conder.

ESHTAOL Josh. xv. Eshûʾa 14 Probably the


33; xix. present village
41; Judg. Eshûʾa, in the
xiii. 25; low country of
xvi. 31; Judah, close to
xviii. 2, 8, Zorah. (Mem. II.
11 25; Sh. XVII.)
ESHTEMOA Josh. xv. es Semûʾa 14 The present
(R.V. 50; xxi. village es
ESHTEMOH, 14; 1 Semûʾa, in the
Josh. xv. 50) Sam. xxx. hill country south
28; 1 Chr. of Hebron.
iv. 17, 19; (Mem. III. 412,
vi. 57 Sh. XXV.)
ESORA Judith iv. 4 ʾAsîret el 10 The present
Hatab (??) village ʾAsîret el
Hatab, near
Shechem, on the
north. (Mem. II.
155; Sh. XI.)
ETAM (1) 1 Chr. iv. 32 Kh. ʾAitûn (?)* 13 The present ruin
ʾAitûn, south-
west of Hebron,
of the tribe of
Simeon. (Mem.
III. 261; Sh. XX.)
—Conder.
ETAM (2) 2 Chr. xi. 6; ʾAin ʾAtân* 14 Probably the
1 Chr. iv. 3 village Urtâs,
south of
Bethlehem, near
which is the
spring called
ʾAin ʾAtân.
(Mem. III. 43;
Sh. XVII.)—
Conder.

ETAM, The Judg. xv. 8 Beit ʾAtâb (?)* 14 The rocky top on
Rock which Beit ʾAtâb
stands, west of
Bethlehem.
(Mem. III. 83;
Sh. XVII.)—
Conder.
ETHAM Exod. xiii. Not identified — One of the
20; Num. stations of the
xxxiii. 6 Israelites ‘on the
edge of the
wilderness.’
ETHER Josh. xv. Kh. el ʾAtr (?)* 10 Probably the ruin
42; xix. 7; el ʾAtr, near Beit
1 Chr. iv. Jibrin, allotted to
32 Simeon. (Mem.
III. 261; Sh. XX.)
—Conder.
ETHIOPIA Gen. ii. 13; — Named ‘Cush’ by
2 Kings the Hebrews,
xix. 9; and ‘Aithiopia’ by
Esth. i. 1; the Greeks.
viii. 9; Job Æthiopia
xxviii. 19; embraced
Ps. lxviii. Nubia, Sennaar,
31; lxxxvii. Kordofan, and
4; Isa. Northern
xviii. 1; xx. Abyssinia. The
3, 5; name Cush,
xxxvii. 9; however, in
xliii. 3; xlv. some cases, if
14; Ezek. not in all, applies
xxix. 10; to part of
xxx. 4, 5; Western Asia
xxxviii. 5; south of the
Nah. iii. 9; Caspian—the
Zeph. iii. country of the
10; 1 Esd. Kassi or
iii. 2; Cosseans.
Judith i.
10; Esth.
xiii. 1; xvi.
1; Acts viii.
27
EUPHRATES, Gen. ii. 14; —
River xv. 18;
Deut. i. 7;
xi. 24;
Josh. i. 4;
2 Sam.
viii. 3; 2
Kings xxiii.
29; xxiv. 7;
1 Chr. v. 9;
xviii. 3; 2
Chr. xxxv.
20; Jer.
xiii. 4–7;
xlvi. 2, 6,
10; li. 63;
1 Esd. i.
25, 27; 2
Esd. xiii.
43; Judith
i. 6; ii. 24;
Eccles.
xxiv. 26; 1
Macc. iii.
32, 37
EZEL, Stone 1 Sam. xx. Not identified — A ‘stone’ or
of, 19 ‘mound,’ the
or (R.V., margin, scene of David
Mound of) and Jonathan’s
parting.
EZEM 1 Chr. iv. 29 — See Azem.
EZION-GABER Num. xxxiii. Not identified — The last camping
or GEBER 35, 36; station of the
Deut. ii. 8; Israelites before
1 Kings ix. entering the
26; xxii. wilderness of
48; 2 Chr. Zin, which is
viii. 17; xx. Kadesh. ‘King
36 Solomon made a
navy of ships in
Ezion-geber,
which is beside
Eloth, on the
shore of the Red
Sea, in the land
of Edom’ (1
Kings ix. 25). In
the
neighbourhood
of ʾAkabah.
GAASH, Mount Josh. xxiv. Not identified — In ‘Mount
of 30; Judg. Ephraim,’ near
(R.V. Mountain ii. 9; 2 ‘Timnath-serah.’
of) Sam. xxiii. In Samuel and
30; 1 Chr. Chronicles
xi. 32 rendered
‘Brooks of
Gaash.’

GABA Josh. xviii. Jebʾa — See Geba (1).


24; Ezra ii.
26; Neh.
vii. 30
GABDES 1 Esdr. v. Not identified —
20
GAD, River of 2 Sam. Wâdy Môjib — Same as ‘River
xxiv. 5 Arnon.’
GAD, Tribe of Josh. xiii. ‘The eastern parts
24; 9 Ant. of the country
viii. beyond Jordan,
which belonged
to the
Reubenites and
Gadites’ (9 Ant.
viii.).

GALAAD Judith i. 8; Gilead — The Greek form


xv. 5; 1 of ‘Gilead.’
Macc. v. 9,
17, 20, 25,
27, 36, 45,
55
GALEED Gen. xxxi. — See Jegar-
47, 48 sahadutha.
GALGALA 1 Macc. ix. — Probably Gilgal (2
2 Kings ii. 1). Now
Jiljilia, which
see.
GALILEE Josh. xx. 7; — The region north
xxi. 32; 1 of Samaria,
Kings ix. including the
11; 2 Plain of
Kings xv. Esdraelon and
29; 1 Chr. mountains north
vi. 76; Isa. of it (Cf. 3 Wars,
ix. 1; 1 iii. 4).
Macc. v.
15, 17, 20,
23, 55; x.
30; xi. 63;
xii. 47, 49;
Tob. i. 2;
Judith i. 8;
xv. 5;
Matt. ii.
22, etc.
GALLIM 1 Sam. xxv. Not identified 14 Possibly ‘Beit
44; Isaiah Jâla,’ near
x. 30 Bethlehem.
(Mem. III. 20;
Sh. XVII.)
GAREB, The Jer. xxxi. 39 Not identified — Somewhere in the
Hill vicinity of
Jerusalem.
GARIZIM 2 Macc. v. Jebel et Tôr — Gerizim.
23; vi. 2
GATH Josh. xi. Tell es Sâfi 13 Five Roman miles
22; 1 from Eleuther­-
Sam. v. 8; opolis (Beit
vi. 17; vii. Jibrîn), on the
14; xvii. 4, road to Diospolis
23, 52; (Lydda),
xxi. 10; according to the
xxvii. 2, 3, Onomasticon.
4, 11; 2 This points to
Sam. i. 20; the fortress of
xv. 18; xxi. ‘Tell es Sâfi.’
20, 22; 1 (Mem. II. 440;
Kings ii. Sh. XVI.)
39–41; 2
Kings xii.
17; 1 Chr.
vii. 21; viii.
13; xviii. 1;
xx. 6, 8; 2
Chr. xi. 8;
xxvi. 6;
Am. vi. 2;
Micah i.
10

GATH-HEPHER, Josh. xix. el Mesh-hed 6 Now the village ‘el


or GITTAH- 13; 2 Mesh-hed,’ 3
HEPHER Kings xiv. miles north-east
25 of Nazareth,
containing the
tomb of Jonah
(Neby Yûnas).
(Mem. I. 365;
Sh. VI.)

GATH-RIMMON Josh. xxi. Not identified — A town of


(1) 25 Manasseh. In
the parallel
passage in 1
Chr. vi. 70, the
town is called
Bileam.
GATH-RIMMON Josh. xix. Not identified — Signifying ‘lofty
(2) 45; xxi. Gath.’ Named
24; 1 Chr. between
vi. 69 ‘Beneberak’ (Ibn
Ibrâk) (Sh. XIII.)
and Mejarkon
(Nahr el ʾAujeh),
north of Jaffa.
Probably in the
immediate
neighbourhood;
but no trace has
been
discovered.

GAZA Gen. x. 19; Ghŭzzeh 13 Now the city


Josh. x. Ghuzzeh, in
41; xi. 22; Philistia. (Mem.
xv. 47; III. 248; Sh.
Jud. i. 18; XIX.)
vi. 4; xvi.
1, 21; 1
Sam. vi.
17; 2
Kings xviii.
8; 1 Chr.
vii. 28; Jer.
xlvii. 1, 5;
Am. i. 6, 7;
Zeph. ii. 4;
Zech. ix.
5; 1 Macc.
xi. 61, 62;
xiii. 43;
Acts viii.
26
GAZARA 1 Macc. ix. Tell Jezar — Gazera (1 Macc.
52; xiii. 53; iv. 15; vii. 35).
xiv. 7, 34; Tell Jezar. See
xv. 28, 35; Gezer.
xvi. 1, 19,
21; 2
Macc. x.
32
GEBA (1), Josh. xxi. Jebʾa 14 Now the village
GABA or 17; 1 Jebʾa of
GIBEAH Sam. xiii. Benjamin, near
3; 2 Sam. Michmash.
v. 25; 1 (Mem. III. 94;
Kings xv. Sh. XVII.)
22; 2
Kings xxiii.
8; 1 Chr.
vi. 60; viii.
6; 2 Chr.
xvi. 6;
Neh. xi.
31; xii. 29;
Isa. x. 29;
Zech. xiv.
10
GEBA (2) Judith iii. 10 Jebʾa 10 Now Jebʾa, a
village north of
Samaria. (Mem.
II. 155, 185; Sh.
XI.)
GEBAL Josh. xiii. 5; Jebeil — Now the ruined
1 Kings v. town Jebeil, on
18; Ps. the coast, about
lxxxiii. 7; midway between
Ezek. Beirût and
xxvii. 9 Tripolis.
GEBIM Isa. x. 31 Not identified — North of
Jerusalem.

You might also like