Fibre optics, telemetry receivers, transmitters, transceivers - Expert commentary

Live-streaming mobile surveillance takes cameras to the action
Live-streaming mobile surveillance takes cameras to the action

Video surveillance across the world is growing exponentially and its major application is in both public safety and law enforcement. Traditionally, it has been fixed surveillance where cameras provide live streams from fixed cameras situated in what is considered strategic locations. But they are limited in what they can see given by their very definition of being "fixed." The future of video surveillance includes the deployment of more mobile video surveillance with the benefits it offers. Instead of fixed cameras, this is the ability to live stream from mobile devices on the move such as body-worn cams, drones, motorbikes, cars, helicopters and in some cases, even dogs!Sending drones into the air, for example for missing people or rescue missions, is much more cost-effective than deploying helicopters Advantages of mobile surveillance The advantage of mobile surveillance is that the camera can go to where the action is, rather than relying on the action going to where the camera is. Also, sending drones into the air, for example for missing people or rescue missions, is much more cost-effective than deploying helicopters. The ability to live stream video from cars and helicopters in high-speed pursuits can be used to take some of the operational issues from the first responders on the ground and share that “life and death” responsibility with the operational team leaders back in the command centre. This allows the first responders in the pursuit vehicle to focus on minimising risk while staying in close proximity of the fleeing vehicle, with direction from a higher authority who can see for themselves in real time the issues that are being experienced, and direct accordingly. In addition to showing video live stream from a pursuit car or motorcycle, by using inbuilt GPS tracking, the video can be displayed on a map in real time, allowing a command chief to better utilise additional resource and where to deploy them, through the use of displaying mapping information with real time video feed. It allows police chiefs to make better informed decisions in highly-charged environments. The 4G phone network can now be used with compressed video to live stream cost effectively Application in emergency situations The same is true of first responders in many different emergency situations. Mobile surveillance opens up a new area of efficiencies that previously was impossible to achieve. For example, special operations can wear action body-worn cameras when doing raids, fire departments can live stream from emergency situations with both thermal and daylight cameras, and paramedics can send video streams back to hospitals allowing doctors to remotely diagnose and prepare themselves for when patients arrive at the hospital. How can special operations and emergency first responders live stream video from a mobile camera with the issues of weight, reliability and picture-quality being considered? H265 mobile video compression Law enforcement insists on secure transmissions, and it is possible to encrypt video to the highest level of security available in the public domain The 4G phone network can now be used with compressed video to live stream cost effectively. The issue of course is that 4G is not always reliable. Soliton Systems has mitigated this risk of low mobile quality in certain areas, by building an H265 mobile video compression device that can use multiple SIM cards from different cellular providers simultaneously. H265 is the latest compression technique for video, that is 50% more effective than conventional H264, and coupling this with using multiple “bonded” SIM cards provides a highly reliable connection for live-streaming high-quality HD video. The 400-gram device with an internal battery can be connected to a small action cam, and can live-stream simultaneously over at least three different cellular providers, back to a command centre. Latency is typically less than a second, and new advance improvements are looking to reduce that latency further. Encrypted video transmission What about security? Law enforcement insists on secure transmissions, and it is possible to encrypt video to the highest level of security available in the public domain, i.e. AES256.What about integration into existing video infrastructure at the command centre? It is not untypical for a police force to have an existing video management system (VMS) at their command centre such as Milestone System’s Xprotect. The Soliton range of products are ONVIF-compliant, a standard used by video surveillance cameras for interoperability, allowing cameras and video devices that are ONVIF-compliant to simply “plug&play” into existing video management systems. These mobile transmitters are deployed with law enforcement and first responders across the globe. Their ability to provide secure, full HD quality and highly-reliable video streaming within a small unit, and to enable it to be integrated into the current eco-system that is already installed at the receiving end, has made them a favourite choice with many companies and government agencies.

Why live video streaming is critical for safer and smarter cities
Why live video streaming is critical for safer and smarter cities

The term “smart city” gets thrown around a lot nowadays, but as different technologies that strive to be defined in this way are adopted by different countries globally, the meaning of this phrase gets lost in translation. The simplest way to define a “smart city” is that it is an urban area that uses different types of data collecting sensors to manage assets and resources efficiently. One of the most obvious types of “data collecting sensor” is the video camera, whether that camera is part of a city’s existing CCTV infrastructure, a camera in a shopping centre or even a police car’s dash camera. The information gathered by video cameras can be used with two purposes in mind, firstly: making people’s lives more efficient, for example by managing traffic, and secondly (and arguably more importantly): making people’s lives safer. Live streaming video all the time, everywhere In the smart and safe city, traditional record-only video cameras are of limited use. Yes, they can be used to collect video which can be used for evidence after a crime has taken place, but there is no way that this technology could help divert cars away from an accident to avoid traffic building up, or prevent a crime from taking place in the first place. However, streaming live video from a camera that isn’t connected to an infrastructure via costly fibre optic cabling has proven challenging for security professionals, law enforcement and city planners alike. This is because it isn’t viable to transmit video reliably over cellular networks, in contrast to simply receiving it. Video transmission challenges Transmitting video normally results in freezing and buffering issues which can hinder efforts to fight crime and enable flow within a city, as these services require real-time, zero latency video without delays. Therefore, special technology is required that copes with poor and varying bandwidths to allow a real-time view of any scene where cameras are present to support immediate decision making and smart city processes. The information gatheredby video cameras can beused to make people’s lives more efficient, and to make people’s lives safer There are many approaches to transmitting video over cellular. We’ve developed a specialist codec (encoding and decoding algorithm) that can provide secure and reliable video over ultra-low bandwidths and can therefore cope when networks become constrained. Another technique, which is particularly useful if streaming video from police body worn cameras or dash cams that move around, is to create a local wireless “bubble” at the scene, using Wi-Fi or mesh radio systems to provide local high-bandwidth communications that can communicate with a central location via cellular or even satellite communications. Enhanced city surveillance Live video streaming within the smart and safe city’s infrastructure means that video’s capabilities can go beyond simple evidence recording and evolve into a tool that allows operations teams to monitor and remediate against incidents as they are happening. This can be taken one step further with the deployment of facial recognition via live streaming video. Facial recognition technology can be added on to any video surveillance camera that is recording at a high enough quality to identify faces. The technology works by capturing video, streaming the live video back to a control centre and matching faces against any watch lists that the control centre owns. Importantly, the data of people who aren’t on watch lists is not stored by the technology. Identifying known criminals This technology can work to make the city safer in a number of ways. For example, facial recognition could spot a known drug dealer in a city centre where they weren’t supposed to be, or facial recognition could identify if a group of known terror suspects were visiting the same location at the same time, and this would send an alert to the police. Facial recognition technology captures and streams live back to a control centre, matching faces against any watch lists that the control centre owns In an ideal world where the police had an automated, electronic workflow, the police officer nearest to the location of the incident would be identified by GPS and would be told by the control room where to go and what to do. Most police forces aren’t quite at this technological level yet, and would probably rely on communicating via radio in order to send the nearest response team to the scene. As well as this, shopping centres could create a database from analogue records of known shoplifters to identify criminals as soon as they entered the building. This would be even more effective if run co-operatively between all shopping centres and local businesses in an area, and would not only catch any known shoplifters acting suspiciously, but would act as a deterrent from shoplifting in the first place. Live streaming for police As mentioned above, live streaming video from CCTV cameras can help the police fight crime more proactively rather than reactively. This can be enhanced even further if combined with live streaming video from police car dash cams and police body worn cameras. If video was streamed from all of these sources to a central HQ, such as a police operations centre, the force would be able to have full situational awareness throughout an incident. This would mean that, if need be, officers could be advised on the best course of action, and additional police or other emergency services could be deployed instantly if needed. Incorporated with facial recognition, this would also mean that police could instantly identify if they were dealing with known criminals or terrorists. Whilst they would still have to confirm the identity of the person with questioning or by checking their identification, this is still more streamlined than describing what a person looks like over a radio and then ops trying to manually identify if the person is on a watch list. The smart, safe city is possible today – for one, if live video streaming capabilities are deployed they can enable new levels of flow in the city. With the addition of facial recognition, cities will be safer than ever before and law enforcement and security teams will be able to proactively stop crime before it happens by deterring criminal activity from taking place at all.

Surge protection for security installations: 2017 saw increased investment
Surge protection for security installations: 2017 saw increased investment

In 2017, DITEK saw how power surges from the many natural disasters that took place damaged many businesses. In a natural disaster, or even everyday business operations, a facility’s entire investment in security, life safety and surveillance systems technology can be disabled or rendered useless in a few seconds. Surge protection solutions can mitigate those risks and protect security investments. Proactive approach to risk mitigation Throughout 2017, we also witnessed a change in how enterprises view surge protection, which included how investments are being made in surge protection to protect valuable security, life safety and surveillance systems, while also reducing downtime, manpower costs, liability vulnerabilities, and possibly compliance issues that can force businesses to actually cease operations. Effective security management is about mitigating risks. But risks cannot be mitigated without a proactive approach. Enterprises and integrators, who take the time to assess risk and to develop a strategy to incorporate effective detection, deter and response criteria to protect physical assets will be successful in 2018. 2018 and beyond That strategy includes designing surge protection into new security systems, while also adding surge protection to existing systems. Enterprises and security integrators who implement a surge protection strategy during security planning processes – or after – will be exercising prevention and mitigation, and they will be successful in 2018 and beyond.  Surge protection devices have an untapped potential for enterprise surveillance and security systems In 2017, Ditek continued to offer security end users a solid surge protection solution. We also successfully educated system integrators, who are seeking value-added products or services to incorporate into their portfolios, on the importance of surge protection devices. Educating security integrators We believe that surge protection devices have an untapped potential for enterprise video surveillance and security systems, because they can and do meet safety and security challenges that have been rarely identified in the past. We are looking forward to 2018, when we will continue to develop new surge protection products – including a new product engineered to protect up to twelve individual fuel dispensers, which is critical to the financial operation of convenience stores. We will also continue to educate security integrators about the importance of including surge protection in the design/build RFP, to not only secure an enterprise’s valuable security equipment, but also to help integrators to differentiate their capabilities and knowledge from the competition.

Latest PCSC news

PCSC and Coolfire Solutions collaborate to deliver top-level capabilities for access and security
PCSC and Coolfire Solutions collaborate to deliver top-level capabilities for access and security

PCSC, a designer and manufacturer of access control solutions and Coolfire Solutions, a St. Louis based software company known for creating Military-Grade situational awareness platforms, collaborate to deliver top-level capabilities for access and security. Coolfire Solutions created its innovative Ronin Platform to deliver software that sits on top of existing systems and infrastructure to transform data into actionable intelligence. Originally developed for the U.S. military, the Ronin Platform is being widely adopted by industry leaders and organisations who recognise the importance of placing the right data, in the right hands, in real-time, so that intelligent decisions can be made. LiNC-NXG PSIM system Stacking the Ronin Platform on top of the data provided by PCSC’s LiNC-NXG PSIM system provides a robust, real-time common operational pictureStacking the Ronin Platform on top of the data provided by PCSC’s LiNC-NXG physical security information management system provides a robust, real-time common operational picture, visually representing physical security events, and enabling a coordinated security response. For instance, urgent security related event details are pushed to mobile devices of nearby security officials for immediate action. An additional benefit, in the case of an on-premises environment, the underlying access management system is not exposed, only the top-level data is managed. Extend the capabilities of access solutions “An extremely impressive GUI for our industry and an actionable set of features extend the capabilities of PCSC’s access solutions for real-time response,” said Mas Kosaka, President and CEO of PCSC. “The expansion possibilities are virtually limitless too. We’re excited to debut the capabilities of Ronin to our Business Partners during the PCSC Symposium in conjunction with ISC West, the largest security industry trade show in the U.S.” Coolfire Solutions and PCSC have the experience and capabilities to transform the way security professionals do their job every day" “Coolfire Solutions and PCSC have the experience and capabilities to transform the way security professionals do their job every day. We can maximise the value of existing technology investments by combining data from any source and making it actionable," said Don Sharp, CEO at Coolfire Solutions. "Security professionals have an incredibly challenging job and it’s only getting tougher. By bringing all of their critical data onto a single pane of glass we can increase the level of security while driving significant operational efficiencies.”

Suprema to globally provide and support BioConnect Identity Platform
Suprema to globally provide and support BioConnect Identity Platform

The BioConnect Identity Platform provides an integration of Suprema's biometric solutions with the majority of leading access control systems BioConnect and Suprema have announced Suprema's launch of the BioConnect Identity Platform. Developed by BioConnect, Suprema's long-standing strategic partner in North America, the BioConnect Identity Platform provides an integration of Suprema's biometric solutions with majority of the leading access control systems in the global security market. Under the appointment, Suprema will provide and support the BioConnect Identity Platform globally from June 1st, 2016 onward. Powerful integration featuresWith the BioConnect Identity Platform's powerful integration features and BioConnect's and Suprema's partner eco-systems, enterprises benefit from the ability to take advantage of deploying biometrics with their existing (or their choice of) access control vendor, standards, devices and way of operating. The BioConnect Identity Platform enables the seamless integration of Suprema's biometric terminals with access control systems, ERP and time and attendance systems, supporting biometric and multi-factor authentication, biometric enrollments and user ID management. One central system The solution enables greater security, identity assurance and convenience from one central system and has ultimately changed the way that the physical access control market can consume biometrics as an authentication strategy. No other manufacturer around the world has been able to offer this level and quality of integrations - with the BioConnect Identity Platform boasting over 20. "With the BioConnect Identity Platform, BioConnect complements our goal of providing industry-leading biometric security solutions to the global market. The product is a ready-made bridge solution that provides easier integration of cutting-edge Suprema biometric technology together with a customer's choice of leading access control systems," said Young Moon, VP of Suprema. "We are looking forward to providing the BioConnect Identity Platform to a more global security market and are excited to offer our customers a seamless and cost-effective way of adopting Suprema's biometric security solutions," Moon added. Innovative technologies From the perspective of the access control provider, the BioConnect Identity Platform opens up the option to provide a Suprema biometric solution and continue to benefit from the complete product line as Suprema brings new and innovative technologies to market. "As a Suprema partner we have experienced a lot of growth in the North American and UK markets due to its leadership and continued emphasis on producing biometric products of superior quality, versatility and range," said Steve Greb, Strategic Director of Business Development at BioConnect. "We're very excited to draw on Suprema's impressive partner network and continue to build out our Quest for Rightful Identity on a global scale." Integration with leading systems The BioConnect Identity Platform integrates the following leading access control systems with the Suprema biometric terminals; ACT ACTManage, AMAG Symmetry, Axis A1001, Brivo OnAir/OnSite, Genetec Security Center, IMRON IS2000, Lenel OnGuard, Open Options dnaFusion, Paxton Net2, Honeywell ProWatch, Honeywell WINPAK, RS2 AccessIT!, S2 Netbox, Software House CCURE 9000, Stanley SecureNET, Gallagher Command Centre and now PCSC LiNC-PLUS. Suprema and BioConnect will team together to showcase the BioConnect Identity Platform at IFSEC 2016 in London on June 21st-23rd at Stand E1400.

Do’s and Don’ts of managing legacy systems – Migration better than rip-and-replace for enhancing security control system functionality
Do’s and Don’ts of managing legacy systems – Migration better than rip-and-replace for enhancing security control system functionality

Systems may be reliable and performing as originally intended, but can also beoutdated in comparison to current technology offerings Let’s start by defining what a legacy system is in the context of a security control system. Legacy refers to an installed and operating security control system made up of numerous components, both hardware and software, that have been eclipsed by newer technologies. A shortage of parts and pieces may be creeping in, and it’s also likely the older stuff has a service tech scratching his head when faced with a configuration setting or data entry protocol. The newer technologies, however, may still be providing much of the desired functionality required by the legacy system user. Legacy in this context then is not necessarily a pejorative term. The system may be both reliable and performing as originally intended but is outdated in comparison to current technology offerings both from a communications standpoint and as it relates to applications and data mining. So what to do? For openers, as my dad would day, do a Ben Franklin list of do’s and don’ts. Naturally you’d love to move to a new, bigger or smaller, better and faster system. But, first, what does that list look like? I for one think is might begin to look like this: Things to do when managing legacy systems Do you have a handle on your current technology capabilities? Many legacy systems are underutilised and have features that are not used. Revisit your systems capabilities: You are likely to make some pleasant discoveries. Do you have a handle on your current technology capabilities? Many legacy systems are underutilised and have features that are not used Do you currently know how all of the pieces and parts in your system are currently communicating? A great start for planning the next steps is to understand the “plumbing.” Associated with that is the location of communication; specifically, how are things wired and where are they terminated, recorded and catalogued? What does your power distribution for the system components look like? Do you have backup and other means of maintaining operations during a loss of power, and where is that stuff? If not done recently, this step provides an opportunity to ensure you are ready for things that don’t happen and also to revisit codes. It’s always worthwhile if a maintenance provider is available to a system test in this area, or it can be self-conducted. What is the state of your record management, and when was the last time you did some basic housekeeping, such as backup and the like? If you don’t remember when you did it last, stop reading and go do some housekeeping — it’s clearly due now! What works for you and your organisation, and what have you developed a work-around for? If your “super users” have found ways to manage desired system outcomes by some clever workaround, are there other desired features?  Do you have a relationship with an authorised service provider or an on-staff trained first responder? Do you have attic stock (stuff you own) to support those older components? I like to think of it like making a road trip with a spare tire and basics in the trunk in case an extended unplanned stop on the side of the road interrupts your trip. Have you developed a plan for an eventual upgrade? What’s first, what does it cost and whom will I let provide pricing to do so?  Rip-and-replace isn't your only option. There are many products and servicesavailable to migrate from a legacy to next steps utilising embedded infrastructure Planning and management What are my/your basic functional requirements, and where are the gaps now you must fill for enterprise sustainability? That legacy system likely has paid its way and now needs to be retired; I’m not ready either. Do you have a business case for this refresh – applications, data mining, new and reporting and risk mitigation strategies? If not, you are missing this first step of legacy migration planning and management. Managing the age includes a system exit strategy. Getting C suite, namely your CFO’s, attention is key; sustainability of your enterprise is 101, so functionality as it relates to risk mitigation is essential to keeping your entity flourishing. So what are the DON’T’s? Don’t trivialise the migration or response to the Do’s or you’ll end up in a big To Do. Don’t minimise the relationship with existing integration resources you have worked with, old and new. Organisations evolve, some for the best, some not so. Refresh these relationships as well; resources are like bridges – you never know when a crossing is needed. Don’t rush into the latest and greatest; be wary of who’s definition you subscribe to. There’s a reason they call it the “cutting” edge. Don’t believe that rip-and-replace is your only option. There are many legacy systems in our industry, and many well-made and well-thought-out products and services are available to migrate from a legacy to next steps utilising embedded infrastructure. The bottom line: Define your parameters, select your partners and engage companies with a history of legacy migration and thought leadership. If your legacy includes some products with forward-thinking engineering thought leadership, you may be able to manage your needs with security control board-level replacements or the flashing of new firmware and upgrades to software. I‘m aware of several companies whose products elegantly move through time, adding new applications and functionality without wholesale rip-and-replace. These legacies carry on. The market has responded to you and others eager to know their options. There are many ingenious and clever ways to upgrade communications and transport of data, reliable mainstream products designed to meet this challenge head-on. There are solutions aimed at allowing you to use current IT and Internet of Things (IoT) apps and functionality. However, there are also quite a number of technology partners able help make the leap from analogue to digital using existing pathways. The bottom line: Define your parameters, select your partners and engage companies with a history of legacy migration and thought leadership. They are most likely to produce the best results and allow you to leave behind the legacy you want to be associated with.