The G20 Summit is an annual meeting of leaders from 20 major economies to discuss global issues. In 2016, China hosted its first-ever G20 forum in the south-eastern city of Hangzhou. Securing the leaders of multiple countries is no easy task, and would require many months of preparation by thousands of labourers in order to ensure the two-day forum, transportation, and cultural activities ran smoothly.

China’s largest security project

The G20 World Summit was one of the largest security projects the country had ever faced, and extremely important to setting a precedent for future major events in China. 29 leaders including formal G20 members, the European Union, and invited guests, along with other high-ranking officials from all over the world required constant protection over a large area which included Hangzhou's Xiaoshan Airport and the roads leading to it, the main conference areas for the G20 and its sister conference, the B20, multiple hotels hosting country leaders, and the city's main tourist zone: the West Lake Scenic Area.The G20 World Summit was one of the largest security projects the country had ever faced

Assisting the government 

Dahua Technology assisted the Hangzhou government in constructing a large-scale, comprehensive security system consisting of over 20,000 devices. Cameras with 40x optical zoom and over 10km range covered large areas, while cameras with Automatic Number Plate Recognition (ANPR) technology scanned roads for dangerous vehicles.

Over 500 PTZ cameras guarded critical routes from the airport to G20 and B20 conference areas. Thermal cameras provided unparalleled night vision support along with the ability to detect overheating equipment or fires. At train and subway stations, Face Recognition was employed to scan for known fugitives and verify tickets.

Finally, all cameras were connected to a central cloud system which provided a real-time assessment of traffic quality and threats, through a traffic status cloud system and processed unstructured video data from cameras, to analyse and generate thumbnails and descriptions for easy search-and-review. Suspicious targets were instantly tagged and tracked, and workers on the ground could be dispatched to keep tabs on the situation.

Dahua cameras recognised and led to the capture of multiple fugitives
Thermal cameras provided unparalleled night vision support and Face Recognition was employed to scan for known fugitives

Unified cloud system

Pulling off a successful G20 Summit was achieved not through luck, but by a combination of over 20,000 devices connected by a unified cloud system and advanced technologies such as face and plate recognition, thermal imaging, and optical zoom. In addition to recording 29,823 traffic violations, Dahua cameras recognised and led to the capture of multiple fugitives attempting to traverse the city.

The versatility of bullet, fisheye, and 40x zoom PTZ cameras employed in the security network ensured critical areas had no blind spots, and command centre workers could easily direct those on the ground to quickly respond to suspicious behaviour.

Dahua helped keep world leaders secure in the midst of a prime chance for China to set a precedent for hosting major international government events and the pressure that it carried. This case proves the efficacy of Dahua products combined in city-scale projects, and is a perfect example for future Safe City solutions to follow.Dahua helped keep world leaders secure in the midst of a prime chance for China to set a precedent

ANPR and Smart Traffic Management

Smart Traffic Management includes vehicle detection features which can recognise over 200 brands and 3000 car models to prepare advanced reports with information such as the time and location a car is seen, as well as its heading, colour, licence plate number, inspection dates, and other important data.

In Hangzhou, the government has enacted a plate number restriction policy limiting the days a car with an even or odd plate number may access the crowded West Lake Scenic Area, as well as restrictions on highways during rush hours, in order to prevent congestion on cramped roads. During the G20, cameras with Automatic Number Plate Recognition (ANPR) were employed on all roads to and from the airport, hotels, conference centres, and G20 activities to scan for suspicious vehicles and record traffic violations.

By the end of the heightened security period, a whopping 29,823 vehicles were automatically recorded breaking the plate limit policies. ANPR systems allowed the city to accurately capture more infractions with less police on the roads, keeping them safe and focused on protecting more critical Summit areas while saving the city in labour costs, increasing revenue collected from fines, and serving as an effective deterrent to cars clogging up roads.

 ANPR systems allowed the city to accurately capture more infraction
29,823 vehicles were automatically recorded breaking the plate limit policies

Finding fugitives

Facial recognition technology has made great technological leaps over the years with the introduction of Deep Learning and Artificial Intelligence. Dahua Face Recognition can detect a face in less than 3 seconds with a 90% recognition rate.

At important transportation hubs such as train and subway stations in adjoining cities, Facial Recognition assisted workers in matching passenger faces to their tickets and IDs, verifying their identities. This greatly reduced the amount of man hours spent by increasing the efficiency of identity checks.

Dahua Face Recognition can detect a face in less than 3 seconds with a 90% recognition rate

At checkpoints in Hangzhou, faces were also verified across a blacklist database consisting of known fugitives, leading to the capture of a number of lawbreakers passing through the city.

Cloud analysis and real-time maps

All cameras protecting key G20 zones, including both Dahua and non-Dahua cameras, were connected to a central cloud system. This system processed massive amounts of video data in real time, quickly performing analysis and generating thumbnails and descriptions so that workers could easily search for and review important clips.

Suspicious targets were tagged and tracked by the system, which allowed command centres to instantly dispatch police or workers to investigate. In addition, the position and line of sight of PTZ cameras with embedded GPS and G-sensor located at the B20 and G20 conference centres were displayed on a live e-map, giving a precise outlook of the current surveillance situation.

Download PDF version

In case you missed it

Live-streaming mobile surveillance takes cameras to the action
Live-streaming mobile surveillance takes cameras to the action

Video surveillance across the world is growing exponentially and its major application is in both public safety and law enforcement. Traditionally, it has been fixed surveillance where cameras provide live streams from fixed cameras situated in what is considered strategic locations. But they are limited in what they can see given by their very definition of being "fixed." The future of video surveillance includes the deployment of more mobile video surveillance with the benefits it offers. Instead of fixed cameras, this is the ability to live stream from mobile devices on the move such as body-worn cams, drones, motorbikes, cars, helicopters and in some cases, even dogs!Sending drones into the air, for example for missing people or rescue missions, is much more cost-effective than deploying helicopters Advantages of mobile surveillance The advantage of mobile surveillance is that the camera can go to where the action is, rather than relying on the action going to where the camera is. Also, sending drones into the air, for example for missing people or rescue missions, is much more cost-effective than deploying helicopters. The ability to live stream video from cars and helicopters in high-speed pursuits can be used to take some of the operational issues from the first responders on the ground and share that “life and death” responsibility with the operational team leaders back in the command centre. This allows the first responders in the pursuit vehicle to focus on minimising risk while staying in close proximity of the fleeing vehicle, with direction from a higher authority who can see for themselves in real time the issues that are being experienced, and direct accordingly. In addition to showing video live stream from a pursuit car or motorcycle, by using inbuilt GPS tracking, the video can be displayed on a map in real time, allowing a command chief to better utilise additional resource and where to deploy them, through the use of displaying mapping information with real time video feed. It allows police chiefs to make better informed decisions in highly-charged environments. The 4G phone network can now be used with compressed video to live stream cost effectively Application in emergency situations The same is true of first responders in many different emergency situations. Mobile surveillance opens up a new area of efficiencies that previously was impossible to achieve. For example, special operations can wear action body-worn cameras when doing raids, fire departments can live stream from emergency situations with both thermal and daylight cameras, and paramedics can send video streams back to hospitals allowing doctors to remotely diagnose and prepare themselves for when patients arrive at the hospital. How can special operations and emergency first responders live stream video from a mobile camera with the issues of weight, reliability and picture-quality being considered? H265 mobile video compression Law enforcement insists on secure transmissions, and it is possible to encrypt video to the highest level of security available in the public domain The 4G phone network can now be used with compressed video to live stream cost effectively. The issue of course is that 4G is not always reliable. Soliton Systems has mitigated this risk of low mobile quality in certain areas, by building an H265 mobile video compression device that can use multiple SIM cards from different cellular providers simultaneously. H265 is the latest compression technique for video, that is 50% more effective than conventional H264, and coupling this with using multiple “bonded” SIM cards provides a highly reliable connection for live-streaming high-quality HD video. The 400-gram device with an internal battery can be connected to a small action cam, and can live-stream simultaneously over at least three different cellular providers, back to a command centre. Latency is typically less than a second, and new advance improvements are looking to reduce that latency further. Encrypted video transmission What about security? Law enforcement insists on secure transmissions, and it is possible to encrypt video to the highest level of security available in the public domain, i.e. AES256.What about integration into existing video infrastructure at the command centre? It is not untypical for a police force to have an existing video management system (VMS) at their command centre such as Milestone System’s Xprotect. The Soliton range of products are ONVIF-compliant, a standard used by video surveillance cameras for interoperability, allowing cameras and video devices that are ONVIF-compliant to simply “plug&play” into existing video management systems. These mobile transmitters are deployed with law enforcement and first responders across the globe. Their ability to provide secure, full HD quality and highly-reliable video streaming within a small unit, and to enable it to be integrated into the current eco-system that is already installed at the receiving end, has made them a favourite choice with many companies and government agencies.

Impact of sophisticated IT technologies on the security market
Impact of sophisticated IT technologies on the security market

Over the course of the past few months, I have discussed a myriad of topics, from Big Data, the Internet of Things and emerging video surveillance-use cases, to analytics, storage complexities and IT technologies like virtualisation and hyperconverged infrastructure (HCI). All of these trends have a significant effect on the security market, and in April they were highlighted in spades at ISC West. It’s great to talk about these trends but it’s far better to see how they are being leveraged in real-world applications. That’s really where we can all see the true value of new solutions and concepts. We’re lucky enough to work with some leading organisations that want others to benefit from their experience and I’m happy to have the opportunity to share two of these applications with you. Protecting educational facilities UCF has adopted advancements in technology, particularly video surveillance solutions, to help ensure stronger security on campus Educational institutions face an increasingly complex risk environment. Recent high-profile incidents emphasise these risks and magnify the vulnerabilities that educational facilities face. These incidents have led to more public demand for improved security solutions across campuses. The primary mission of these organisations is to deliver quality education to students, and they face the challenge of balancing between a highly secure facility and one that supports open interaction. The University of Central Florida is no different. This organisation, one of the largest universities in the country, has adopted advancements in technology, particularly video surveillance solutions, to help ensure stronger security on campus. Active shooter incidents In March 2013, UCF faced an active shooter situation in which a former student planned to pull the fire alarm in a residence hall and then attack his classmates as the building was evacuated. However, the shooter’s gun jammed, and as officers were closing in on the gunman, he took his own life. During the university’s response to the incident, accessibility to critical video data was a major issue. Educational institutions face an increasingly complex risk environment UCF had cameras in the area where the incident took place, but first responders had no way of viewing the footage without being at the physical location of the video recorder. At the time, UCF had a wide variety of standalone systems in place, including non-integrated video surveillance, access control and intrusion systems. As a result, there was no way to centralise video management, viewing and analysis. Upgrading from analogue systems Altogether, its security system consisted of older analogue platforms that were reaching end of life, 58 standalone servers, 12,000 access points and a wide variety of DVRs — all being managed in a siloed manner. UCF needed a solution that would allow officials to centralise system management, store video data more effectively and reliably, and enable the security team to deliver situational awareness to responders when needed. Security leaders sought a way to further modernise its security, surveillance, access control and IT infrastructure The university deployed an HCI solution, one that is optimised for demanding, data-intensive workloads like video surveillance. Using standard off-the-shelf server hardware, the system aggregates the storage and compute resources from multiple servers into a single unified pool that all cameras can access, which maximises performance and storage capacity utilisation. The platform also hosts the university’s video management solution, which serves as a centralised source to manage video and effectively protect its security data. Because of the growing demand for video across UCF's campuses — for both safety and business purposes — the HCI solution’s ability to eliminate the opportunity for data loss and easily scale were key components in its selection. Protecting air travel and airports In 2012, Charleston International Airport embarked on an ambitious upgrade project dubbed the Terminal Redevelopment and Improvement Program. The $200 million initiative was designed to modernise and expand the facility to meet increased passenger demand. While the aesthetics and amenities of the airport were under construction, security leaders sought a way to further modernise its security, surveillance, access control and IT infrastructure. The IT and security teams needed to address the challenges of their existing standalone server environment, which included siloed systems, management complexity and high administrative and equipment costs. Charleston International Airport embarked on an ambitious upgrade project dubbed the Terminal Redevelopment and Improvement Program Considering the high value of the airport’s video, security and IT data, it required a solution that could deliver reliable data protection, system resiliency and fault tolerance. The airport is required to store video for 30 days, but it seeks to expand its retention time to 60 days. Therefore, technology that can scale simply was key in the selection process. Storage system updates It also required a storage platform that could manage the demanding and write-intensive nature of its nearly 250 IP surveillance cameras — a challenging task for traditional video recorders. The airport deployed HCI appliances to better manage captured video data and expand its archive capability for video surveillance. Users rely on video to validate whether something did or did not happen - and this is essential in airports HCI surveillance solutions are designed to provide industry-leading resiliency. Even if multiple hardware failures occur, including an entire appliance, video management servers will remain online and recording, and any previously recorded video will continue to be protected and accessible. Reducing expenses and costs The solution also reduced total cost of operations by consolidating servers, storage and client workstations into one enterprise-class solution that is easily managed from a single user interface, without the need for specialised IT skills. These use cases demonstrate the value emerging technologies bring to these types of modern environments. And they show that solutions like HCI are no longer simply much-talked about technology trends. Video, IT and security data is critical to organisations of all types and they need to ensure their investment in capturing this data is protected. From a security standpoint, users rely on video to validate whether something did or did not happen. If that video data isn’t protected, they lose a very valuable investigative tool. That isn’t an option in today’s complex environment. That’s is why it is paramount to understand how new technologies can help expand current capabilities and evolve security operations. This can’t be left to chance.

ISC West 2018 day three: Biggest-ever show highlights emerging technologies
ISC West 2018 day three: Biggest-ever show highlights emerging technologies

Activity slowed on the last day of ISC West in Las Vegas, but there was plenty of momentum remaining and plenty more to see. In the end, Reed Exhibitions declared 2018 the biggest and most successful year to date for the show. There were an additional 4,000 square feet of exhibit space compared to last year and a 6 percent growth in overall attendance, according to Reed.  The cloud, biometrics, deep learning and other technologies were among the big topics at the show, and even smaller exhibitors were pleased with the results. In particular, emerging technologies were successfully highlighted. Cloud-based video systems Cloud video company Eagle Eye Networks announced multiple new offerings at ISC West. One was the first cloud-based video system that accommodates HD-over-coax cameras using the HD-TVI protocol to operate over existing coaxial cabling. In effect, cameras connect with an HD-TVI recorder, which plugs into Eagle Eye Networks’ on-site hardware “bridge” connecting to the Internet. Eagle Eye Networks has also integrated Hikvision body-worn cameras into their cloud system; transmitting video using the Eagle Eye Bridge ensures end-to-end encryption and the evidentiary integrity of the video. Analytics in the cloud can be turned on and off at will for each camera, and could be deployed over a weekend and switched off the following week “A few years ago, fewer customers were ready to adopt the cloud,” says Ken Francis, President of Eagle Eye Networks. “Now market adoption is changing, and customers don’t want on-site hardware. End-users are driving the move to cloud systems.” He estimates the evolution is about halfway complete, and Eagle Eye Networks continues to sign up new dealers every month because their customers are asking for the cloud. Eagle Eye Networks’ third new offering at ISC West is “analytics in the cloud,” including familiar analytics such as intrusion, people counting and loitering. Francis says the economics of the cloud make implementation of analytics much more affordable – about $4 per camera. Analytics in the cloud can be turned on and off at will for each camera. For example, analytics could be deployed over a weekend and then switched off the following week. “It’s a far more economically attractive and cost-effective service than on-site,” says Francis. the economics of the cloud make implementation of analytics much more affordable Augmented identity: biometrics in security Biometrics continue to make their way into the mainstream of the security market, and IDEMIA brought its message of “augmented identity” to ISC West. IDEMIA (formerly OT-Morpho) provides systems to the largest biometrics users in the world, including big customers such as the FBI and Interpol, and large-scale government projects around the globe. “If you can handle projects that big, enterprise applications are no problem,” says Gary Jones, Vice President, Global Channel & Marketing, Biometric Access & Time Solutions. He says that the company’s technologies apply to any vertical market, and they are especially common in major airports and big financial institutions, in addition to government. The company’s MorphoWave product allows users to wave their hand, and the system captures a three-dimensional shape of fingerprints. The touchless system is also “frictionless” -- it enables fast decision-making that promotes high throughput rates. Artificial intelligence applications AI and deep learning have been big topics of conversation at ISC West, and I saw a company on the last day of the show with a different take on the subject. BrainChip uses a type of AI called “spiking neural networking” that models the operation of neurons in the human brain - in contrast to “convolutional neural networks,” which use a series of math functions to train from pre-labelled data sets. The BrainChip Studio software can search vast amounts of video footage rapidly to identify either faces, patterns or objects. Applications are in law enforcement, counter-terrorism and intelligence agencies.The BrainChip Studio software can search vast amounts of video footage rapidly to identify either faces, patterns or objects “We search for specific things,” said Bob Beachler, Senior Vice President, Marketing and Business Development. The software can search hundreds of live or recorded camera feeds for a unique graphic pattern on an item of clothing or on a bag carried by a person, for example. The technology only requires modest processing power and consumes little energy, so it can be used with legacy systems without requiring hardware or infrastructure upgrades.  Emerging Technology Zone A new Emerging Technology Zone at ISC West included participation by around 40 companies that are startups and/or new to the security industry. The section opened an hour before the main show floor and was located near the registration area, which increased traffic. “Generally speaking some people said it was hard to find, but I think it’s better for us as someone new to the market, rather than being on the main floor where you can get lost in the shuffle,” said Jeffrey Weiner, Vice President, Networks & Business Solutions, at Mersoft. “It was really smart that they opened this an hour earlier.” Mersoft, one of the Emerging Technology Zone exhibitors, has developed a software product to help the security industry do a better job of streaming live video. The software eliminates the startup delay and lag in live video. With dedicated software, video can be consumed by a browser or mobile app more easily Live video streaming “We accomplish that in two ways,” says Weiner. “One, we don’t trans-code the video into another format. Instead, we convert a security camera’s video from RTSP (real time streaming protocol) to WebRTC (Web Real-Time Communication), an open-source technology that has been used extensively in video conferencing, but not so much in security. The video can be consumed by a browser or mobile app more easily, and we don’t need a player on the client, which is another way we reduce lag.” Another advantage is that WebRTC is natively encrypted; every packet is encrypted. In contrast, applications that transmit RTSP have to be wrapped in a VPN (virtual private network) tunnel, which takes some effort to maintain and is a battery hog on a mobile device. Also, multi-casting of video is easier, even using streams of various resolutions. Mersoft works through partnerships, offering a cloud-hosted service on Amazon and a version that can be installed on a local server. They have worked with several DIY camera sellers (who use cloud services), and with some major commercial service providers. “A new partnership strategy we are exploring is with systems integrators, who can incorporate Mersoft and provide a differentiator by improving their video performance,” says Weiner. The 22-year-old company is new to security, and ISC West provides opportunities for in-depth conversations preparing for a future in the security sector. Customisable turnstile solutions Delta highlighted their new designer series turnstiles, whose colourful appearance led booth visitors to ask about customisation Even the smaller companies, located toward the back of the hall, were enthusiastic about ISC West this year. “The show has been great,” says Vanessa Howell, project manager of Delta Turnstiles. “We did get a lot of traffic. I am a niche product, so it’s not so much about quantity as quality [of leads]. I had great quality at the show.” Being away from competitors, which are grouped next to each other in the front of the hall, was an upside of the turnstile company’s booth location toward the back. Delta highlighted their new designer series turnstiles, whose colourful appearance led booth visitors to ask about customisation. “They ask: ‘Why are turnstiles only sold in basic models?’” says Howell. “’Why can’t they look like a piece of art since they are the first thing people see when they enter a building?’ People are very open to making them prettier.”  Delta Turnstiles has been coming to ISC West since 2006. “I have manufacturer’s reps, and this is one of two times I get to see them in one place, and they bring a lot of customers to me at the booth,” says Howell. “This is my only face-to-face meetings with some customers. I speak mostly over the phone.” Valuable face-to-face engagement was a benefit of ISC West, and many of those meetings will likely set the stage for continuing successes in our vibrant market. Until next year.