SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Body worn video cameras
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Has the gap closed between security fiction and security reality?

19 Feb 2018

Has the gap closed between security fiction and security reality?
19 Feb 2018

Editor Introduction

Among its many uses and benefits, technology is a handy tool in the fantasy world of movie and television thrillers. We all know the scene: a vital plot point depends on having just the right super-duper gadget to locate a suspect or to get past a locked door. In movies and TV, face recognition is more a super power than a technical function. Video footage can be magically enhanced to provide a perfect image of a license plate number. We have all shaken our heads in disbelief, and yet, our industry’s technical capabilities are improving every day. Are we approaching a day when the “enhanced” view of technology in movies and TV is closer to the truth? We asked this week’s Expert Panel Roundtable: How much has the gap closed between the reality of security system capabilities and what you see on TV (or at the movies)?


Card image cap
Joe Oliveri Johnson Controls, Inc.

Technologies, such as fingerprint and eye scanners, are innovations that have been showcased in future-thinking television shows and movies for years. Today, these technologies are no longer on the horizon, but rather they’re currently being used by leading organisations. In fact, biometric access control is the proper security term used to identify these scanners. An advanced access control system, biometric access control leverages unique characteristics, like hand geometry or facial recognition, to determine entry access or denial to employees and visitors by conducting a quick, physical scan. The system can be implemented with traditional access control and security systems to allow buildings to more accurately secure certain areas. By deploying this unobtrusive, user-friendly technology, passwords and keypads could become a thing of the past, and your building could work similarly to the ones featured on the big screen.

Card image cap
Neil Ricketts Trigion

I think many people would be surprised at how close the reality of modern security is to its fictional counterparts. Not only can we restrict access through biometric solutions such as fingerprint and iris scanners, but we can pick faces out of a crowd with facial recognition software, and with thermal imaging, we can identify the presence of people unnoticed by the naked eye. With high definition cameras allowing extreme zoom capabilities, we can even tell someone’s eye colour over large distances. Add to this the ability to recognise someone from the way they walk, and there’s not much we can’t detect that they would be able to claim to on TV or in films. We might not be at the Minority Report stage where we can apprehend criminals based on “foreknowledge,” but we can certainly detect suspicious behaviour and act to interrupt any potentially criminal activity before it happens.

Card image cap
Francesca Meyrick TDSi

In some ways, we have moved on from reality trailing the movies and TV to a stage where the security industry is ahead of fiction. For example, iris recognition systems can’t be fooled by someone using a dead body to gain access, despite what Hollywood would have you believe! Security technology is progressing very quickly. For instance, 16 years ago, the Tom Cruise movie Minority Report theorised that law enforcement would be able to predict crimes before they happened. We don’t yet have the power of clairvoyance, but big cities with crime issues are now using technology to identify areas and patterns of crime to allocate resources to tackle problems. Integrated security and CCTV systems are using technology to track suspects and combat crime quicker than any human deterrent can. The gap between the big screen and reality is much less than the average member of the public might think!

Card image cap
Andrew Palmer Seagate Technology

If you watch programs like CSI: Miami, you see that law enforcers can take low-quality blurred images and enhance them to a point where previously indistinguishable faces are crystal clear. For now, this technology remains confined to our TV screens and imaginations, but the gap is starting to close. In Beijing, for example, police officers are equipped with body cameras, allowing them to scan the city’s streets whilst on the move. A few years ago, this kind of technology would’ve been firmly restricted to television and movies. In addition, the rise of 4K and, in time, 8K resolution cameras will also help bridge the divide between fact and fiction. This advanced technology can capture incredibly high-quality footage, even from long distances. However, as smart cities, smart transportation, and other surveillance programs become more prevalent, the widespread use of high-definition monitoring will increase the amount of data.


Editor Summary

How security systems operate in the fantasy world of TV and the movies actually has a practical impact on the physical security market. These fictional depictions of system capabilities can impact the expectations of customers. Television shows that depict technology marvels can help raise expectations of what technology can do. The need to meet customer expectations (and to manage unrealistic ones) is a challenge for security system providers. Fortunately, as our Expert Panelists point out, new technologies are pushing our capabilities forward.

  • Related links
  • TDSi CCTV software
  • TDSi Access control software
  • TDSi CCTV cameras
  • Johnson Controls Limited Access control readers
  • TDSi Access control readers
  • TDSi IP cameras
  • TDSi Electronic keypads
  • Related categories
  • CCTV cameras
  • CCTV observation systems & accessories
  • CCTV software
  • Access control software
  • IP cameras
  • Access control readers
  • Electronic keypads
  • Video motion detectors
Related white papers
Unlocking wide-angle camera dewarping

Unlocking wide-angle camera dewarping

Download
Cloud video and smart cities

Cloud video and smart cities

Download
Making sense of today’s security camera options

Making sense of today’s security camera options

Download
Related articles
SOURCE Tactical Gear women's ballistic vests win

SOURCE Tactical Gear women's ballistic vests win

Roc Technologies & City of London: Future-proof networking

Roc Technologies & City of London: Future-proof networking

Pimloc's Secure Redact enhances video privacy

Pimloc's Secure Redact enhances video privacy

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Body worn video cameras
  4. News
  5. Round table discussions
About this page

Discover how to bridge the gap between security fiction and reality by enhancing risk assessments, incorporating tech innovations and empowering your security team.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec