As the deal/no deal prospects of Brexit are tossed in a whirlwind of UK and EU politics, the uncertainty of the back-and-forth has broadly impacted general economic trends, and by extension, the physical security market. The new deadline for a Brexit agreement is October 31, already postponed six months from the scheduled April 12 departure date. Numbers show that Britain’s GDP shrank in the second quarter, possibly reflecting fewer exports because of Brexit uncertainty. And beyond the cu...
OPTEX, the sensor manufacturer, has now launched in the UK and other English-speaking countries the VXI-CMOD – a new 180° day/night Wi-Fi camera module that can be easily integrated with its outdoor VX Infinity (VXI) sensor to create an app-based visual verification solution. The VXI series provides highly reliable outdoor detection with a range of up 12m and a 90° field of view. It is used for both residential and commercial applications, detecting intrusions in courtyards, garde...
Building Intelligence, global provider of cloud-based visitor, vehicle and vendor management software, SV3, has announced that they will be exhibiting at the 2019 Global Security Exchange, Sept. 8-12, at McCormick Place in Chicago. They will be showcasing a variety of new features designed to further streamline the visitor check-in process and enhance employee access management. SV3 cloud-based software SV3 now offers a completely new portal to provide access for new employees SV3 now enables...
People and vehicle access control specialist Nortech is now offering Nedap’s ANPR Lumo, an advanced licence plate camera for vehicle access control. The ANPR Lumo is an all-in-one licence plate camera, including embedded software, analyser and IR illuminator. With a range of action of 2 to 10 metres, the advanced camera ensures a smooth recognition of vehicles. Applications include automatic toll collection Typical applications include vehicle access control, automatic toll collection,...
Riskline has expanded its collection of City Safety Maps to cover 150 cities worldwide and is on course to reach 200 by the end of 2019. From Los Angeles to Suva in Fiji, Helsinki to Santiago, Port au Prince to Port Moresby, there are maps of cities in every continent, larger and smaller across the circle of the globe, west to east, north to south and many in between. Street-level safety and security City Safety Maps bring unique street-level safety and security information, a first in the tr...
In a move to build upon their existing radar technical and sales support, 360 Vision Technology, renowned UK CCTV manufacturing company, is delighted to announce that it has appointed Mark Rainbow to the role of UK & Export Business Development Manager. Radar, video camera solutions Greatly experienced in the sales, engineering and specification of radar and video camera solutions across a wide range of applications, Mark begins his new role at 360 Vision Technology after 25 years with Ogi...
When a company the size of TE Connectivity, a global provider of connectors and sensors, works to change the future, the positive results can be felt around the world. TE details how it is working toward its purpose of building a safer, sustainable, connected and productive future through its products, partners and business practices in the 2018 Corporate Responsibility Report. "Our employees genuinely want to feel like they are leaving the world a better place for the next generation and helping our customers do the same," said CEO Terrence Curtin. "I'm excited about all the ways we're using digitisation in our global efforts, from creating a better online customer experience to increasing the safety and resource efficiency in our factories. TE is making the world's roadways safer, too, as the technology behind autonomous vehicles“It is also fulfilling to see how our enterprise strategy and purpose are aligning to sustainable long-term global growth trends such as the future of transportation, automation, life-saving medical devices, renewable energy solutions and connected everything." Making roadways safer As vital components of medical devices that are designed to improve patient outcomes, TE sensors and connectors are helping to save lives. For example, TE products are integral components of a medical device used to remove blood clots, minimising the risk of further strokes. TE is making the world's roadways safer, too, as the technology behind autonomous vehicles. Approximately 94% of crashes are caused by human error and autonomy removes that factor from the equation. By 2030, it is expected that 10% of vehicles will be fully autonomous with new features like predictive ride technology that would allow cars to sense and react to the state of the road ahead. In addition to helping make the world safer with its products, TE is also working to reduce risks in its own facilities. Since the launch of TE's Safety Assessment for Effectiveness program in 2010, the company has seen a 61% decrease in reportable accidents and received external recognitions for its safety initiatives globally. Received awards from multiple countries TE technology connects and protects electrical equipment for safe, reliable and high-performing wind farmsThree sites in Germany received the Golden Hand Award from safety insurance company BGHW for preventing hand and finger injuries. TE's plant in Thailand earned a Zero Accident Award from the Ministry of Labour in recognition of the 3.2 million hours of operation since its opening in 2015 without an incident. And in Greensboro, North Carolina, TE facilities earned two honours from the state Department of Labour: The Gold Safety Award and recertification through 2023 as a Carolina Star site. Through a series of Energy Treasure Hunts, TE uncovered opportunities to reduce energy use by an average of 6% at manufacturing sites, contributing to a 30% decrease in energy use intensity since 2010. Because of this program's success, another 45 plants around the world have committed to completing an Energy Treasure Hunt in FY2019. TE also supports customers developing the future of renewable energy. TE technology connects and protects electrical equipment for safe, reliable and high-performing wind farms, from wind turbines to the grid and on to substations. Delivering a better customer experience TE technology will be the foundation of tomorrow's smart cities, in which people can track public transit with smart phonesTE factories around the world are becoming more digital as the company embraces the Industry 4.0 revolution to increase productivity and deliver a better customer experience. The sensors and connectors created in these factories are integral in embedding the Internet of Things into our daily lives as the bridge between hardware and software. And TE's engineers work with customers, large and small, to help explore efficiencies and design solutions these partners might not have considered on their own. TE believes that more possibilities reveal themselves as the world becomes more connected. TE technology will be the foundation of tomorrow's smart cities, in which people can track public transit with their smart phones, cars will make safer and faster decisions than human drivers and high-speed rail systems will get people where they need to go more efficiently. TE employees strive to build deep connections with the communities in which they live and work through charitable outreach. In the past year, employees recorded 36,000 volunteer hours and more than $5 million was donated to 1,500 non-profits in more than 100 communities around the world by TE and the TE Connectivity Foundation.
Taking video analytics to the next level, VIVOTEK, globally renowned IP surveillance solution provider, has introduced a brand new license plate recognition camera, the IB9387-LPR. Featuring a built-in license plate recognition software and edge-computing capability without additional server, the IB9387-LPR can identify license plates of vehicles from over 70 countries around the world. These and other features make it one of the most powerful License Plate Recognition (LPR) system and a cost-effective all-in-one device applied for condominiums, parking access control and Stop & Go toll systems. VIVOTEK IB9387-LPR camera VIVOTEK’s IB9387-LPR offers efficient access control management through black & white lists VIVOTEK’s IB9387-LPR also offers efficient access control management through black & white lists and multi-site camera centralised maintenance. With a black & white list embedded inside the IB9387-LPR, the control barrier will open the gate when a white list vehicle is detected. On the other hand, a blacklist vehicle will trigger an alarm and a notification will be sent to security staff. With VIVOTEK’s IB9387-LPR, security staffs of parking lots with multiple entry points no longer need to upgrade system one after another. They can simply upload these lists to a single centralised LPR camera and all the other LPR cameras will download the master list, thus significantly reducing both installation time and maintenance efforts. Application Programming Interfaces Thanks to its various Application Programming Interfaces (APIs), third-party systems such as parking management, toll collection, and weighbridge systems are able to receive live LPR images with specific country, state, date, time, and confidence level from IB9387-LPR. Additionally, the sophisticated camera is safeguarded by Trend Micro IoT Security, providing proactive protection in cybersecurity. Combining recognition and security management technology, VIVOTEK’s IB9387-LPR offers an intelligent, scalable and highly secure standalone LPR system.
With the release of the Volvo XC90 Armoured, Volvo Cars takes another step as a manufacturer of armoured vehicles. The cars are designed and built to provide safe and comfortable travel with a high level of personal protection for the occupants. "We are proud to be able to offer these armoured cars. With our armoured cars, we can provide vehicles with a high level of personal security for individuals who require heightened protection," says Stephan Green, Marketing Director at Volvo Cars Special Vehicles. Volvo XC90 Armoured XC90 Armoured (heavy) with VR8* protection rating is a car that provides a high level of protection There is a growing global market for armoured vehicles at present, and a large number are manufactured with various protection ratings. Volvo Cars has received numerous requests over the past few years to develop an armoured XC90. Volvo Cars has extensive experience of building police cars, fire engines and diverse special vehicles with high requirements in terms of function, drivability and safety. In fact, the first Volvo police car was delivered back in 1929. "The XC90 Armoured (heavy) with VR8* protection rating (VPAM BRV 2009/ERV 2010) enables us to offer a car that provides a high level of protection while retaining the car's fundamental properties. Potential customers include security services who would use the car to transport high-profile individuals," says Green. Armoured vehicles Work to develop a car with a VPAM VR8 protection rating commenced just over two years ago. A certified VPAM VR8 rating means the car has 360-degree ballistic resistance as well as explosive resistance. The armoured car is built on the Inscription version of the Volvo XC90 T6 AWD, which is manufactured at the Torslanda plant in Sweden. The size and nature of the model make it the most suitable vehicle in Volvo Cars' product portfolio for armouring. From Torslanda, the car is sent to TRASCO Bremen GmbH in Germany, a company which has specialised for many years in building high-quality vehicles with high protection ratings. High-strength steel armour Production is classified, with stringent procedures and oversight in place to attain the stipulated ballistic requirements" "Production is classified, with stringent procedures and oversight in place in order to attain the stipulated ballistic requirements," says Green. The high-strength steel armour is 10 millimetres thick, while the thickness of the glass can be up to 50 millimetres. The armour adds approximately 1,400 kilograms to the XC90, which brings the total weight of the car up to 4,490kg (including five occupants). To cope with the increased weight, the car is fitted with uprated suspension and new brakes. High protection ratings "Production is carried out with extreme diligence, which is imperative in order to fulfil the exceptionally high requirements placed on this class of security product. We strive to ensure that the car retains its properties despite the extensive armouring. The armour is fitted discreetly to make the car barely distinguishable from a standard XC90. Every customer also has their own unique requirements, which we satisfy by means of customised production," says Green. The Volvo XC90 Armoured (heavy) is available to order now and the first customer deliveries will be made at the end of 2019. Volvo Cars also develops another version of the armoured car (light). This means that Volvo Cars has a full portfolio of cars able to offer high personal protection. These cars are built on the XC60 T6 AWD Inscription or XC90 T6 AWD Inscription. VIP security These versions are geared towards different clientele than the XC90 Armoured (heavy). Users could be individuals or companies requiring a car with a higher level of protection due to a geographical risk or a heightened personal threat. A market for these types of protective vehicles also exists among security services, the police, the diplomatic corps and private individuals. The cars will undergo a battery of ballistic tests to ensure the required protection rating is fulfilled The cars are intended for Latin America and Europe. After construction, they are retrofitted in Brazil, where there is considerable demand for these types of cars as well as substantial experience of building them. These vehicles are designed to offer lighter protection compared with the XC90 Armoured (heavy). Protection in active shooter situations The cars will undergo a battery of ballistic tests to ensure the required protection rating is fulfilled. They primarily provide protection against handguns. The weight of the car is increased by around 250 kilograms, which is compensated for by upgrading the brakes and suspension. This means that the fundamental properties remain largely unchanged compared to the standard car.
Dahua Technology, globally renowned video-centric smart IoT solutions and service provider, has launched IVSS 2.0 (IVSS7000-I), an upgraded series of its NVR family powered by the latest AI capable of deep learning, which opens up new possibilities to smart security solutions. Upgraded IVSS 7000-I The upgraded IVSS 7000-I features scalable GPU design to meet the ever-growing project requirements. The unique Dahua Deep-Learning algorithm with GPU group enables IVSS7000-I to perform face recognition, perimeter protection and metadata with high accuracy. Offering advanced Artificial Intelligence features, it even enables danger prevention via faster video content inquiry, rapid discovery of targets as well as real-time and accurate alarm in a variety of applications, providing AI-based all-in-one surveillance solution for customers. Some major features of IVSS7000-I are detailed below. AI-powered facial recognition technology Dahua Technology’s AI-powered face recognition technology enjoys a high reputation in the industry Dahua Technology’s AI-powered face recognition technology enjoys a high reputation in the industry, as testified by multiple first prizes in international competitions. Equipped with Dahua face recognition technology, IVSS7000-I series records face by structured data and performs real-time crosscheck with reliable accuracy to figure out the face by features of the target. Supporting up to 256-channel face recognition by device and up to 256-channel face recognition by camera, IVSS7000-I can analyse up to 50 different face databases with 300,000 face pictures in total. Besides, the upgraded IVSS7000-I also supports search by face image which means users can upload face pictures to IVSS7000-I and compare them with recorded ones by similarity. VIP recognition and access control IVSS7000-I series can realise a lot of functions for users such as VIP recognition, blacklist alarm, stranger identification, attendance management, access control, etc. It divides faces detected into different categories defined by users, and acts accordingly, like notifying the manager that a VIP customer is coming or sending an alert when a persona non grata is identified. Users can choose Regular/Stranger mode to trigger kinds of alarm actions according to different applications. Focusing on people and vehicles, perimeter protection automatically filters out false alarms caused by animals, rustling leaves, bright lights, camera shaking and other irrelevant elements. It also enables system to act secondary recognition for the targets, thus significantly improving alarm accuracy with saved cost. In terms of perimeter protection, IVSS7000-I supports up to 256-channel with each channel allowing up to 10 IVS rules. Enhanced metadata Metadata is feature attribute information of a target object which can be used for data retrieval. Currently, there are mainly four types of metadata that are human face, human body, motor vehicle and non-motor vehicle. IVSS7000-I supports up to 64-channel video metadata, making it possible for operators to quickly and easily search through multiple channels and long duration to find out when and where a person/vehicle of interest appeared, which significantly enhances accuracy and efficiency. The IVSS7000-I employs optimised GUI which is easier for users to learn and use. With the same GUI working for local output and PC client, training cost of system operator is reduced. Comparable to VMS client, the new GUI design is more user-friendly for project-level customers. Remote access IVSS-I can meet variable needs of users, thus applicable to a wide range of scenes Apart from the above features, IVSS7000-I also allows independent PC client for remote access so that users will not be bothered by things like Web plug-ins and browser update. It's also worth mentioning that with a new security center to keep hackers away, IVSS7000-I series provides a safer network environment for users. Being multifunctional, IVSS-I can meet variable needs of users, thus applicable to a wide range of scenes, including entrances and exits of banks, business parks, schools, prisons and transportation centers like airports, railway stations that are sensitive to strangers and criminals; or the shopping malls that want to protect customers from petty thieves; or football stadiums that choose to ban those known hooligans for good. Intelligence and safety As a key back-end product to smart security system, IVSS7000-I brings intelligence, safety, and reliability to a new level. With a mission of Enabling a Safer Society and Smarter Living, Dahua Technology will continue to focus on “Innovation, Quality, and Service” to serve partners and customers around the world.
Morse Watchmans, the industry pioneer in key control and asset management systems, is showcasing the benefits of their KeyWatcher Touch and AssetWatcher key and asset management solutions at IFSEC International 2019 (stand no. IF620) in London, from June 18-20. The company is also introducing KeyWatcher Fleet, a key control system specifically for fleet management, to IFSEC attendees. “We’re thrilled to once again showcase the exciting features of our AssetWatcher and KeyWatcher Touch solutions,” said Fernando Pires, CEO at Morse Watchmans. “This year, IFSEC attendees can get a demo of our KeyWatcher Fleet, which is purpose-built for fleet managers. We are looking forward to sharing all three key and asset control products with IFSEC 2019 attendees.” Tools to optimise vehicle usage Morse Watchmans’ KeyWatcher Fleet offers fleet managers a wide array of tools to maintain and optimise vehicle usageMorse Watchmans’ KeyWatcher Fleet offers fleet managers a wide array of tools to maintain and optimise vehicle usage while reducing many operational costs. Managers can create user role-based ‘Pools’, or groups of vehicles, to automatically assign each vehicle accordingly. Flexible booking workflows enable customisation to balance usage, ensure vehicle availability and more. A range of service features makes it possible to report problems and automatically initiate new or scheduled work on each vehicle. System alerts notify management to specific issues such as an unauthorised booking attempt or expiring driver’s license, and the system generates a number of useful reports with actionable insights. A convenient dashboard displays real-time status, bookings summary, vehicle use and many other data points to provide the pulse of the fleet in an instant. KeyWatcher Touch key management system The AssetWatcher is Morse Watchmans flexible, scalable, and highly capable RFID-enabled locker systemMorse Watchmans’ KeyWatcher Touch key management system utilises a 7” touchscreen for an easy-to-use interface and patented SmartKey system with KeyAnywhere technology to make it simple to withdraw and return a key securely to any key cabinet in an enterprise. Updates to KeyWatcher Touch for 2018 include a new database design, a desktop fingerprint reader that allows users to enrol fingerprints through TrueTouch software, and the ability to utilise multiple KeyWatcher Touch server instances with a single SQL database. The AssetWatcher is Morse Watchmans flexible, scalable, and highly capable RFID-enabled locker system. Perfect for tools, mobile devices and other valuable items, it can easily support more than 10,000 users on a single system and is configurable in three usage modes for flexible usage. AssetWatcher’s RFID technology allows you to easily track who is removing or replacing an asset, as well as when and where in the system the asset has been taken from or placed. Proven features of KeyWatcher, including email notifications, multi-site operation, and multi-user capability, bring the highest levels of security and capability to AssetWatcher.
IDIS has launched its totally cost-free IDIS Dynamic Privacy Masking (IDPM) solution at IFSEC International (stand IF1110 at London’s ExCel) 2019. IDIS now offers a simple answer to the previously labour-intensive – or prohibitively expensive – problem of de-identification in video footage which is being submitted in response to requests for access under The General Data Protection Regulation (GDPR) or for evidential purposes. Protecting privacy with masking GDPR came into play during a challenging time and some users have stopped reporting smaller losses" Last year, GDPR gave the right to any person captured by a video surveillance camera to access a copy of their personal recorded data. But at the same time, companies are required to protect the identity of other individuals who feature in the recorded video, with anonymisation and masking. The same de-identification also needs to be applied when providing video clips to the police and courts for use as evidence. GDPR-compliance for incident investigations Jamie Barnfield, Sales Director at IDIS Europe, says that many small to medium companies – for example, retailers and eating-out chains - are struggling to manage their recorded video footage. They are under pressure to provide police with GDPR-compliant video for incident investigations, to respond to freedom of information requests from the public, and to supply footage to insurers assessing claims including as slips, trips and falls. In all of these cases the video needs to be redacted, Barnfield points out. “GDPR came into play during a challenging time and some users have stopped reporting smaller losses and petty crimes because of the increased work involved. For others the alternative has been to resort to expensive video cloaking services that charge by the minute, or to use third-party redaction software not budgeted into the running costs of their surveillance operations,” he said. IDIS Dynamic Privacy Masking (IDPM) Solving this problem, IDPM is now available from the IDIS Partners Portal as a direct download. It allows authorised system users to blur sensitives areas and dynamically de-identify faces, vehicles etc. Crucially, IDPM does this automatically for the duration of the clip, even as the object or person moves around the scene. Users can then quickly save video as clips or project files via the IDIS Clip Player which, crucially, does not rely on transcoding to prevent forgery. The integrity of recorded video is already assured with IDIS Chained Fingerprint technology As a result, masking can easily be removed later by the authorised user without affecting the integrity of the footage, if that becomes necessary for a subsequent investigation. Users also have options to set passwords and expiration dates, and to control who can access and play video files. IDIS Chained Fingerprint technology The integrity of recorded video is already assured with IDIS Chained Fingerprint technology, which extracts distinctive features of recorded video data to create fingerprints for each frame and then embeds each fingerprint into the data of the next frame, connecting each frame together with the next like a blockchain. “IDPM now gives users a simple, fast and intuitive tool to provide evidence to the police and courts so that theft, abuse and violence against staff can be investigated and criminals brought to justice. At the same time companies can respond, within the stipulated timeframe, to information requests in line with GDPR without additional costs,” added Barnfield.
Artificial intelligence allows machines to do jobs previously done by people. When it comes to security and surveillance, this technology allows cameras and control room equipment to identify a wide range of threats automatically and in real time across hundreds or even thousands of cameras – allowing security teams to take immediate action to protect people and assets. AI technology and surveillance solutions Artificial Intelligence technology built into surveillance solutions help organisations optimise their security Video surveillance cameras are the electronic eyes of any security operation. In the past, human supervision was needed to make sense of the images captured, and to assess whether certain events posed a security risk or not. With some organisations using hundreds or even thousands of cameras to protect their people and assets, manual review of footage is simply impossible – potentially leaving them vulnerable to security breaches. Advanced Artificial Intelligence technology built into surveillance solutions can help organisations overcome this challenge and optimise their security. This means cameras, control-room equipment and back-end infrastructure can now ‘learn’ about potential threats for themselves by recognising people, vehicles and even behaviours. Detection and prevention The manual interventions needed with traditional security systems mean that teams were frequently reacting to breaches that had already happened. Artificial Intelligence changes all this by recognising potential threats before they impact company’s people or assets – allowing security teams to react immediately to neutralise any potential threat. Artificial intelligence solutions can automatically trigger alerts when a person appears in a restricted area For example, artificial Intelligence solutions can automatically trigger alerts when a person appears in a restricted area, or when a vehicle with a blacklisted number plate enters a site. With alerts delivered in real time, teams can identify and react to security threats and protect people and assets more effectively. And because alerts are automated, potential threats are hardly missed or overlooked. How does artificial intelligence work? Artificial Intelligence systems become more intelligent over time, building databases of potential threats and reacting to new events accordingly. This allows systems to ‘think for themselves’ and to alert teams of any suspicious events or people who are caught on camera. Artificial intelligence technologies use advanced algorithms based on Deep Learning to distinguish between different kinds of security events and threats. Technologies incorporated into the Hikvision portfolio include: Facial recognition which allows law enforcement personnel to identify suspects and commercial teams to identify VIP customers in real time. Vehicle identification which can be used to identify vehicle number plates and recognise different types of vehicles (even down to make and model), or to trigger alerts when vehicles enter restricted areas. Perimeter protection which helps organisations to identify real threats by distinguishing people and vehicles from other moving objects and keeping false alarms to a minimum. Business intelligence which employs people counting, queue detection, and heat mapping technologies, so that organisations can enhance operational efficiency by making use of the data report. Increasing commercial success Artificial intelligence isn’t just useful for identifying security threats – although this is a key strength of the technology. It can also help organisations increase their competitiveness and commercial success. For example, VIP customers who opt to participate in special marketing promotions or other incentives can be identified so staff can provide the right kind of service at the right time. This gives organisations the opportunity to personalise the service experience, foster loyalty and maximise customer lifetime revenues. Artificial Intelligence can help organisations to better understand customers and meet their needs more effectively In the same way, artificial Intelligence can help organisations to better understand customers and meet their needs more effectively – leading to more commercial opportunities. One feature – called People Counting – allows stores and commercial centres to map footfall at peak times, ensuring that staffing is optimised to meet demand. At the same time, stores can see which areas of the building customers visit most and adjust their merchandising and product positioning accordingly to maximise the sales opportunities. Artificial intelligence at Hikvision Hikvision’s family of artificial intelligence products include the DeepinView network cameras and DeepinMind NVRs. The products help to tackle security with facial recognition; monitoring and counting of people; and recognition and detection of vehicles, to name a few. These features all depend on artificial intelligence technology to recognise, classify and respond to security threats. This article was written by Hikvision.
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilised by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing an effective action plan When strategising how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilising doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organise a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategising how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing public areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install guard booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
According to the reports of not-for-profit organisation Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location. While definitions of mass shooting vary with organisations in the US, the count of over 300 incidents per year, or about once per day on average, is simply alarming. It raises public safety concerns, ignites debates and protests, which in turn lead to public unrest and potentially more violence, and increases costs for governments from the regional to federal level. Most importantly, the loss of lives demands not only improvement in post-incident handling and investigation, but also new prevention technologies. Gunshot detection solutions AI weapon detection offers a more efficient alternative to prevent active shooting There are several gunshot detection solutions in the security market, commonly used by law enforcement agencies to detect and locate gun fires. These systems function based on acoustic recordings and analyses and often in combination with signals detected by sensors of the optical flash and shockwave when a gun is fired. However, gunshot detection by nature dictates that the law enforcement can only react to a shooting incident that has occurred. With fast action, law enforcement can prevent the incident from escalating, but lives that are lost cannot be recovered. With the development of artificial intelligence in object recognition, AI weapon detection offers a more efficient alternative to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognise firearms in different shapes, sizes, colours, and at different angles in videos, so that the AI weapon detector can be deployed with existing cameras systems, analyse the video feeds, and instantly notify security staff when a gun is spotted. Comparison of the advantages for law enforcement and public security agencies Legacy gunshot detection using sensors AI weapon detection Reactive measure: detect after guns have been fired Proactive measure: detect before guns are fired Time to action: within 1 second Time to action: within 1 second Unable to provide visual data about shooter(s) Can provide data about shooter(s) based on the camera recording: clothing, luggage (backpack, handbag, etc.), facial features, vehicle Unable to track the location of the shooter(s) before and after shooting because of the lack of sound Can track the shooter(s) using AI Person & Vehicle Tracking, AI Face Recognition, and AI License Plate Recognition False detection caused by similar sound such as fireworks and cars backfiring Minimal to no false detection, as AI can distinguish different types of handguns and rifles from normal objects (umbrella, cellphone, etc.) Require physical deployment of gunshot detection sensors Can be used with existing camera systems, do not require special hardware Complicated to deploy, require highly trained professional Easy to deploy as an add-on to existing video surveillance system - Can integrate with gun-shot detection to create a “double knock” audio and video active shooter alert system Gun-shot detection advantages In addition to advantages for law enforcement and public security agencies, this type of visual-based pre-incident detector has three-fold advantages for the public: Save lives by spotting the shooter before the shooting event. Minimise the chaos entailing an incident: panic and chaos caused by a shooting incident often adds to injury, as people run, fall, trample on others… With an AI weapon detector, when a gun is spotted, the system sends an alert to security staff, who can quickly control the situation in an organised manner and apprehend the intending shooter. Can be added as a SaaS (Security as a Service) component to small business and home surveillance systems, e.g., intrusion detection alerts (home invasion incidents with firearms number over 2500 per year nationwide). For a complete active shooter detection system, video-based AI detector can operate in conjunction with gunshot detectors for enhanced security. Traditional X-ray based weapon detection or metal detection entrance systems are complicated and expensive; with AI video technology, active shooter detection system can be cost-effective, and after all, what price tag can one put on a life? Written by Paul Sun and Mai Truong, IronYun
Video surveillance cannot address all the security challenges in education, but it is a valuable tool and among the least obtrusive options available. And the list of security challenges that video can address grows every day. Video systems can provide real-time monitoring of school premises and facilitate rapid response to incidents. New advances such as video analytics are currently underutilised in the education arena. Historically, video has been used as a forensic tool in the education market, providing critical information about an incident after the fact. But that generalisation is changing. Today, networking enables video images to be shared throughout a school system, travelling over existing networks, empowering a more centralised security management structure, and making video more valuable. In particular, higher education institutions are more likely to view live video, given the larger campuses, greater number of buildings, and more public areas where staff and students congregate. Challenges for securing a school environment Panoramic cameras are one tool to address challenges, as a single 360-degree camera can replace between 4 and 5 PTZ camerasMultiple challenges in the education market for security goods and services (from a video perspective) include wide open spaces that make securing schools with video surveillance cameras difficult since the vast amount of coverage required can be cost-prohibitive. Second, state and federal regulations must be taken into account and balanced with the need to protect student privacy. Finally, schools and colleges face dwindling budgets, which means security solutions must deliver more coverage and functionality, while also being cost-effective to deploy. Panoramic cameras are one tool to address these challenges, as a single 360-degree camera can replace between four and five traditional pan-tilt-zoom cameras, resulting in fewer cameras and more coverage – all at a lower cost for hardware and licensing. Data capture form to appear here! Intelligent cameras with video analytics Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search The goal in a potentially dangerous situation is to speed up response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly. Video cameras with low-light capability There are video cameras available with extreme low-light capability to see in near-dark or complete darknessIt’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Facing above-average student incident rates and student disciplinary concerns at some schools, a school system in the United States sought to upgrade its video surveillance system to allow better local and remote monitoring in important areas. Avigilon high-definition cameras with self-learning video analytics and access control solutions were installed in 101 schools, and ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search. A deep learning artificial intelligence search engine can sort through hours of footage and allow operators to click on a button and search for all instances of a person or vehicle across all cameras on a site, quickly and efficiently.
Artificial intelligence (AI) is expanding the capabilities of license plate readers and vehicle identification systems. Within a smart/safe city scenario, automatic license plate reader solutions are used to help analyse real-time video streams for site surveillance, inspection and public safety, and to offer actional information through a network of connected camera systems. Outside of law enforcement, this can include other public safety initiatives such as traffic tolls, car counting, and parking security. Vehicle recognition systems Rekor Systems is a provider of vehicle recognition systems in more than 60 countries Using AI to enable video cameras, Rekor Systems is a provider of vehicle recognition systems in more than 60 countries. Applications include security and surveillance, public safety, electronic toll collection, brand loyalty, parking operations, banking and insurance, logistics, and traffic management. AI allows Rekor’s products to recognise and read license plates, while also providing information about each vehicle, including colour, make, year, and model. Rekor’s products are powered by OpenALPR software, an AI-based solution that enables any IP (internet protocol) surveillance camera to scan license plates and provide vehicle data including tag number, make, model, and colour in real time with 99% accuracy, according to the company. Rekor’s products are powered by OpenALPR software Integrated solutions “Rekor's software started as an open source project, and we have done our best to keep the commercial software as open as possible,” says Rod Hillman, Chief Operating Officer, Rekor Systems. “One of the challenges we see with others in our space is a tendency to ‘close off’ and ‘silo’ their solutions. Our goal is to make it as simple as possible to deploy, integrate, and ultimately use.” Rekor has numerous application programming interfaces (APIs) and ways the solution can be integrated into partners' solutions with a software development kit (SDK). Rekor solutions can be purchased directly or through a worldwide partner network of integrators, wholesalers, and within integrated solutions such as Nokia's smart city platform. Electronic toll collection Rekor’s solutions have viable applications within multiple markets While many systems are hardware-based, Rekor’s software-as-a-solution offering can turn an IP camera into an automatic license plate reader. Rekor’s solutions have viable applications within multiple markets, including law enforcement, security and surveillance, electronic toll collection, parking operations, banking and insurance, logistics, traffic management, and customer experience. “Rekor offers a cost-effective alternative to traditional LPR systems with a much higher accuracy rate at 99% allowing more cameras to be present and active at any given time,” says Hillman. “Traditional LPRs need someone to go through hours of footage to find what they are looking for while Rekor’s technology will send alerts in real time, resulting in much quicker response times.” Move Over Camera mounts onto roadside worker’s vehicles to capture ‘Move Over’ violations Two-part authentication Rekor’s products include: NUMERUS, a cloud-based solution for high-volume vehicle recognition, designed to reduce costs and increase efficiencies for the electronic toll collecting industry. Two-part authentication instantly identifies the vehicle’s make, model, colour and body type along with the license plate read. Machine-learning-enabled software recognises license plates from all 50 U.S. states, in addition to plates from more than 70 countries on six continents. Edge, an all-in-one camera and vehicle recognition system that instantly reads vehicle license plates, along with the vehicle’s make, model, colour and body type. Move Over Camera, which mounts onto roadside worker’s vehicles (police, tow truck, etc.) to capture ‘Move Over’ violations. ‘Move Over’ laws state that vehicles must move over one lane and/or slow down if they cannot move over to avoid incident while roadside workers are in the shoulder lane. The camera can detect what lane vehicles are in and how fast they are moving. Violators are flagged in the system for law enforcement’s review.
As a security service provider with a rich history in manguarding, Allied Universal is launching a new technology platform to increase productivity and accountability of security officers and to transform guard service operations from an ‘observe and report’ mission to a ‘detect and respond’ function. Mark Mullison, Allied Universal’s Chief Information Officer (CIO), says the new Heliaus platform also uses artificial intelligence (AI) to analyse data, predict outcomes, and prescribe optimum responses. The platform includes a smart phone app that guides security officers to ensure post orders are followed and provides a ‘virtual’ coach or supervisor to guide security officers throughout the day. “The walls between technology and people need to come down in the future,” says Mullison. “We need an ecosystem in which people and technology can cooperate well and respond to threats and drive outcomes.” Real-time situational awareness Technology plays an increasing role in security and safety, but it will never replace humans"Heliaus is a step in that direction. It has two components – the mobile app used by security officers; and a cloud-based portal, like a command and control centre that compiles information from the app and other inputs and performs AI analysis of data. Heliaus is an add-on for Allied Universal customers and is offered for a per-device subscription fee of $199 per month. A customer company’s managers can also access the portal for data visualisation tools and real-time situational awareness, or to input data such as ‘approving’ an incident report or action. “Technology plays an increasing role in security and safety, but it will never replace humans,” says Mullison. “It will augment and enhance the workflow and make people more effective.” “We are focussing on delivering better outcomes for safety and security,” he adds. “The impacts are as broad and diverse as the clients we serve.” Customisation of forms enables the system to collect and use any information that was previously collected on paper. Monitoring and Response Center (MaRC) A system is effective only to the extent that it is used, and Allied Universal has engineered the user experience to make the mobile app easy – almost fun – to use, says Mullison. Elements of ‘gamification’ drive greater user adoption. “It is designed to support the work [security officers] do and make information collection a by-product of people doing their jobs.” The system brings together rich data, AI, location-aware workflow automation, and friendly user experience design Effective AI depends on data, and Heliaus pulls data from Allied Universal’s Monitoring and Response Center (MaRC), where a cloud server integrates the company’s managed security services, including access control, video surveillance and video analytics. It also incorporates current weather information and forecasts, and information specific to the industry segment. Additional data is generated as officers enter data through the mobile app. The system brings together rich data, AI, location-aware workflow automation, and friendly user experience design. It provides insight into the drivers of risk, makes recommendations about how to reduce incidents, and, through dynamic workflow automation, ensures that those recommendations are implemented. Location awareness is a combination of the global positioning system (GPS), Bluetooth beacons, and near-field communication (NFC) tags. Improves the accuracy of responses AI understands the data and applies reasoning capabilities to predict an outcome and prescribe a response“Information is organised to facilitate AI analysis. If you have the right knowledge representation then problem-solving is easy,” says Mullison, echoing a common principle of artificial intelligence. AI works to analyse data and make predictions and recommendations to guide responses by security personnel. AI understands the data and applies reasoning capabilities to predict an outcome and prescribe a response. The AI system also learns and improves the accuracy of responses with more data and over time. Responses come much faster than older ‘trial and error’ models of analysis. Another element of Heliaus is a ‘robust workflow engine’ that ensures recommendations are carried out, either by a security professional on site or by the client. Mullison says implementation of the system can result in a 20% reduction of security and safety incidents. Multiple applications of Heliaus Heliaus is already being used by some Allied Universal customers. For example, a major Hollywood production studio is using it to identify and address workplace hazards such as stray electrical cords, dripping water hoses, etc., across a 50-acre area. In the logistics sector, Heliaus is being used to facilitate checking delivery vehicles in and out of a truckyard A manufacturer created a custom compliance application using the platform to track more than 140 unique incident types, such as monitoring elevated temperature in a truck trailer or drivers without proper identification. In the logistics sector, Heliaus is being used to facilitate checking delivery vehicles in and out of a truckyard. The flexibility of the platform can enable expansion to incorporate other technologies in the future, too. For example, sources of data for the system could include robots, drones or various Internet of Things (IoT) sensors; or workflow engines could be used to dispatch a robot or drone to handle a situation (rather than a human).
Located in Eastern China, Hangzhou is the capital and most populous city of Zhejiang Province. It has registered population of 9,800,000, with total area of 16,596 km². Jianggan District is one of the five main urban areas of Hangzhou. With a floating population of about 1.06 million, Jianggan District ranks first among Hangzhou's main urban areas. As the new administrative center of Hangzhou, it boasts the most important CBD and the largest train station and car hub in Hangzhou, bringing together various traffic elements such as highway junctions and bridges across the river. The entire Jianggan District is promoting vital transformation in urban areas Intelligent surveillance system Covering 8 streets, 141 communities and 4 villages, the entire Jianggan District is promoting vital transformation in urban areas. Nevertheless, the non-registered population, accounted for about 40% of the total population, makes it hard for the local government to improve urban management in the district. Every policeman needs to manage 1,700 citizens on average. The shortage of police force affected their work precision and led to difficulties in providing timely police response. In addition, insufficient surveillance coverage and limited intelligence system in the area resulted in inactive security measures, making it difficult for the police to achieve their goals Integrating DoT, IoT and the internet Based on the Dahua Heart of City (HOC) architecture supported by "Full Sensing, Full Intelligence, Full Computing and Full Ecosystem (4 Full) capabilities, Dahua Technology firmly focused on the construction needs of the area and built the overall plan of establishing an ‘online police’. Integrating the Internet, DoT and IoT, Dahua Technology has successfully assisted the Hangzhou Jianggan Public Security in building a multi-dimensional network that targets customer value, and combines AI, big data, and cloud computing in order to obtain accurate real-time data and strengthen the current technology of “online police” operations. Sensors and monitoring products Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network Moreover, Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network. It also set up 46 actual police investigation models to provide accurate instructions for Jianggan police, including property crimes analysis, situation analysis, vehicle management, people management, psychiatric control, online apprehension of violators, as well as missing person search, etc. Compared with traditional police operation, Dahua HOC Safe City Solution has built an “Online Police” mechanism to obtain the most authentic real-time data through information technology, and carry out accurate computer applications for a more scientific service deployment, efficient police force and powerful security control. Dahua HOC Safe City Solution It ensures that the Jianggan police can perform properly at a given time. It also promotes the transformation of police affairs from passive to active, from extensive to subtle, from imprecise to accurate, and from offline to online, gradually carrying out the prediction, early-warning, and prevention measures of police operations. Since 2016, the Dahua HOC Safe City Solution has helped Jianggan Public Security achieve outstanding results including enhanced police intelligence, reduced crime cases, increase in case closure rate and efficiency, improvement in public service, and speedy recovery of missing individuals, opening a new chapter for intelligent police operations.
Airbus, a provider of secure communication and collaboration solutions, provides mission critical communications technology to the Kingdom of Saudi Arabia for this year’s Hajj pilgrimage. Airbus has been a trusted supplier of secure communication solutions for the Hajj pilgrimage every year since 2017. With the implementation of its systems to ensure faster emergency response for public safety, and use of its state-of-the-art technology, Airbus and STC Specialized ensured the smooth running of security operations which safeguard millions of visitors each year. Th1n Tetra radio and AVL technology Various security organisations benefited from Airbus’ trusted solutions which include the slimline Th1n Tetra radio and Automatic Vehicle Location (AVL) technology. These inform dispatchers of each mobile unit’s location, status, and active Tetra talk groups. The information is then sent to all the relevant emergency personnel using the STC Specialized network powered by Airbus’ Tetra solution; such as the Ministry of Hajj, the Ministry of Health, and the Mecca Municipality. Airbus’ mission critical solutions facilitated the monitoring of this major event, as well as the communication between ground staff and the control rooms, enabling them to immediately address any on-site emergency while benefitting from the stability, continuity, and reliability of Airbus technology when and where it is needed the most. The Hajj is the largest Muslim gathering in the world and takes place every year over a period of six days. This year, from the 9th of August onwards, around 1.8 million Muslims visited the holy city of Mecca.
People and vehicle access control specialist, Nortech offers a number of products within the Nedap product range that use vehicle tagging to identify individual vehicles while they are moving through a monitoring point. uPASS Reach reader The uPASS Reach reader offers long-range vehicle identification for up to 5 metres using the latest UHF technology. With consistent reading up to 5 metres and adjustable onsite reading as just two of the benefits of the system, the uPASS Reach reader has an elegant slim design, LED and audible read indication and is encased in weatherproof housing. It also operates with passive UHF tags, self-adhesive windscreen tags and hand-held tags with dual-technology options. Long-range passive UHF tags The reader output allows the access control system to open the gate/barrier when an authorised vehicle arrives When the uPASS Reach reader is installed (maximum height two metres) next to an automatic gate or barrier, long-range passive UHF tags are identified at a distance of up to 5 metres as soon as they are visible in direct line of sight of the reader. The reader output allows the access control system to open the gate/barrier when an authorised vehicle arrives without the need for the driver to present a card or badge, and the built-in high intensity LED provides the user visual feedback that the tag has been read. UHF tags are also both battery and maintenance-free. UHF Windshield Tag To work alongside the uPASS Reach, Nedap has designed four different UHF tags to suit all environments. The UHF Windshield Tag is a passive UHF transponder and offers long range identification up to 5 metres when installed inside non metallised windscreens. This provides cost-effective long range vehicle identification for access control applications and is available as a standard peel off version or as a tamperproof version for additional security. Passive UHF Exterior Tag Where vehicle windscreens are fully metallised, Nedap offers a passive UHF Exterior Tag which can be easily fitted onto non-metallic / plastic parts of the vehicle such as the headlights. For added security, the UHF Exterior Tag is a tamper resistant, transparent, adhesive tag. It will show visual proof of removal and is extremely difficult to remove, intact and functional. The chip inside is also protected against harmful UV rays. UHF Heavy Duty Tag This tag features a rugged design for long term use in outdoor and industrial environments The Nedap UHF Heavy Duty Tag is a passive UHF transponder which again offers long-range identification up to 5 metres with the uPASS Reach. However, this tag features a rugged design for long term use in outdoor and industrial environments. The UHF Heavy Duty Tag is a cost-effective solution for installations where the tag needs to be mounted onto the exterior of the vehicle and can also be cable tied or bolted onto bicycles, forklifts and many other industrial devices. Finally, the UHF ISO Combi Card is a card featured with long-range UHF tag and proximity or smartcard technology. Used for both people and vehicle access, it enables the use of one card for both vehicle and building access applications. Available with a range of formats such as Mifare, Legic and HID. Efficient vehicle identification reader The uPASS Reach reader complies with the ISO18000-6C and EPC global Gen 2 directive. This long-range vehicle identification reader is based on latest passive UHF technology. It is used in combination with battery free UHF (EPC Gen 2) tags, making this access control solution totally cost efficient. The uPASS Reach is ideal for convenient vehicle access to public car parks, private-run parking spaces and lots, gated communities and staff parking areas in corporate offices and government buildings.
As prominent in Belfast’s history as its cranes are on the city’s skyline, it’s hard to imagine Belfast without Harland and Wolff. Once the world’s greatest shipbuilder, Harland and Wolff today has evolved into a company that provides over 150 years of engineering excellence to the maritime, offshore, and renewable energy sectors. The Harland and Wolff facilities on Queen’s Island are now used to maintain some of the world’s largest ocean-going vessels, ranging from offshore platforms and cruise liners to offshore wind farms. The company is spread over two sites in Belfast and covers over 200 acres. Its main facility has a public-facing perimeter of no less than 1.5 kilometers. With safety as a primary consideration in the execution of projects, the company goes to great lengths to protect its investments from unwanted visitors, intruders, and vandalism. FLIR VMS solution For over 15 years, Harland and Wolff has been using FLIR’s United VMS to manage a wide variety of security cameras For over 15 years, Harland and Wolff has been using FLIR’s United Video Management System (VMS) to manage a wide variety of security cameras. As technology innovations and features were being added onto the United VMS over the years, Harland and Wolff has always remained loyal to the FLIR brand. But with the increasing development of Queen's Island as an industrial, commercial, and tourist area came a greater public presence and an increased safety and security threat. That is why in recent years Harland and Wolff has been continuously investing in the latest security camera technology from FLIR, including enterprise security cameras, PTZ cameras, intelligent thermal cameras, and mobile and wearable cameras. Optical and thermal cameras “Today, over 140 FLIR cameras on-site and along the site’s perimeter make sure that we can detect any irregularity,” said Chris Neill, security operations manager at Harland and Wolff. “Whenever one of our cameras picks up an incident – an intruder for example – an alarm is generated and sent to our security control room, who can then follow up the incident. This ensures us that our investment and that of our customers is safe and secure at all times.” Due to the high impact and risk associated to a possible incident on site, the company’s security department follows a proactive approach for possible intruders. Even in complete darkness, in perimeter areas where there is no additional lighting, thermal analytic cameras can pick up the presence of intruders, animals, or vehicles automatically based on their heat signatures. Intruder detection While thermal camera footage does not allow actual identification of intruders, it can still be used as evidence for insurance companies or law enforcers, especially when an intrusion pattern can be seen over different cameras. United VMS is FLIR’s enterprise-level software solution for video surveillance operations United VMS is FLIR’s enterprise-level software solution for video surveillance operations. The software is currently used at Harland and Wolff by four control room operators and eight managers, all of which have dedicated user rights. One of the strengths of the United VMS system is that it can connect with nearly any security camera on the market and that video streams and detection alerts can be presented on any screen, be it on a video wall, a PC, or a smartphone. United VMS But Harland and Wolff has been using United VMS for far more applications. “We also use the United VMS platform to monitor alarms coming from fire sensors on oil rigs, for example,” said Neill. “Another example is the detection of failed pumps on one of our drydocks. This information also comes in on United VMS, where we generate alarms and notify key staff in real time.” Harland and Wolff has indeed managed to make use of United VMS's flexibility and deploy it for much more than security applications only. "We are not in a static business," said Neill. "At Harland and Wolff, we are always taking on new challenges and solving new problems; FLIR’s United VMS platform helps us do that.” TruWITNESS mobile sensor technology Harland and Wolff will also make use of TruWITNESS, the latest mobile and wearable sensor technology from FLIR. TruWITNESS will allow guards on patrol to stream video directly to the control room in real time and from anywhere on the Harland and Wolff sites. Harland and Wolff needs to comply with a minimum security level imposed by the UK Department of Transport" Guards will be able to bookmark events so that incidents or irregularities can be reported and can be followed up more efficiently. In case of incidents, camera footage from the TruWITNESS wearable devices can be used as evidence. In addition, control room operators will be able to track members of staff via the United VMS and display their location on a map. Security technology advancements “Our yellow gantry cranes have become a national icon,” said Neill. “Unfortunately, this also means that they are an attractive target for political messages or, as in the past, terrorism. As a port facility, Harland and Wolff needs to comply with a minimum security level imposed by the UK Department of Transport. But in reality, we always exceed these requirements. We owe this to our continuous investments in security technology, which we also consider as a commitment to our customers.” Maybe this is what connects Harland and Wolff with FLIR. “As committed as we are to our customers, we expect the same from our suppliers as well,” said Neill. “As someone with a technical background, I have always been convinced of the quality of FLIR security products. But there will always be a time when you need to rely on technical support, and that’s where FLIR really makes a difference.”
EchoGuard receives FCC Equipment Authorisation allowing widespread deployment of the radar for security, surveillance, and airspace management applications. EchoGuard radar Echodyne, the manufacturer of innovative, high-performance radars for government and commercial markets, announces that it has received approval from the FCC for widespread deployment of its EchoGuard radar for radiolocation and radionavigation in the United States. FCC Equipment Authorisation allows the radar to be used throughout the US for ground, airspace surveillance The FCC Equipment Authorisation allows the radar to be used throughout the United States for ground and airspace surveillance applications that detect and track potential security threats with high accuracy and for ground-based airspace management applications that ensure safe navigation of commercial drone missions. Electronically Scanning Array radar Echodyne's innovative metamaterials technology and powerful software combine to create an electronically scanning array (ESA) radar in a compact, solid-state format at commercial price points for the very first time. The radar has been demonstrating award-winning performance for government, law enforcement, security, and UAS / UTM customers for some time via experimental licenses. "We are excited that EchoGuard has received this authorisation allowing its widespread adoption in the US," said Eben Frankenberg, CEO of Echodyne. "With the growing number of troubling drone incursions at airports, stadiums, and other facilities, there is tremendous demand for high-performance radar sensors. Tackling drone threats Eben adds, "Our innovative radar technology and software greatly increases the ability for security systems to accurately detect and track drone threats, as well as improves ground tracking of people, vehicles, and vessels. Our radar outperforms every other radar in its class, is priced for commercial markets, and has proven to be the best mid-range surveillance radar in the market." Features of the EchoGuard high-performance radar include: True electronic beam-steering with market-leading C-SWaP attributes; Long-range detection with high reliability and accurate tracking of multiple, concurrent air and ground targets; and Easy integration into sensor fusion and security systems for unmatched 3D situational awareness.
With its capacity of 32 million tons per year and water frontage of 6 kilometres, Chernomorsk sea port is one of the largest transport terminals in Ukraine, providing trade links with more than 100 countries all over the world. This port is a part of Eurasian transport corridor connecting the Western European countries, Ukraine, Georgia and the Asian countries. Its territory embodies the unique multimodal terminal that serves railway-ferry and auto-ferry lines as well as roll-on/roll-off vessels. The mission was to implement round-the-clock monitoring of the port territory and port waters in order to detect violations and prevent them. Monitoring in challenging light conditions PTZ cameras with integrated Axis Lightfinder technology are used for monitoring Experts from Inlimited suggested fitting the port with thermal technology platforms using 11 Axis network thermal cameras aboard (including models with two sensors: optic and thermal). PTZ cameras with integrated Axis Lightfinder technology are used, among others, for monitoring in challenging light conditions with low object contrast or difficult light sources. Thermal network cameras support guard tour function that can be used for continuous monitoring of a particular area according to the preset guard tour. In the context of modernisation, the existing port security system was extended with the following video surveillance solutions: computer-aided continuous visual monitoring of the water frontage, the adjacent port area and the port waters of Sukhyi Estuary, the area along the port perimeter as well as monitoring of vehicles (license plate recognition) and approaches to the mounting locations of the main cameras. Integrated video surveillance Centralised security service control centre offer video analysis capabilities. Video surveillance solutions integrated into a single software and hardware platform provide high-quality digital video real time record and store the archive for a minimum of 30 days. The integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area Integrated video surveillance and alarm system modernisation project developed by Inlimited Ltd. for Chernomorsk sea port is of strategic importance for the customer since it is aimed at increasing the reliability of the guard tours and critical infrastructure of the port and its entire water area. When developing the architectural concept, the integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area, such as hurricane hazards, lightning strikes, salt air impact, as well as restricted visibility due to fog, heavy rain, snowfall and direct sunlight. Installation of PTZ network cameras Thermal platforms with Axis PTZ network cameras installed on the top became the ultimate solution for the port. Optical and thermal sensors combined into one system is the specific feature of bispectral modules. With this capability, such a device can substitute a significant number of conventional optical cameras and partially the security alarm system. Hence, the extensive territory of the port was covered by turntables with a total of 11 Axis network cameras: bispectral, optical and outdoor. Due to the intelligent capabilities of Axis network cameras, a real-time detection signal is automatically transferred to operator screen, immediately providing a very clear image of an object and ensuring reliable detection under any visibility and weather conditions. Moreover, the system can also detect suspicious objects even before an intrusion attempt. Recognising person, car or watercraft We chose to go with Axis cameras because they are flexible and yet can be customised to solve particular problems"Automatic systems facilitate the work of security service operators displaying only actual violations, which helps to minimise the percentage of false responses. With this intelligent system, it is possible to immediately recognise a person, car or small-sized watercraft as well as detect possible smoke spread and other abnormal situations. Thus, the security staff has extra time to provide quick response. The video surveillance and alarm system of Chernomorsk sea port is integrated with IP-video control system Milestone Xprotect and vehicle license plate recognition system VIT AutoCode. “We chose to go with Axis cameras because they are flexible and yet can be customised to solve particular problems. Axis network cameras gained an excellent reputation as a part of the video surveillance system currently operating at the port and for this reason, we selected them again for additional security platforms,” noted the Chernomorsk sea port security service.
Round table discussion
It seems there are more “bad things” happening than ever before. We hear news every day of workplace shootings and terrorist attacks, of smash-and-grab thefts and child abductions. Beyond the possible human tragedy involved, such events pose a persistent question to anyone involved in the realm of security: Could we have prevented it? The first step toward prevention is to predict or foresee an event before it happens. Too often, technology enters the picture after the fact, most commonly the use of forensic video. Isn’t there more our industry can do before such events occur? We put the question to this week’s Expert Panel Roundtable: How can security systems be used to predict bad things before they happen?