In a move to build upon their existing radar technical and sales support, 360 Vision Technology, renowned UK CCTV manufacturing company, is delighted to announce that it has appointed Mark Rainbow to the role of UK & Export Business Development Manager. Radar, video camera solutions Greatly experienced in the sales, engineering and specification of radar and video camera solutions across a wide range of applications, Mark begins his new role at 360 Vision Technology after 25 years with Ogi...
When a company the size of TE Connectivity, a global provider of connectors and sensors, works to change the future, the positive results can be felt around the world. TE details how it is working toward its purpose of building a safer, sustainable, connected and productive future through its products, partners and business practices in the 2018 Corporate Responsibility Report. "Our employees genuinely want to feel like they are leaving the world a better place for the next generation and helpi...
Taking video analytics to the next level, VIVOTEK, globally renowned IP surveillance solution provider, has introduced a brand new license plate recognition camera, the IB9387-LPR. Featuring a built-in license plate recognition software and edge-computing capability without additional server, the IB9387-LPR can identify license plates of vehicles from over 70 countries around the world. These and other features make it one of the most powerful License Plate Recognition (LPR) system and a cost-e...
Video surveillance cannot address all the security challenges in education, but it is a valuable tool and among the least obtrusive options available. And the list of security challenges that video can address grows every day. Video systems can provide real-time monitoring of school premises and facilitate rapid response to incidents. New advances such as video analytics are currently underutilised in the education arena. Historically, video has been used as a forensic tool in the education ma...
Artificial intelligence (AI) is expanding the capabilities of license plate readers and vehicle identification systems. Within a smart/safe city scenario, automatic license plate reader solutions are used to help analyse real-time video streams for site surveillance, inspection and public safety, and to offer actional information through a network of connected camera systems. Outside of law enforcement, this can include other public safety initiatives such as traffic tolls, car counting, and pa...
With the release of the Volvo XC90 Armoured, Volvo Cars takes another step as a manufacturer of armoured vehicles. The cars are designed and built to provide safe and comfortable travel with a high level of personal protection for the occupants. "We are proud to be able to offer these armoured cars. With our armoured cars, we can provide vehicles with a high level of personal security for individuals who require heightened protection," says Stephan Green, Marketing Director at Volvo Cars Specia...
Dahua Technology, globally renowned video-centric smart IoT solutions and service provider, has launched IVSS 2.0 (IVSS7000-I), an upgraded series of its NVR family powered by the latest AI capable of deep learning, which opens up new possibilities to smart security solutions. Upgraded IVSS 7000-I The upgraded IVSS 7000-I features scalable GPU design to meet the ever-growing project requirements. The unique Dahua Deep-Learning algorithm with GPU group enables IVSS7000-I to perform face recognition, perimeter protection and metadata with high accuracy. Offering advanced Artificial Intelligence features, it even enables danger prevention via faster video content inquiry, rapid discovery of targets as well as real-time and accurate alarm in a variety of applications, providing AI-based all-in-one surveillance solution for customers. Some major features of IVSS7000-I are detailed below. AI-powered facial recognition technology Dahua Technology’s AI-powered face recognition technology enjoys a high reputation in the industry Dahua Technology’s AI-powered face recognition technology enjoys a high reputation in the industry, as testified by multiple first prizes in international competitions. Equipped with Dahua face recognition technology, IVSS7000-I series records face by structured data and performs real-time crosscheck with reliable accuracy to figure out the face by features of the target. Supporting up to 256-channel face recognition by device and up to 256-channel face recognition by camera, IVSS7000-I can analyse up to 50 different face databases with 300,000 face pictures in total. Besides, the upgraded IVSS7000-I also supports search by face image which means users can upload face pictures to IVSS7000-I and compare them with recorded ones by similarity. VIP recognition and access control IVSS7000-I series can realise a lot of functions for users such as VIP recognition, blacklist alarm, stranger identification, attendance management, access control, etc. It divides faces detected into different categories defined by users, and acts accordingly, like notifying the manager that a VIP customer is coming or sending an alert when a persona non grata is identified. Users can choose Regular/Stranger mode to trigger kinds of alarm actions according to different applications. Focusing on people and vehicles, perimeter protection automatically filters out false alarms caused by animals, rustling leaves, bright lights, camera shaking and other irrelevant elements. It also enables system to act secondary recognition for the targets, thus significantly improving alarm accuracy with saved cost. In terms of perimeter protection, IVSS7000-I supports up to 256-channel with each channel allowing up to 10 IVS rules. Enhanced metadata Metadata is feature attribute information of a target object which can be used for data retrieval. Currently, there are mainly four types of metadata that are human face, human body, motor vehicle and non-motor vehicle. IVSS7000-I supports up to 64-channel video metadata, making it possible for operators to quickly and easily search through multiple channels and long duration to find out when and where a person/vehicle of interest appeared, which significantly enhances accuracy and efficiency. The IVSS7000-I employs optimised GUI which is easier for users to learn and use. With the same GUI working for local output and PC client, training cost of system operator is reduced. Comparable to VMS client, the new GUI design is more user-friendly for project-level customers. Remote access IVSS-I can meet variable needs of users, thus applicable to a wide range of scenes Apart from the above features, IVSS7000-I also allows independent PC client for remote access so that users will not be bothered by things like Web plug-ins and browser update. It's also worth mentioning that with a new security center to keep hackers away, IVSS7000-I series provides a safer network environment for users. Being multifunctional, IVSS-I can meet variable needs of users, thus applicable to a wide range of scenes, including entrances and exits of banks, business parks, schools, prisons and transportation centers like airports, railway stations that are sensitive to strangers and criminals; or the shopping malls that want to protect customers from petty thieves; or football stadiums that choose to ban those known hooligans for good. Intelligence and safety As a key back-end product to smart security system, IVSS7000-I brings intelligence, safety, and reliability to a new level. With a mission of Enabling a Safer Society and Smarter Living, Dahua Technology will continue to focus on “Innovation, Quality, and Service” to serve partners and customers around the world.
Morse Watchmans, the industry pioneer in key control and asset management systems, is showcasing the benefits of their KeyWatcher Touch and AssetWatcher key and asset management solutions at IFSEC International 2019 (stand no. IF620) in London, from June 18-20. The company is also introducing KeyWatcher Fleet, a key control system specifically for fleet management, to IFSEC attendees. “We’re thrilled to once again showcase the exciting features of our AssetWatcher and KeyWatcher Touch solutions,” said Fernando Pires, CEO at Morse Watchmans. “This year, IFSEC attendees can get a demo of our KeyWatcher Fleet, which is purpose-built for fleet managers. We are looking forward to sharing all three key and asset control products with IFSEC 2019 attendees.” Tools to optimise vehicle usage Morse Watchmans’ KeyWatcher Fleet offers fleet managers a wide array of tools to maintain and optimise vehicle usageMorse Watchmans’ KeyWatcher Fleet offers fleet managers a wide array of tools to maintain and optimise vehicle usage while reducing many operational costs. Managers can create user role-based ‘Pools’, or groups of vehicles, to automatically assign each vehicle accordingly. Flexible booking workflows enable customisation to balance usage, ensure vehicle availability and more. A range of service features makes it possible to report problems and automatically initiate new or scheduled work on each vehicle. System alerts notify management to specific issues such as an unauthorised booking attempt or expiring driver’s license, and the system generates a number of useful reports with actionable insights. A convenient dashboard displays real-time status, bookings summary, vehicle use and many other data points to provide the pulse of the fleet in an instant. KeyWatcher Touch key management system The AssetWatcher is Morse Watchmans flexible, scalable, and highly capable RFID-enabled locker systemMorse Watchmans’ KeyWatcher Touch key management system utilises a 7” touchscreen for an easy-to-use interface and patented SmartKey system with KeyAnywhere technology to make it simple to withdraw and return a key securely to any key cabinet in an enterprise. Updates to KeyWatcher Touch for 2018 include a new database design, a desktop fingerprint reader that allows users to enrol fingerprints through TrueTouch software, and the ability to utilise multiple KeyWatcher Touch server instances with a single SQL database. The AssetWatcher is Morse Watchmans flexible, scalable, and highly capable RFID-enabled locker system. Perfect for tools, mobile devices and other valuable items, it can easily support more than 10,000 users on a single system and is configurable in three usage modes for flexible usage. AssetWatcher’s RFID technology allows you to easily track who is removing or replacing an asset, as well as when and where in the system the asset has been taken from or placed. Proven features of KeyWatcher, including email notifications, multi-site operation, and multi-user capability, bring the highest levels of security and capability to AssetWatcher.
IDIS has launched its totally cost-free IDIS Dynamic Privacy Masking (IDPM) solution at IFSEC International (stand IF1110 at London’s ExCel) 2019. IDIS now offers a simple answer to the previously labour-intensive – or prohibitively expensive – problem of de-identification in video footage which is being submitted in response to requests for access under The General Data Protection Regulation (GDPR) or for evidential purposes. Protecting privacy with masking GDPR came into play during a challenging time and some users have stopped reporting smaller losses" Last year, GDPR gave the right to any person captured by a video surveillance camera to access a copy of their personal recorded data. But at the same time, companies are required to protect the identity of other individuals who feature in the recorded video, with anonymisation and masking. The same de-identification also needs to be applied when providing video clips to the police and courts for use as evidence. GDPR-compliance for incident investigations Jamie Barnfield, Sales Director at IDIS Europe, says that many small to medium companies – for example, retailers and eating-out chains - are struggling to manage their recorded video footage. They are under pressure to provide police with GDPR-compliant video for incident investigations, to respond to freedom of information requests from the public, and to supply footage to insurers assessing claims including as slips, trips and falls. In all of these cases the video needs to be redacted, Barnfield points out. “GDPR came into play during a challenging time and some users have stopped reporting smaller losses and petty crimes because of the increased work involved. For others the alternative has been to resort to expensive video cloaking services that charge by the minute, or to use third-party redaction software not budgeted into the running costs of their surveillance operations,” he said. IDIS Dynamic Privacy Masking (IDPM) Solving this problem, IDPM is now available from the IDIS Partners Portal as a direct download. It allows authorised system users to blur sensitives areas and dynamically de-identify faces, vehicles etc. Crucially, IDPM does this automatically for the duration of the clip, even as the object or person moves around the scene. Users can then quickly save video as clips or project files via the IDIS Clip Player which, crucially, does not rely on transcoding to prevent forgery. The integrity of recorded video is already assured with IDIS Chained Fingerprint technology As a result, masking can easily be removed later by the authorised user without affecting the integrity of the footage, if that becomes necessary for a subsequent investigation. Users also have options to set passwords and expiration dates, and to control who can access and play video files. IDIS Chained Fingerprint technology The integrity of recorded video is already assured with IDIS Chained Fingerprint technology, which extracts distinctive features of recorded video data to create fingerprints for each frame and then embeds each fingerprint into the data of the next frame, connecting each frame together with the next like a blockchain. “IDPM now gives users a simple, fast and intuitive tool to provide evidence to the police and courts so that theft, abuse and violence against staff can be investigated and criminals brought to justice. At the same time companies can respond, within the stipulated timeframe, to information requests in line with GDPR without additional costs,” added Barnfield.
IDIS has launched its AI in the Box (DV-2116), boosting the power of surveillance systems with the most accurate deep learning analytics yet developed. Korea’s surveillance manufacturer says, that in independent tests IDIS Deep Learning Analytics (IDLA) has achieved industry-beating accuracy rates of 97%, a record performance which is further boosted by high speed processing. Affordable deep learning analytics Users benefit from robust and calibration-free object detection and classification; intrusion and loitering detectionThe DV-2116 makes deep learning analytics more affordable for small to mid-sized applications, enhancing security and control room efficiency. The plug-and-play IDLA-ready appliance comes embedded with an NVIDIA GTX1060 GPU chipset allowing the analysis of up to 16 channels simultaneously. Users benefit from robust and calibration-free object detection and classification (objects such as people, cars, and bicycles); intrusion and loitering detection; powerful, intelligent search functions; and tracking by colour, object and number. The introduction of AI in the Box makes deep learning analytics now easier to adopt through trouble-free plug-and-play installation via IDIS Solutions Suite video management software (VMS). This allows installation without costly disruption. And the 97% accuracy minimises false alarms, significantly improving detection and monitoring performance. Automated monitoring of video streams IDIS’s Deep Learning Engine can recognise potentially significant movements and characteristics of people and vehiclesJames Min, Managing Director, IDIS Europe, says this latest innovation has the potential to make surveillance much less labour intensive – and more effective – for a wide range of users. “Our high accuracy analytics can process vast amounts of data, without break, in a way that human operators can’t. This means that high-resolution video streams can be automatically monitored to spot suspicious behaviour or distinguish potential threats from every-day activity.” IDIS’s Deep Learning Engine, which powers the new DV-2116 AI in the Box solution, can recognise potentially significant movements and characteristics of people and vehicles, while ignoring activity that isn’t relevant. The technology can quickly check through hours of video to find specific individuals. It also becomes more accurate over time due to its self-learning characteristics. “This is very exciting as it means that time critical activities – such as investigating incidents – will become increasingly efficient as our analytics are embedded in operations,” adds James Min.
Sensor manufacturer, OPTEX Europe, returns to IFSEC during its 40th anniversary in 2019 to showcase two new solutions with visual verification at their heart: the enhanced version of its LiDAR range; and innovative RADAR technology Firstly, OPTEX provides a way to upgrade its best-selling 12m outdoor intrusion sensors to an app-based visual verification solution by introducing a Wi-Fi 180° day/night camera. The VXI-CMOD will send home and business owners immediate notification of an intrusion when it occurs, and a dedicated app provides access to the live view with sound, as well as the access to recorded pre and post event footage. Secondly, the intelligent visual verification solution for monitored alarm systems will be launched at IFSEC for the UK market. It consists of an innovative hardware, the OPTEX Bridge and a performant software package powered by CHeKT that takes separate intruder and ONVIF compliant CCTV technologies installed on the same site, but acting independently, and ‘bridges’ them to create one, seamless, integrated monitored solution. Intruder alarms can now effectively be visually verified. Display of compact surveillance radars Both REDSCAN series feature extended detection range, up to respectively 30m and 100mThe company will also be showcasing the enhanced short- and long-range LiDAR sensors. Both REDSCAN series now feature extended detection range, up to respectively 30m and 100m. The REDSCAN RLS-2020 is also now Grade 3 compliant opening up new opportunities for indoor applications. To detect and track people, vehicles, and drones in wide open areas, OPTEX will display compact surveillance radars manufactured by its business partner Spotter RF. “OPTEX is excited to be returning to IFSEC in the year of our 40th anniversary,” says Masaya Kida, Managing Director of OPTEX EMEA. “While we are proud of our heritage, we know that we can never stand still, and so we continue to design and innovate new products and solutions for an ever-changing world. Our management, sales, technical, marketing teams will be all present at the show to demonstrate the new sensors and visual verification solution as well as discuss any new opportunities.”
Cortech Developments is pleased to announce the integration of its Datalog Integrated Security Management Software with the Advanced Analytics Video platform from DAVANTIS, a specialist in video analytics for perimeter security. The seamless integration between Datalog and DAVANTIS provides end users with a means to reduce operator reaction times and increase overall situational awareness. Allowing consistent and timely response to different alarm triggers such as intruders, vehicle entry/exits, tampering and loitering to be managed seamlessly. The integration provides comprehensive information about security alerts in minimal clicks. Operators are provided with both alarm descriptions and visual data; it presents users with access to video from the camera with trace data (and any other associated cameras) that activated the alarm resulting in real-time analysis of the alarm trigger. Datalog provides quick and effective real time monitoring and control of events Local and remote site monitoring Datalog is a modular software suite that operates as a single or multi-user graphical user interface, providing local and remote site monitoring and control of building, fire, security and energy systems. The software provides smarter interoperability for multiple technologies across multiple sites; assisting organisations to reduce risk and costs, while maximising situation awareness and operational efficiency. Datalog provides quick and effective real time monitoring and control of events. System warnings, events and alarms are all clearly identified, prioritised, graphically located and visually verified with automatic CCTV video to enable a more efficient and accountable response. Innovation within perimeter detection The partnership will infuse both products with exciting new capabilities for Perimeter Intrusion Detection"Jason Blundell, Head of Sales & Marketing for Cortech Developments commenting on the integration said “We are delighted to welcome DAVANTIS into our portfolio of integration partners; we are looking forward to working together and providing innovation within perimeter detection. The partnership between DAVANTIS and Cortech demonstrates our on-going commitment to offer users flexibility and the widest choice, when selecting an integrated software platform.” Aaron Plant - Regional Sales Manager for DAVANTIS - UK and Nordics comments, “DAVANTIS are delighted to be in partnership with Cortech Developments, with integration into the DATALOG PSIM product. The partnership will infuse both products with exciting new capabilities for Perimeter Intrusion Detection, backed by CPNI Level 3 approval. “The combined solution delivers high performance, high reliability perimeter alarms via DATALOG to enable fast, efficient verification of real-time intrusions in a very simple and informative dialogue within DATALOG.”
Artificial intelligence allows machines to do jobs previously done by people. When it comes to security and surveillance, this technology allows cameras and control room equipment to identify a wide range of threats automatically and in real time across hundreds or even thousands of cameras – allowing security teams to take immediate action to protect people and assets. AI technology and surveillance solutions Artificial Intelligence technology built into surveillance solutions help organisations optimise their security Video surveillance cameras are the electronic eyes of any security operation. In the past, human supervision was needed to make sense of the images captured, and to assess whether certain events posed a security risk or not. With some organisations using hundreds or even thousands of cameras to protect their people and assets, manual review of footage is simply impossible – potentially leaving them vulnerable to security breaches. Advanced Artificial Intelligence technology built into surveillance solutions can help organisations overcome this challenge and optimise their security. This means cameras, control-room equipment and back-end infrastructure can now ‘learn’ about potential threats for themselves by recognising people, vehicles and even behaviours. Detection and prevention The manual interventions needed with traditional security systems mean that teams were frequently reacting to breaches that had already happened. Artificial Intelligence changes all this by recognising potential threats before they impact company’s people or assets – allowing security teams to react immediately to neutralise any potential threat. Artificial intelligence solutions can automatically trigger alerts when a person appears in a restricted area For example, artificial Intelligence solutions can automatically trigger alerts when a person appears in a restricted area, or when a vehicle with a blacklisted number plate enters a site. With alerts delivered in real time, teams can identify and react to security threats and protect people and assets more effectively. And because alerts are automated, potential threats are hardly missed or overlooked. How does artificial intelligence work? Artificial Intelligence systems become more intelligent over time, building databases of potential threats and reacting to new events accordingly. This allows systems to ‘think for themselves’ and to alert teams of any suspicious events or people who are caught on camera. Artificial intelligence technologies use advanced algorithms based on Deep Learning to distinguish between different kinds of security events and threats. Technologies incorporated into the Hikvision portfolio include: Facial recognition which allows law enforcement personnel to identify suspects and commercial teams to identify VIP customers in real time. Vehicle identification which can be used to identify vehicle number plates and recognise different types of vehicles (even down to make and model), or to trigger alerts when vehicles enter restricted areas. Perimeter protection which helps organisations to identify real threats by distinguishing people and vehicles from other moving objects and keeping false alarms to a minimum. Business intelligence which employs people counting, queue detection, and heat mapping technologies, so that organisations can enhance operational efficiency by making use of the data report. Increasing commercial success Artificial intelligence isn’t just useful for identifying security threats – although this is a key strength of the technology. It can also help organisations increase their competitiveness and commercial success. For example, VIP customers who opt to participate in special marketing promotions or other incentives can be identified so staff can provide the right kind of service at the right time. This gives organisations the opportunity to personalise the service experience, foster loyalty and maximise customer lifetime revenues. Artificial Intelligence can help organisations to better understand customers and meet their needs more effectively In the same way, artificial Intelligence can help organisations to better understand customers and meet their needs more effectively – leading to more commercial opportunities. One feature – called People Counting – allows stores and commercial centres to map footfall at peak times, ensuring that staffing is optimised to meet demand. At the same time, stores can see which areas of the building customers visit most and adjust their merchandising and product positioning accordingly to maximise the sales opportunities. Artificial intelligence at Hikvision Hikvision’s family of artificial intelligence products include the DeepinView network cameras and DeepinMind NVRs. The products help to tackle security with facial recognition; monitoring and counting of people; and recognition and detection of vehicles, to name a few. These features all depend on artificial intelligence technology to recognise, classify and respond to security threats. This article was written by Hikvision.
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilised by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing an effective action plan When strategising how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilising doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organise a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategising how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing public areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install guard booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
According to the reports of not-for-profit organisation Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location. While definitions of mass shooting vary with organisations in the US, the count of over 300 incidents per year, or about once per day on average, is simply alarming. It raises public safety concerns, ignites debates and protests, which in turn lead to public unrest and potentially more violence, and increases costs for governments from the regional to federal level. Most importantly, the loss of lives demands not only improvement in post-incident handling and investigation, but also new prevention technologies. Gunshot detection solutions AI weapon detection offers a more efficient alternative to prevent active shooting There are several gunshot detection solutions in the security market, commonly used by law enforcement agencies to detect and locate gun fires. These systems function based on acoustic recordings and analyses and often in combination with signals detected by sensors of the optical flash and shockwave when a gun is fired. However, gunshot detection by nature dictates that the law enforcement can only react to a shooting incident that has occurred. With fast action, law enforcement can prevent the incident from escalating, but lives that are lost cannot be recovered. With the development of artificial intelligence in object recognition, AI weapon detection offers a more efficient alternative to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognise firearms in different shapes, sizes, colours, and at different angles in videos, so that the AI weapon detector can be deployed with existing cameras systems, analyse the video feeds, and instantly notify security staff when a gun is spotted. Comparison of the advantages for law enforcement and public security agencies Legacy gunshot detection using sensors AI weapon detection Reactive measure: detect after guns have been fired Proactive measure: detect before guns are fired Time to action: within 1 second Time to action: within 1 second Unable to provide visual data about shooter(s) Can provide data about shooter(s) based on the camera recording: clothing, luggage (backpack, handbag, etc.), facial features, vehicle Unable to track the location of the shooter(s) before and after shooting because of the lack of sound Can track the shooter(s) using AI Person & Vehicle Tracking, AI Face Recognition, and AI License Plate Recognition False detection caused by similar sound such as fireworks and cars backfiring Minimal to no false detection, as AI can distinguish different types of handguns and rifles from normal objects (umbrella, cellphone, etc.) Require physical deployment of gunshot detection sensors Can be used with existing camera systems, do not require special hardware Complicated to deploy, require highly trained professional Easy to deploy as an add-on to existing video surveillance system - Can integrate with gun-shot detection to create a “double knock” audio and video active shooter alert system Gun-shot detection advantages In addition to advantages for law enforcement and public security agencies, this type of visual-based pre-incident detector has three-fold advantages for the public: Save lives by spotting the shooter before the shooting event. Minimise the chaos entailing an incident: panic and chaos caused by a shooting incident often adds to injury, as people run, fall, trample on others… With an AI weapon detector, when a gun is spotted, the system sends an alert to security staff, who can quickly control the situation in an organised manner and apprehend the intending shooter. Can be added as a SaaS (Security as a Service) component to small business and home surveillance systems, e.g., intrusion detection alerts (home invasion incidents with firearms number over 2500 per year nationwide). For a complete active shooter detection system, video-based AI detector can operate in conjunction with gunshot detectors for enhanced security. Traditional X-ray based weapon detection or metal detection entrance systems are complicated and expensive; with AI video technology, active shooter detection system can be cost-effective, and after all, what price tag can one put on a life? Written by Paul Sun and Mai Truong, IronYun
As a security service provider with a rich history in manguarding, Allied Universal is launching a new technology platform to increase productivity and accountability of security officers and to transform guard service operations from an ‘observe and report’ mission to a ‘detect and respond’ function. Mark Mullison, Allied Universal’s Chief Information Officer (CIO), says the new Heliaus platform also uses artificial intelligence (AI) to analyse data, predict outcomes, and prescribe optimum responses. The platform includes a smart phone app that guides security officers to ensure post orders are followed and provides a ‘virtual’ coach or supervisor to guide security officers throughout the day. “The walls between technology and people need to come down in the future,” says Mullison. “We need an ecosystem in which people and technology can cooperate well and respond to threats and drive outcomes.” Real-time situational awareness Technology plays an increasing role in security and safety, but it will never replace humans"Heliaus is a step in that direction. It has two components – the mobile app used by security officers; and a cloud-based portal, like a command and control centre that compiles information from the app and other inputs and performs AI analysis of data. Heliaus is an add-on for Allied Universal customers and is offered for a per-device subscription fee of $199 per month. A customer company’s managers can also access the portal for data visualisation tools and real-time situational awareness, or to input data such as ‘approving’ an incident report or action. “Technology plays an increasing role in security and safety, but it will never replace humans,” says Mullison. “It will augment and enhance the workflow and make people more effective.” “We are focussing on delivering better outcomes for safety and security,” he adds. “The impacts are as broad and diverse as the clients we serve.” Customisation of forms enables the system to collect and use any information that was previously collected on paper. Monitoring and Response Center (MaRC) A system is effective only to the extent that it is used, and Allied Universal has engineered the user experience to make the mobile app easy – almost fun – to use, says Mullison. Elements of ‘gamification’ drive greater user adoption. “It is designed to support the work [security officers] do and make information collection a by-product of people doing their jobs.” The system brings together rich data, AI, location-aware workflow automation, and friendly user experience design Effective AI depends on data, and Heliaus pulls data from Allied Universal’s Monitoring and Response Center (MaRC), where a cloud server integrates the company’s managed security services, including access control, video surveillance and video analytics. It also incorporates current weather information and forecasts, and information specific to the industry segment. Additional data is generated as officers enter data through the mobile app. The system brings together rich data, AI, location-aware workflow automation, and friendly user experience design. It provides insight into the drivers of risk, makes recommendations about how to reduce incidents, and, through dynamic workflow automation, ensures that those recommendations are implemented. Location awareness is a combination of the global positioning system (GPS), Bluetooth beacons, and near-field communication (NFC) tags. Improves the accuracy of responses AI understands the data and applies reasoning capabilities to predict an outcome and prescribe a response“Information is organised to facilitate AI analysis. If you have the right knowledge representation then problem-solving is easy,” says Mullison, echoing a common principle of artificial intelligence. AI works to analyse data and make predictions and recommendations to guide responses by security personnel. AI understands the data and applies reasoning capabilities to predict an outcome and prescribe a response. The AI system also learns and improves the accuracy of responses with more data and over time. Responses come much faster than older ‘trial and error’ models of analysis. Another element of Heliaus is a ‘robust workflow engine’ that ensures recommendations are carried out, either by a security professional on site or by the client. Mullison says implementation of the system can result in a 20% reduction of security and safety incidents. Multiple applications of Heliaus Heliaus is already being used by some Allied Universal customers. For example, a major Hollywood production studio is using it to identify and address workplace hazards such as stray electrical cords, dripping water hoses, etc., across a 50-acre area. In the logistics sector, Heliaus is being used to facilitate checking delivery vehicles in and out of a truckyard A manufacturer created a custom compliance application using the platform to track more than 140 unique incident types, such as monitoring elevated temperature in a truck trailer or drivers without proper identification. In the logistics sector, Heliaus is being used to facilitate checking delivery vehicles in and out of a truckyard. The flexibility of the platform can enable expansion to incorporate other technologies in the future, too. For example, sources of data for the system could include robots, drones or various Internet of Things (IoT) sensors; or workflow engines could be used to dispatch a robot or drone to handle a situation (rather than a human).
More good news for exhibitors on the second day of the Global Security Exchange (GSX) in Las Vegas. Brisk attendance continued early in the day, and then slowed somewhat in the afternoon, but most comments from exhibitors were positive. Exhibitors such as Lenel were “thrilled” with the show, and noticed the steady, good traffic and lots of sales leads. Lenel’s position at the front of the hall probably helped. New developments in mobile credentialing are a big trend at GSX, and Lenel’s BlueDiamond mobile credentials are traveling on a new path, so to speak. The access control company is introducing the idea of “Pathways” as a way of automatically signaling intent to a Bluetooth-enabled smart phone to open a door. A recognisable “pathway” is programmed into the phone, based on signals from nearby readers and locks and also geolocation signals. The system recognises when a user travels along the pathway and automatically signals the correct door(s) to be opened along the way without the user having to touch his smart phone.A recognisable “pathway” is programmed into the phone, based on signals from nearby readers, locks and also geolocation signals Providing a lightweight alternative “When you trigger a pathway, it’s signalling intent to open the door,” says Greg Berry, Vice President Mobile Credentialing, Global Security Products, for United Technologies, parent company of Lenel. “Pathways are customised to a user’s needs and are the common places you are going all the time.” A user who walks the same path daily to the door of an office will find that door opens automatically. Previously using mobile credentials has been “slightly more work than using a badge,” says David Weinbach, Manager of Identity and Product Innovation for Lenel. “Now with Pathways, it’s less work than using a badge.” Specifically, a user no longer has to take out his phone and push a button to signal intent. “Rather than trying to emulate the badge, you create an experience that is better than the badge,” adds Berry. “We want to change the paradigm and turn the market on its ear.”New browser-based clients are being released with each new version of OnGuard software Other news from Lenel includes the release of more mobile and browser-based clients for OnGuard to be used for greater convenience alongside the Window-based clients. Providing a “lightweight” alternative enables some of the functionality of the Windows client in a format that is easy to access on the go. New browser-based clients are being released with each new version of OnGuard software. Cloud-hosted systems using Microsoft Azure are also among the plans for OnGuard, which ultimately will offer on-premises and cloud options. There’s not much comment from the Lenel folks about their parent company United Technologies’ plan to acquire S2 Security, which was announced days before the show. They would only say that the acquisition is waiting for regulatory approval, and that the expectation is that the two companies’ products will be complementary, given S2’s focus on the SMB (small and medium-sized business) market and Lenel’s strength at the enterprise level. The acquisition strategy is to grow both businesses. More details to come about the new combined company. Modern network infrastructure NVT Phybridge, a PoE connections company located near the back of the hall, also reported steady booth traffic on Day 2. “There are lots of customers and partners here,” said Steven Fair, Executive Vice President. “We are pleased with the quality of people, but not overwhelmed with the quantity.” FacePRO AI facial recognition is used for real-time searches of terror suspects or criminals throughout a location NVT Phybridge, which provides IP networking products for the telephony industry as well as security, is focused on networking concepts at GSX, in particular the changing requirements for network infrastructure in the age of IoT. We are pleased with the quality of people, but not overwhelmed with the quantity.” Fair uses the term “Modern LAN” to describe the new, changing requirements and in consideration of the specific networking needs of each edge device, whether cameras, sensors, or door access control devices. “Start with the edge device — what does it need from the network? What are its needs and have there been any innovations to enable you to connect to the network more economically?” asks Fair. There is also a green aspect to designing network infrastructure. Can existing equipment, such as coaxial or single twisted-pair cabling, be used, and thus save on disposal costs of the used cabling as well as lowering installation costs? Among NVT Phybridge’s offerings that can serve the changing networking needs in the IoT era is Smart Path PoE, which offers smart power, smart network access and secure connections. The CLEER family of products provides ethernet over existing coaxial cabling to enable easy transition from analogue to IP cameras. The PoLRE products supply ethernet and power to travel over a single unshielded twisted pair cable with reach over 400 metres. The products have been used recently to transition a series of cruise ships from analogue to IP video without having to replace cabling and spending only two days in dry dock for the installs. A new focus away from AI Panasonic is looking to apply AI-based capabilities to vehicle recognition in the near future, with the ability to identify vehicle characteristics Deep learning and artificial intelligence (AI) seem to be taking a lower profile at this show, perhaps signaling the end of the hype. Companies that mention AI point to specific products that use the technology and are currently available. For example, Panasonic is featuring its FacePRO AI-based facial recognition system. The system uses face images captured from video — grabbing up to 30 to 35 faces a second as video is recorded. The system saves the best of those face images, eliminating extensive duplication, as thumbnails, which are linked to the video footage where the faces appear. To find video in which a face appears, the operator merely drags-and-drops the thumbnail image and commands the system to “go fetch” video that contains that face. The system then produces a timeline showing where the face appears in the feed from each video camera on the premises, so an operator can track the movements of a suspect throughout a facility. The tool helps to simplify and shorten the workflow of locating a suspect in real-time and is affordable for a wider range of uses beyond the traditional airports or high-end applications. The FacePRO software is offered on any Panasonic camera, and works with a separate FacePRO server that is integrated with the video recorder. The system can be added easily to existing systems and is useful for such applications as real-time searches for terror suspects or other criminals throughout a location. Panasonic is also looking to apply AI-based capabilities to vehicle recognition, too, in the near future, with the ability to identify vehicle characteristics such as color, type of vehicle and direction of travel. On the VMS side, Panasonic is transitioning its Video Insight software to a modular approach, tailoring solutions for a growing range of vertical markets, such as transportation and retail, all using “plug-ins” that enhance operation of Video Insight software. No additional license fees are involved That’s just a sampling of what I saw on Day 2 of the show. I have more to share in a final show report, including what I see tomorrow on the final (shortened) day.
Working together to develop an intelligent body-worn camera for public safety users, Motorola Solutions and artificial intelligence (AI) company Neurala are demonstrating how AI can be added to everyday devices such as smart phones using existing hardware platforms. AI software, working at the “edge,” provides the capability to add AI functionality to existing cameras, such as Motorola’s Si500 body-worn camera. An agreement to develop the products follows Motorola’s strategic investment in Neurala in January 2017. “The technology is real, as our prototypes have demonstrated,” says Massimiliano “Max” Versace, Neurala CEO. “The technology will mature dramatically by the end of the year.” A final, marketable product from Motorola might be a year or more away, and the timing will depend on extensive testing in the meantime, he says. The goal is to enable police officers to more efficiently search for objects or persons of interest, such as missing children or suspects. Adapting hardware for artificial intelligence Neurala’s learning capabilities “at the edge” are hardware-agnostic; its software-only focus enables the principles of artificial intelligence to be applied to a variety of hardware platforms, including low-cost platforms used inside smart phones. Typically, cost and the need for speed are limitations that determine what hardware can be leveraged using the software. The goal is to enable police officers to more efficiently search for objects or persons of interest, such as missing children or suspects In the case of the Motorola body-worn camera, AI functionality is being added to existing hardware in the device, which is much like a smart phone encased in the form factor of a body-cam. Today’s smart phones include cameras, gyroscopes and accelerometers to provide sufficient data to drive AI applications. Software adapts existing hardware to transform them into AI devices capable of continuous learning in the field. Finding missing people in crowds Neurala and Motorola are promoting the new agreement with a use case of how a policeman’s body-worn camera could help find a missing child in a crowd. A network “pushes” a photo of a missing child to a network of 1,000 body-worn and/or dashboard cameras in the field, which employ AI to search for the child within each camera’s field of view and then provide an alert when a match is found. The cameras operate passively, without involving police officers, in effect automating the process without police officers having to look at every face in a crowd. AI’s contribution is to eliminate the need for humans to do repetitive or boring work, such as look at hours of video footage. Neurala began working in AI 11 years ago, long before the current buzz in the market. In a sense, awareness has caught up with the company, which has been developing its technologies ahead of the curve. “The same technology could be applied to closed circuit cameras to detect other objects,” says Versace. “The Neurala Brain is neural network software that can be trained to find a variety of objects, such as backpacks or vehicles, in the air or on the ground.” AI’s contribution is to eliminate the need for humans to do repetitive or boring work, such as look at hours of video footage Adding AI to existing security devices Other applications are also being developed. For example, Neurala has applied its technology to help the Lindbergh Foundation fight poaching of elephants and rhinos in southern Africa using video from drones as part of its Air Shepherd Program. Neurala’s software helps human analysts by searching through terabytes of video, including infrared, in real time as the drone is flying, pinpointing animals, vehicles and poachers during the day and at night. Versace expects the first applications of AI on existing products, including cameras and drones, before it is applied to robotics and other new applications. In effect, Neurala provides a “brain plug-in” that can add AI to change an existing solution from a passive sensor to a device that is “active in its thinking,” he adds. AI is here to stay, says Versace. “The market should know that AI has reached a point of no return. Companies that don’t use AI will be left behind. It’s the way to go to amplify your output.” Does Artificial Intelligence threaten humans? However, the technology isn’t perfect and shouldn’t be expected to be. “It’s still a growing technology, so you can’t expect 100 percent correct performance, especially if you deploy it in a constrained environment such as a cell phone,” says Versace. “AI can approximate 90 percent of a human’s ability to detect an object, and it’s tireless and can work 24 hours a day. It’s a liberating technology that takes on jobs that are not interesting, such as looking for a backpack on a computer screen.” AI tends to engender anxiety among some, with people like Elon Musk warning of an existential threat of the technology and a coming AI apocalypse. We should all relax, says Versace. “It’s a liberating technology,” he says. “Anyone who talks about AI as dangerous is not an AI expert. The less you know about AI, the more alarmist you are.” He suggests the physical security market should “learn more about it so they won’t be so scared.”
As prominent in Belfast’s history as its cranes are on the city’s skyline, it’s hard to imagine Belfast without Harland and Wolff. Once the world’s greatest shipbuilder, Harland and Wolff today has evolved into a company that provides over 150 years of engineering excellence to the maritime, offshore, and renewable energy sectors. The Harland and Wolff facilities on Queen’s Island are now used to maintain some of the world’s largest ocean-going vessels, ranging from offshore platforms and cruise liners to offshore wind farms. The company is spread over two sites in Belfast and covers over 200 acres. Its main facility has a public-facing perimeter of no less than 1.5 kilometers. With safety as a primary consideration in the execution of projects, the company goes to great lengths to protect its investments from unwanted visitors, intruders, and vandalism. FLIR VMS solution For over 15 years, Harland and Wolff has been using FLIR’s United VMS to manage a wide variety of security cameras For over 15 years, Harland and Wolff has been using FLIR’s United Video Management System (VMS) to manage a wide variety of security cameras. As technology innovations and features were being added onto the United VMS over the years, Harland and Wolff has always remained loyal to the FLIR brand. But with the increasing development of Queen's Island as an industrial, commercial, and tourist area came a greater public presence and an increased safety and security threat. That is why in recent years Harland and Wolff has been continuously investing in the latest security camera technology from FLIR, including enterprise security cameras, PTZ cameras, intelligent thermal cameras, and mobile and wearable cameras. Optical and thermal cameras “Today, over 140 FLIR cameras on-site and along the site’s perimeter make sure that we can detect any irregularity,” said Chris Neill, security operations manager at Harland and Wolff. “Whenever one of our cameras picks up an incident – an intruder for example – an alarm is generated and sent to our security control room, who can then follow up the incident. This ensures us that our investment and that of our customers is safe and secure at all times.” Due to the high impact and risk associated to a possible incident on site, the company’s security department follows a proactive approach for possible intruders. Even in complete darkness, in perimeter areas where there is no additional lighting, thermal analytic cameras can pick up the presence of intruders, animals, or vehicles automatically based on their heat signatures. Intruder detection While thermal camera footage does not allow actual identification of intruders, it can still be used as evidence for insurance companies or law enforcers, especially when an intrusion pattern can be seen over different cameras. United VMS is FLIR’s enterprise-level software solution for video surveillance operations United VMS is FLIR’s enterprise-level software solution for video surveillance operations. The software is currently used at Harland and Wolff by four control room operators and eight managers, all of which have dedicated user rights. One of the strengths of the United VMS system is that it can connect with nearly any security camera on the market and that video streams and detection alerts can be presented on any screen, be it on a video wall, a PC, or a smartphone. United VMS But Harland and Wolff has been using United VMS for far more applications. “We also use the United VMS platform to monitor alarms coming from fire sensors on oil rigs, for example,” said Neill. “Another example is the detection of failed pumps on one of our drydocks. This information also comes in on United VMS, where we generate alarms and notify key staff in real time.” Harland and Wolff has indeed managed to make use of United VMS's flexibility and deploy it for much more than security applications only. "We are not in a static business," said Neill. "At Harland and Wolff, we are always taking on new challenges and solving new problems; FLIR’s United VMS platform helps us do that.” TruWITNESS mobile sensor technology Harland and Wolff will also make use of TruWITNESS, the latest mobile and wearable sensor technology from FLIR. TruWITNESS will allow guards on patrol to stream video directly to the control room in real time and from anywhere on the Harland and Wolff sites. Harland and Wolff needs to comply with a minimum security level imposed by the UK Department of Transport" Guards will be able to bookmark events so that incidents or irregularities can be reported and can be followed up more efficiently. In case of incidents, camera footage from the TruWITNESS wearable devices can be used as evidence. In addition, control room operators will be able to track members of staff via the United VMS and display their location on a map. Security technology advancements “Our yellow gantry cranes have become a national icon,” said Neill. “Unfortunately, this also means that they are an attractive target for political messages or, as in the past, terrorism. As a port facility, Harland and Wolff needs to comply with a minimum security level imposed by the UK Department of Transport. But in reality, we always exceed these requirements. We owe this to our continuous investments in security technology, which we also consider as a commitment to our customers.” Maybe this is what connects Harland and Wolff with FLIR. “As committed as we are to our customers, we expect the same from our suppliers as well,” said Neill. “As someone with a technical background, I have always been convinced of the quality of FLIR security products. But there will always be a time when you need to rely on technical support, and that’s where FLIR really makes a difference.”
In a highly visible, and competitive sport like Formula One racing, it’s not hard to understand why an organisation like Aston Martin Red Bull Racing attracts people who want access to their factory, and all the secrets contained within. Intrusion from unwanted visitors or vandalism is something that the people at Milton Keynes headquarters, in Buckinghamshire, England, want to avoid at all cost. Asset protection “Our Milton Keynes facility contains valuable technology and intellectual property,” says Mark Hazelton, Chief Security Officer. “At the same time, we are located alongside a public road, close to a residential area with high footfall. That is why it is critical for us to have high-performing security processes and systems in place, so we can effectively protect our assets as well as the people who work here.” The scale of operations at the Aston Martin Red Bull Racing Team factory in Milton Keynes is amazing The scale of operations at the Aston Martin Red Bull Racing Team factory in Milton Keynes is amazing. Crafting the next Formula One challenger is done on the engineering site with a variety of buildings, including many office spaces, an R&D facility, manufacturing and storage areas. The design, testing, building and assembling of thousands of parts required to construct each race car all happen in house. About 750 people are employed at Milton Keynes and some parts of the factory are operated on a 24/7 basis. Site and facility security “As our site has grown, our previous CCTV system was no longer sufficient to provide adequate security monitoring,” says Caroline Tierney, Infrastructure Project Manager at Aston Martin Red Bull Racing. “Our CCTV installation was no longer state of the art and we wanted to ensure that we made best advantage of the improving technology available. We were also looking to make it easier to retrieve information from the system.” Aston Martin Red Bull Racing started to look out for an updated CCTV system, investigated different options and ultimately selected FLIR Systems as their technology provider through a local IP security system integrator. Quasar HD and 4K cameras The facility is now equipped with some 120 cameras, both visual and thermal, that cover the entire area 24/7. Cameras on site include FLIR’s visual Quasar HD and Quasar 4K, the latter presenting four times the resolution of the HD camera and, therefore, able to cover larger areas with less cameras. The facility also makes use of the Quasar Hemispheric Mini-Dome, which provides 360° immersive viewing, and of the thermal FLIR FC-Series ID camera, which includes onboard video analytics capable of classifying human or vehicular intrusions. The entire camera network is managed by FLIR’s Latitude Network Video Management System (VMS). FLIR thermal cameras The image quality that we get from the new range of visual FLIR cameras is truly impressive" “The image quality that we get from the new range of visual FLIR cameras is truly impressive,” says Zoe Chilton, Head of Technical Partnerships at Aston Martin Red Bull Racing. “It’s amazing what kind of image quality can come out of such a compact camera unit.” The FLIR thermal cameras have powerful video analytics on board, which makes them extremely useful as intrusion protection devices at several strategic locations across the Milton Keynes site. With the FC-Series ID camera, you can set custom trip lines and regions of interest that will trigger alarms for human or vehicular intruders, even at night or in poor weather conditions. Upon the detection of an intruder, an alert is sent over to security personnel via email. FLIR Latitude VMS The FLIR Latitude video management system is the backbone of the system, allowing Aston Martin Red Bull Racing personnel to easily view, playback, search and export video from a scalable number of cameras. “In the past, when we wanted to investigate a particular incident in more detail, it used to take a long time to actually retrieve the information we needed from our video recordings, but with the new FLIR Latitude VMS, this is much more straightforward and we save a lot of time,” says Tierney Comprehensive camera network The cameras used in the network around the Milton Keynes site are relatively small in size. And there’s a very good reason for that, according to Chilton. “Of course, it’s important to have the best image quality possible, but on the other hand, we don’t want our cameras to be too large and imposing either.” The Milton Keynes headquarters receives visitors, customers and partners every day. For Aston Martin Red Bull Racing, it’s important that everybody feels welcome: “While we need our site to be secure, and the cameras are of course important, we don’t want them to be the first thing visitors see when they arrive to visit us, " said Chilton. "I think that the FLIR cameras strike that difficult balance between security and subtlety really well.” The cameras can also be used to check whether visitors are using the parking lot correctly FLIR security monitoring system Other than the security aspect, there are other practical benefits of having a comprehensive camera network, as well. The cameras can also be used to check whether visitors are using the parking lot correctly, to track contractors around the site, and just for general site management purposes. The selection of the FLIR security monitoring system fits into a long-standing technology partnership between FLIR and the Aston Martin Red Bull Racing team. Since 2014, the team has been integrating FLIR cameras for a wide variety of uses around the factory and track, from electrical maintenance, test rigs and security on site, to tyre temperature assessments in the garage. High product quality The high product quality and innovative approach FLIR takes to developing new solutions for the challenges of Formula 1 makes a great fit with Aston Martin Red Bull Racing’s desire to push the boundaries of available technology for developing their cars.
EchoGuard receives FCC Equipment Authorisation allowing widespread deployment of the radar for security, surveillance, and airspace management applications. EchoGuard radar Echodyne, the manufacturer of innovative, high-performance radars for government and commercial markets, announces that it has received approval from the FCC for widespread deployment of its EchoGuard radar for radiolocation and radionavigation in the United States. FCC Equipment Authorisation allows the radar to be used throughout the US for ground, airspace surveillance The FCC Equipment Authorisation allows the radar to be used throughout the United States for ground and airspace surveillance applications that detect and track potential security threats with high accuracy and for ground-based airspace management applications that ensure safe navigation of commercial drone missions. Electronically Scanning Array radar Echodyne's innovative metamaterials technology and powerful software combine to create an electronically scanning array (ESA) radar in a compact, solid-state format at commercial price points for the very first time. The radar has been demonstrating award-winning performance for government, law enforcement, security, and UAS / UTM customers for some time via experimental licenses. "We are excited that EchoGuard has received this authorisation allowing its widespread adoption in the US," said Eben Frankenberg, CEO of Echodyne. "With the growing number of troubling drone incursions at airports, stadiums, and other facilities, there is tremendous demand for high-performance radar sensors. Tackling drone threats Eben adds, "Our innovative radar technology and software greatly increases the ability for security systems to accurately detect and track drone threats, as well as improves ground tracking of people, vehicles, and vessels. Our radar outperforms every other radar in its class, is priced for commercial markets, and has proven to be the best mid-range surveillance radar in the market." Features of the EchoGuard high-performance radar include: True electronic beam-steering with market-leading C-SWaP attributes; Long-range detection with high reliability and accurate tracking of multiple, concurrent air and ground targets; and Easy integration into sensor fusion and security systems for unmatched 3D situational awareness.
With its capacity of 32 million tons per year and water frontage of 6 kilometres, Chernomorsk sea port is one of the largest transport terminals in Ukraine, providing trade links with more than 100 countries all over the world. This port is a part of Eurasian transport corridor connecting the Western European countries, Ukraine, Georgia and the Asian countries. Its territory embodies the unique multimodal terminal that serves railway-ferry and auto-ferry lines as well as roll-on/roll-off vessels. The mission was to implement round-the-clock monitoring of the port territory and port waters in order to detect violations and prevent them. Monitoring in challenging light conditions PTZ cameras with integrated Axis Lightfinder technology are used for monitoring Experts from Inlimited suggested fitting the port with thermal technology platforms using 11 Axis network thermal cameras aboard (including models with two sensors: optic and thermal). PTZ cameras with integrated Axis Lightfinder technology are used, among others, for monitoring in challenging light conditions with low object contrast or difficult light sources. Thermal network cameras support guard tour function that can be used for continuous monitoring of a particular area according to the preset guard tour. In the context of modernisation, the existing port security system was extended with the following video surveillance solutions: computer-aided continuous visual monitoring of the water frontage, the adjacent port area and the port waters of Sukhyi Estuary, the area along the port perimeter as well as monitoring of vehicles (license plate recognition) and approaches to the mounting locations of the main cameras. Integrated video surveillance Centralised security service control centre offer video analysis capabilities. Video surveillance solutions integrated into a single software and hardware platform provide high-quality digital video real time record and store the archive for a minimum of 30 days. The integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area Integrated video surveillance and alarm system modernisation project developed by Inlimited Ltd. for Chernomorsk sea port is of strategic importance for the customer since it is aimed at increasing the reliability of the guard tours and critical infrastructure of the port and its entire water area. When developing the architectural concept, the integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area, such as hurricane hazards, lightning strikes, salt air impact, as well as restricted visibility due to fog, heavy rain, snowfall and direct sunlight. Installation of PTZ network cameras Thermal platforms with Axis PTZ network cameras installed on the top became the ultimate solution for the port. Optical and thermal sensors combined into one system is the specific feature of bispectral modules. With this capability, such a device can substitute a significant number of conventional optical cameras and partially the security alarm system. Hence, the extensive territory of the port was covered by turntables with a total of 11 Axis network cameras: bispectral, optical and outdoor. Due to the intelligent capabilities of Axis network cameras, a real-time detection signal is automatically transferred to operator screen, immediately providing a very clear image of an object and ensuring reliable detection under any visibility and weather conditions. Moreover, the system can also detect suspicious objects even before an intrusion attempt. Recognising person, car or watercraft We chose to go with Axis cameras because they are flexible and yet can be customised to solve particular problems"Automatic systems facilitate the work of security service operators displaying only actual violations, which helps to minimise the percentage of false responses. With this intelligent system, it is possible to immediately recognise a person, car or small-sized watercraft as well as detect possible smoke spread and other abnormal situations. Thus, the security staff has extra time to provide quick response. The video surveillance and alarm system of Chernomorsk sea port is integrated with IP-video control system Milestone Xprotect and vehicle license plate recognition system VIT AutoCode. “We chose to go with Axis cameras because they are flexible and yet can be customised to solve particular problems. Axis network cameras gained an excellent reputation as a part of the video surveillance system currently operating at the port and for this reason, we selected them again for additional security platforms,” noted the Chernomorsk sea port security service.
Christchurch International Airport is situated on the east coast of New Zealand and receives around six million passengers and 70,000 commercial flights per year. The airport is the main gateway for New Zealand’s South Island and is a busy hub for passenger and freight movement. In a legislation-driven airport environment, the airport is regulated by a number of Civil Aviation mandates and rules, which include the requirement to control and monitor all access to restricted landside and airside areas. In selecting Gallagher for the airport’s security solution, the airport company, Christchurch International Airport Limited (CIAL), found a vastly flexible system capable of withstanding extreme conditions when put to the test in a real-life emergency. Requirement of a flexible security system CIAL took the opportunity to review its security systems and look for solutions that afforded greater system flexibilityOriginally opened in 1959, the airport terminal has undergone a number of expansions and upgrades over time. With passenger numbers continuing to grow, a new $237 million terminal was designed and construction began in 2009. As a part of the new terminal design, CIAL took the opportunity to review its security systems and look for new and innovative solutions that afforded greater system flexibility. The airport’s previous security system was both analogue and digital and presented limitations on what a non-technical staff member could do within the system. “To make changes, for example, add a door to the access control system, we had to get specialists in,” said Ford Robertston, the airport’s Manager of Quality and Security. “Ultimately, our wish list included a system our own staff could configure, hardware that overcame the reliability issues we faced with cards not reading, as well as an open platform with a high degree of flexibility and reporting capabilities.” Monitored electric fencing The site’s perimeter security incorporates five vehicle auto-gates which allow authorised vehicles access to the airfieldOn the exterior, Gallagher’s perimeter security system provides monitored electric fencing for a small section of Christchurch Airport’s 16km fence line – which protects more than 300 hectares of land. The site’s perimeter security incorporates five vehicle auto-gates which allow authorised vehicles access to the airfield. When drivers badge their access card at an auto gate, a photo of the cardholder appears on the operator’s screen, along with competency information. If the driver’s Civil Aviation ID, airside driving permit or another competency is due to expire, the operator is notified on screen and can advise the driver. The main auto-gate is manned 24 hours a day, seven days a week. If someone requests access at an unmanned auto-gate, their photo and competencies are channelled to the operator at the main auto-gate, reducing after hours staff and running costs. Gallagher security management platform Christchurch Airport is a multi-tenant site where several core organisations operate. A number of these organisations – including the national carrier, Air New Zealand – operate independent Gallagher security management platforms. This customisation provided the ability to move seamlessly between domestic and international airport operationsCardholder information can be enrolled between these platforms, enabling employees from each organisation to access multiple areas of the airport using a single access card. The multi-tenant functionality creates a flexible system that reduces the costs associated with issuing and managing multiple cards. As a domestic and international airport, CIAL, Gallagher and security partner ECL Group, together developed a customisation that would enable CIAL staff to manage airbridge configuration via the security management platform. This customisation provided the ability to move seamlessly between domestic and international airport operations. Airbridges and access controlled doors Using 14 fully-automated and motorised airbridges and access controlled doors, airport staff use workstations to configure the system and easily transition the airport from domestic to international operations – ensuring passengers are directed to secure zones including customs and immigration when appropriate. All doors are operated with an access card and once an area of the airport has been ‘sealed’ for security (for example, an international departure lounge), access to these areas is automatically denied and they become accessible only via a security clearance entryway.
Neath Port Talbot residents have been given a road safety boost in the form of a new Mobile Enforcement Vehicle (MEV). It has been supplied by Videalert, one of the UK’s leading suppliers of intelligent traffic enforcement, video surveillance and management solutions, which was awarded the contract after due procurement process. Mobile enforcement vehicle “Indiscriminate and dangerous parking around Neath Port Talbot will no longer be tolerated,” said Councillor Rob Jones, Leader of Neath Port Talbot County Borough Council. “The newly purchased mobile enforcement vehicle seeks to challenge those drivers who choose to park on school keep clear markings, within clearly defined bus stops and on pedestrian crossings with no thought for the safety of others. It is hoped that this MEV vehicle will help to further ensure greater safety and protection for pedestrians and other road users as we progress through 2019.” It is hoped that this MEV vehicle will help to further ensure greater safety and protection for pedestrians" As part of an ongoing campaign, the council’s road safety team carried out a county-wide School Gate Parking campaign in partnership with South Wales Police and the Mid and West Wales Fire and Rescue Service. This included banners to be displayed outside all schools to raise awareness as well as delivering education to all pupils - encouraging them to be a positive influence on their guardians taking them to and from school. However, it was determined that enforcement for persistent drivers was the most effective way to tackle this growing road safety menace. ANPR and Digital Video Platform The Mobile Enforcement Vehicle (MEV) comes equipped with two roof-mounted high-tech ANPR cameras and two colour cameras to capture contextual video evidence of vehicles whose drivers have chosen to contravene traffic orders across the County’s territories. The on-board systems are controlled by one of the Council’s Civil Enforcement Officers using a dashboard-mounted touchscreen. All contravention evidence data is transferred to Videalert’s Digital Video Platform in the parking office at the end of each shift. The Videalert system automates the construction of video evidence packs which are reviewed by trained council operatives prior to sending confirmed offences to the back-office processing system for the issuance of penalty charge notices to the registered keepers of vehicles. Road and residential safety The winning entry of ‘iPatrol’ was submitted by a pupil at Gnoll Primary School In order to promote the safety messages to younger residents, the Council’s Road Safety Team also engaged with all Primary School pupils in a competition to name the vehicle. The winning entry of ‘iPatrol’ was submitted by a pupil at Gnoll Primary School who was presented with a Chromebook, sponsored by Videalert, by Neath Port Talbot Council Mayor Cllr Dennis Keogh at the Mayor’s Parlour in Port Talbot on Thursday, January 24th. According to Tim Daniels, Sales and Marketing Director at Videalert: “This new generation of multi-purpose mobile enforcement vehicles (MEVs) gives Councils greater flexibility in the way that they can deal with a wide range of moving traffic and parking contraventions.”
Round table discussion
It seems there are more “bad things” happening than ever before. We hear news every day of workplace shootings and terrorist attacks, of smash-and-grab thefts and child abductions. Beyond the possible human tragedy involved, such events pose a persistent question to anyone involved in the realm of security: Could we have prevented it? The first step toward prevention is to predict or foresee an event before it happens. Too often, technology enters the picture after the fact, most commonly the use of forensic video. Isn’t there more our industry can do before such events occur? We put the question to this week’s Expert Panel Roundtable: How can security systems be used to predict bad things before they happen?