Video surveillance equipment
Renowned sensor solutions provider, HENSOLDT has successfully concluded flight tests with its collision avoidance radar system for UAVs. This sensor is intended to improve safety in both military and civilian air traffic. Detect-and-avoid radar system HENSOLDT has developed a demonstrator of a so-called detect-and-avoid radar system, which uses the latest radar technology to detect objects in the flight path of a UAV and to give early warning of any threat of collision following precise evalua...
Security integrators are often tasked with a multitude of responsibilities which could include a variety of installation, integration or design tasks made up of sprinkler systems, fire alarms, access control, HVAC, video surveillance systems and networks; and then pile on maintenance, training and analytics. Traditionally, most security integrators have installation backgrounds but are now expected to be IT savvy, too. Even the most proficient IT professionals may not fully grasp the complexity...
Redvision, the UK’s renowned manufacturer of high-performance, rugged CCTV cameras, has released an image of its new VEGA 2010 camera housing, with its cover ghosted away. It clearly shows installers how their preferred camera and lens combinations can fit neatly inside. VEGA 2010 camera housing Stephen Lightfoot, technical director at Redvision explains, “The VEGA 2010, rugged, camera housing has room for cameras and lenses up to 290mm long. The Tru-park, silicon wiper, which remo...
Video surveillance equipment vendors report their 2018 revenue data to IHS Markit in the first quarter of 2019, which is when we calculate the rate the professional video surveillance market grew in 2018. However, we expect this rate will have been around 10 percent globally -- slightly higher than the 9.3 percent growth in 2017 and much higher than the 3.9 percent growth in 2016. Changing market trends Despite this healthy rate of growth, 2018 was not without its challenges and surprises. Cha...
In honour of International Day for the Elimination of Violence against Women, Dahua Technology donated its advanced video surveillance solutions to Faces of Hope Victims Center for it to create a safe space for victims and employees alike, protecting domestic violence sufferers. Globally, almost one third (30%) of women who have been in a relationship report that they have experienced some form of violence by their intimate partners. Globally, more activists and groups are organising to combat...
Security 101, a national security systems integrator, announced 13 winning non-profit organisations in the 7th Annual Gift of Security. More than 32,825 online voters selected the winners, each of which will receive $10,000 worth of integrated security services and equipment from 13 participating Security 101 offices and product partners, Axis Communications and WESCO. Each office enlisted local public officials and civic leaders to nominate three non-profit organisations that were submitted to...
Milestone Systems, globally-renowned open platform company in networked VMS, released its Device Pack 10.0a in October this year and now supports the MOBOTIX MOVE camera series. MOBOTIX MOVE is an independent product line providing customers everything from a single source. “MOVE” stands for the use of mechanically moving parts in the cameras, meaning that MOBOTIX have parted with their previous product policy of only offering decentralised video systems on the market. The MOBOTIX MOVE product line is the first motorised devices and first ONVIF-based camera line from MOBOTIX. “We’re glad to be supporting the first ONVIF compliant products introduced by MOBOTIX as we believe this will enable us a faster release to market going forward,” said VP (Products), Jesper Just Jensen, Milestone Systems. Device Pack 10.0a With the Device Pack 10.0a, Milestone Systems also supports new firmware for MOBOTIX’ Mx6 camera series With the Device Pack 10.0a, Milestone Systems also supports new firmware for MOBOTIX’ Mx6 camera series. Mx6 cameras use a powerful CPU that delivers up to 34 frames per second in full HD. This allows for even better capture of quick movements. The camera line has more capacity for software applications such as 3D motion analysis and license plate capture in the camera. "Thanks to our market opening strategy, Milestone Systems is today one of the largest technology partners of MOBOTIX AG. Due to the growing global demand for our cyber-secure premium cameras, we are very pleased to announce the release of the Device Pack 10.0a, which now enables the integration of the entire MOBOTIX camera world into the Milestone VMS: our Mx6 IoT series as well as the latest MOVE cameras,” says Philipp Helmes, MOBOTIX Product Manager for Integration Solutions. IP-based physical security solutions Milestone Systems now supports more than 7,000 devices, and 40% of Milestone Systems’ drivers are now integrated through ONVIF, an open industry forum that provides and promotes standardised inter-faces for effective interoperability of IP-based physical security products.
Terrorism by unmanned aircraft is a growing threat. Using drones to smuggle contraband into prisons is a current trend. While many countries are deploying UAVs in combat, the UAS technology is getting easier and easier to acquire by the general public and ill-intentioned groups. Most of current security systems set up in critical infrastructures are not sufficient to guarantee an appropriate level of protection. Over the past several months, more and more drones have been flying over Florida's prisons, particularly as a means of smuggling. SPYNEL 360° thermal imaging sensors To protect prisons, borders and critical infrastructures from smuggling and terrorism, Electro Optical Industries upgraded their most powerful 360° thermal imaging sensors SPYNEL-X and SPYNEL-S, integrating a visible channel and a laser rangefinder to the thermal cameras. The new V-LRF option aims to facilitate the tracking and the identification of a detected threat, thanks to the full HD visible cameras’ optical zoom (x30). The exact distance of the threat is provided by the laser rangefinder in real time, an option particularly adapted to the detection, tracking and recognition of the smallest targets, like UAVs. SPYNEL & its V-LRF option ensure no blind sector for a real 360° coverage in all surveillance phases: detection & identification An innovation it is, as all other systems on the market must use separate sensors to get similar functions: one sensor for detection, a radar for instance, and another sensor for identification, such as a PanTiltZoom (PTZ) camera. Xavier Elbaz, Sales Manager at Electro Optical Industries explains: "With separate systems, it is hardly possible to ensure a real 360° coverage for detection and identification because of blind sectors created by the mechanical supports. Moreover, separate sensors must be integrated and calibrated to properly operate together. SPYNEL & its V-LRF option ensure no blind sector for a real 360° coverage in all surveillance phases: detection & identification." SPYNEL V-LRF with CYCLOPE detection software In addition, most of the time, UAVs' small size and low electromagnetic signature go unregistered by traditional detection measures. With SPYNEL's thermal imaging technology, it is impossible for a drone to go unnoticed: any object, hot or cold will be detected by the 360° thermal sensor, day and night. SPYNEL V-LRF and its automatic detection & tracking software CYCLOPE are easy to deploy and to use, and the system is easily interfaceable for multi-sensor protection of critical infrastructure like prisons. Data is smoothly merged with other sensors’ data like radars, AIS, fence vibration sensors, etc., and displayed on the same interface, whereas separate sensors must be integrated and calibrated to operate properly together.
Hanwha Techwin has further strengthened its premium Wisenet P series with the introduction of the ultra-high definition PNM-9320VQP which, with 4 sensors and a separate integral PTZ camera, is designed to provide a highly cost-effective solution for detecting and tracking objects over wide open areas. Ultra HD megapixel camera The option of exchangeable 2- and 5-megapixel lens modules enable the camera sensors built into the H.265 Wisenet PNM-9320VQP to work together to seamlessly capture 360-degree images of up to 20-megapixel resolution. In addition, the PNM-9320VQP’s 2-megapixel 32x PTZ camera element is automatically triggered to zoom in and track a moving object or move to a user-configured preset position, when the motion detection function of the multi-directional camera detects activity. “By placing a PTZ camera at the centre of the PNM-9320VQP we are able to provide a highly affordable and efficient solution for city and wide area surveillance applications such as car parks, shopping centres and warehouses,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “As well as installation and maintenance costs being significantly lower, end-users are able to avoid incurring the higher capital costs of using 5 separate cameras to cover an area and achieve the same level of functionality.” PTZ cameras The IK10 vandal and IP66 weather resistant PNM-9320VQP is equipped with a Gyro sensor which offer accurate stabilisation The PTZ camera benefits from the world’s best Wide Dynamic Range (WDR), which performs at up to 150dB to accurately produce images in scenes that simultaneously contain very bright and very dark areas, as do the 2-megapixel lens modules. The 5-megapixel lens module options come with 120dB WDR. The IK10 vandal and IP66 weather resistant PNM-9320VQP is equipped with a Gyro sensor which offer accurate stabilisation when a camera is disturbed by wind or vibrations, resulting in more stable images. Additional key features include 5 built-in SD card slots to help keep data safe in the event of network disruption, defog, which makes corrections to blurry images which are captured in foggy conditions and Lens Distortion Correction (LDC) compensates for the image distortion that can occur with wide angle lenses. WiseStream II compression technology The multi-streaming PNM-9320VQP supports H.264, H.265 and MJPEG compression. Bandwidth efficiency is improved by up to 99% compared to current H.264 technology when H.265 is utilised with WiseStream II, a complementary compression technology which dynamically controls encoding, balancing quality and compression according to movement in the image. Hanwha Techwin has also just introduced the Wisenet PNM-9000VQ multi-directional camera, which with 4 exchangeable lens modules that together seamlessly capture 360-degree images of up to 20-megapixel resolution, shares many of the PNM-9320VQP’s features, but does not have a built-in PTZ camera.
Matrix is gearing up for participation in the 12th edition of The International Fire & Security Exhibition and Conference (IFSEC) India Expo. The company will be launching their latest time-attendance and access control device COSEC ARGO, along with exhibiting the new people mobility management and video surveillance solutions. COSEC ARGO access control device At the event, Matrix will be unveiling COSEC ARGO, the company’s latest high performance, design and engineering wonder, equipped with an enhanced IPS LCD touchscreen for a visually splendid experience. The addition of Gorilla glass calls for enhanced toughness. This device has higher processing speed, wall and flush mounting options, and increased fingerprint and event storage capacity. It is specifically designed for serious time-attendance and access control applications. Furthermore, this device offers multiple connectivity options like Bluetooth, Wi-Fi, PoE, and USB. Also, IP65 and IK08 certifications makes it suitable for challenging and outdoor installations. NETRA IP cameras and NVRX NVRs Matrix will be demonstrating their high-end, standalone access control solution and new aadhaar-enabled biometric attendance system Matrix will be demonstrating their high-end, standalone access control solution and new aadhaar-enabled biometric attendance system. They will also be elaborating on their latest cloud-based time-attendance solution. The video surveillance solutions expert will also be talking about the latest parking management solution, which is fast developing a reputation to easily solve parking woes faced by multi-national organisations. The company’s flagship enterprise-grade IP cameras – NETRA will also be exhibited at the event. NVRX, the high-tech network video recorders, and video management software are also slated to be highlights of the event. “IFSEC is South Asia’s largest security, civil protection and fire safety show, which in turn provides us with a platform to expand our ties with industry experts and system integrators. The event also serves as a great stage for highlighting our well-engineered solutions. We aim to use this opportunity to expand our network and spread word about our technologically advanced Security solutions”, commented Ganesh Jivani, Managing Director, Matrix Comsec.
TITAN AI Identify has been developed primarily to provide high speed accurate detection, recognition and identification of a subject-of-interest from live or recorded surveillance video. TITAN AI Identify TITAN AI Identify processes live real time or recorded video, automatically interrogating the image information, detecting and extracting facial data TITAN AI Identify processes live real time or recorded video, automatically interrogating the image information, detecting and extracting facial data and converting this into a unique code - more than a barcode - more like a DNA signature. The signature is then used for analysis and matching purposes, tagged and linked to retained video footage and presented to the operator via an easy-to-use graphical interface. In most cases the image information is then discarded, however, in high security applications the image may be retained. AI and Analytical Techniques Utilising the latest Artificial Intelligence, Neural Network and Analytical Techniques, the TITAN AI Identify high performance solution ensures that the subjects-of-interest can be effectively detected and identified quickly and with the minimum of intrusion. In most applications TITAN AI Identify provides fast and accurate multi-subject video interrogation from standard High Definition video cameras, enabling the user to utilise existing surveillance and security infrastructure. The solution can also be applied to video streams from mobile and body-worn devices.
Cyberattacks targeting IoT devices and consequently video systems as well are growing more frequent at an unprecedented rate. The things users should consider in their security strategy are highlighted in an information package from the Regensburg-based video equipment manufacturer with information and specific recommended measures. They show that the essential aspects extend beyond the classic instruments of cybersecurity. Security specialists at many banks in several different countries were undoubtedly completely blindsided in 2013 when Russian hacker groups ‘purloined’ a sum totalling more than a hundred million euros in the course of the ‘Carbanak’ campaign: Comprehensive strategy Video systems also make excellent targets in ‘Denial of Service’ attacks, as was demonstrated by the infamous ‘Mirai’ and ‘Persirai’ campaigns In these attacks, surveillance cameras inside the financial institutions were compromised, allowing the perpetrators to secretly view screen contents and keyboard entries and identify employees as spear phishing targets from their name tags or employee IDs, for example. Video systems also make excellent targets in ‘Denial of Service’ attacks, as was demonstrated by the infamous ‘Mirai’ and ‘Persirai’ campaigns. If a company wants to protect itself successfully from attacks of this kind, it is essential to implement a fully comprehensive strategy. The Regensburg-based video technology company Dallmeier identifies five crucial aspects which must function in harmony: consideration of security issues as early as the planning phase, integration in the IT strategy, cybersecurity functions in the systems, data protection, and not least the credibility of the manufacturer. Hardened operating systems Due consideration of security questions should be included in the planning stage, for example by intelligent use of 3D technology. Secondly, it is important to ensure that the planned system is consistent with the company's IT strategy: More and more often, essential resources such as server capacities, or even the entire video security system fall within the purview of the IT department. The fourth aspect should really be practically self-evident since the entry into force of the GDPR For the actual core function ‘cybersecurity’, it is important that systems are equipped with all the requisite "IT security" functions, from hardened operating systems to capabilities for separating networks and up to and including encryption technologies and attack detection capabilities. The fourth aspect should really be practically self-evident since the entry into force of the GDPR, that is to say consideration of data protection issues. Finally, customers should also think very carefully about the manufacturer itself: What steps are taken to safeguard the systems during development and production, is the manufacturer potentially exposed to political pressure, and what provisions are made for security aspects when integrating the systems with each other and integrating third party systems?
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood management assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental control assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway management and parking assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper experience assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognise and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing business intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A natural cross-over technology This trend towards integration has forever changed how organisations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyse what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalise on that connection is only limited by our imagination.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban on Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes a Splash with Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact of Data-Driven Smart Cities on Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyse data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing the Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends for 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How to Prevent ATM Jackpotting with Physical and Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve- how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need to Look Beyond Technology for Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organisation. 10. The Evolution of Facial Recognition from Body-Cams to Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology overview and early adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations at critical infrastructure sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation and advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New market opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-sensor thermal solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
The U.S. Congress has voted on, and the President has signed, a ban on government uses of video surveillance equipment produced by two of the world’s top manufacturers – Hikvision and Dahua. The provision is buried in the National Defense Authorization Act (NDAA) for fiscal year 2019, which passed the U.S. House of Representatives on July 26 and the Senate on August 1. The President signed the NDAA into law on August 13. The provision was originally introduced as an amendment to the House version of the bill but was not included in the Senate version. However, the provision survived in the final version, negotiated by a conference committee and passed by both houses. The President had previously voiced support for the bill, which authorises U.S. military spending, and signed it into law two weeks later. Scope of the ban The President has previously voiced support for the bill, which authorises U.S. military spending, and signed it into law two weeks later The ban covers “public safety, security of government facilities, physical security surveillance of critical infrastructure, and other national security purposes.” It bans “video surveillance and telecommunications equipment produced by Hytera Communications Corporation, Hangzhou Hikvision Digital technology Company, [and] Dahua Technology Company (or any subsidiary or affiliate of such entities).” Hytera Communications is a Chinese digital mobile radio manufacturer. The final bill eliminates specific mention of “white label” technology, which refers to cameras manufactured by Hikvision and/or Dahua but rebranded and labelled by other companies such as Honeywell, Stanley or UTC. However, interpretation of the word “affiliate” could include OEM partners. The ban, which takes effect “not later than one year after … enactment,” applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a "phase-out plan" to eliminate the equipment from government uses. The requirement suggests an opportunity of additional government business for non-Chinese manufacturers and integrators involved in switching out the equipment. Mention of the words “critical infrastructure” in the final bill points to inclusion of another whole category of installations in the ban; that is, facilities operated by non-government entities that are judged to be essential to the functioning of society and the economy. The Security Industry Association (SIA) declined to comment on the bill, citing its complexity and the need to research the potential impact. Both Hikvision and Dahua have issued corporate statements in reaction to the ban. The bill can be viewed in the context of a broader U.S. political backlash against China in general Broader context of the bill The bill’s passage is a setback to the growing profile of Chinese companies in the video surveillance market. It can also be viewed in the context of a broader U.S. political backlash against China in general, as evidenced by the recent acceleration of import tariffs and simmering trade war. The NDAA also targets China in another way: it strengthens the Committee on Foreign Investment in the United States, which reviews the impact of proposed foreign investments on national security.The NDAA is an annual act passed by Congress that authorises U.S. military spending Another view is that Chinese companies invest heavily in research and development, can operate at greater scale and with lower costs, and therefore provide good overall value. For these reasons, many had expected Chinese camera products to increase their presence in the US market. The government ban, at the very least, slows down that transition. The potential is there for it to totally change the face of the industry. The NDAA is an annual act passed by Congress that authorises U.S. military spending and is used as a vehicle for a variety of policy matters. It has been passed annually for more than 50 years. The August 1 Senate vote marks the earliest Congress has passed the defence spending bill since 1978. Ironically, the final bill softened restrictions on China’s ZTE Corp. and Huawei Technologies, two telecommunications companies, because of national security concerns. These restrictions are weaker than in earlier versions of the bill. This article was updated on the 14th August 2018.
Cybersecurity talk currently dominates many events in the physical security industry. And it’s about time, given that we are all playing catch-up in a scary cybersecurity environment where threats are constant and constantly evolving. I heard an interesting discussion about cybersecurity recently among consultants attending MercTech4, a conference in Miami hosted by Mercury Security and its OEM partners. The broad-ranging discussion touched on multiple aspects of cybersecurity, including the various roles of end user IT departments, consultants, and integrators. Factors such as training, standardisation and pricing were also addressed as they relate to cybersecurity. Following are some edited excerpts from that discussion. The role of the IT department Pierre Bourgeix of ESI Convergent: Most enterprises usually have the information technology (IT) department at the table [for physical security discussions], and cybersecurity is a component of IT. The main concern for them is how any security product will impact the network environment. The first thing they will say, is “we have to ensure that there is network segmentation to prevent any potential viruses or threats or breaches from coming in.” The main concern for IT departments is how any security product will impact the network environment”They want to make sure that any devices in the environment are secure. Segmentation is good, but it isn’t an end-all. There is no buffer that can be created; these air gaps don’t exist. Cyber is involved in a defensive matter, in terms of what they have to do to protect that environment. IT is more worried about the infrastructure. The role of consultants and specifiers Phil Santore of DVS, division of Ross & Baruzzini: As consultants and engineers, we work with some major banks. They tell us if you bring a new product to the table, it will take two to three months before they will onboard the product, because they will run it through [cybersecurity testing] in their own IT departments. If it’s a large bank, they have an IT team, and there will never be anything we [as consultants] can tell them that they don’t already know. But we all have clients that are not large; they’re museums, or small corporations, or mom-and-pop shops. They may not be as vulnerable from the international threat, but there are still local things they have to be concerned about. It falls on us as consultants to let them know what their problems are. Their IT departments may not be that savvy. We need to at least make them aware and start there. Wael Lahoud of Goldmark Security Consulting: We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels. At the procurement stage, we as consultants must select and specify products that have technology to enable cybersecurity, and not choose products that are outdated or incompatible with cybersecurity controls. We also see, from an access control perspective, a need to address weaknesses in databases. Specifying and having integrators that can harden the databases, not just the network itself, can help. The impact of physical security products on the network environment was a dominant topic at the MercTech4 consultants roundtable discussion The need for standards on cybersecurity Jim Elder of Secured Design: I’d like to know what standards we as specifiers can invoke that will help us ensure that the integrator of record has the credentials, knows what standards apply, and knows how to make sure those standards are maintained in the system. I’m a generalist, and cybersecurity scares the hell out of me.We’re not just talking about access to cameras, we are talking about access to the corporate network and all the bad things that can happen with that. My emphasis would be on standards and compliance with standards in the equipment and technology that is used, and the way it is put in. It can be easier for me, looking at some key points, to be able to determine if the system has been installed in accordance. We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels"I’m taking the position of the enforcement officer, rather than the dictator. It would be much better if there were focused standards that I could put into the specification— I know there are some – that would dictate the processes, not just of manufacturing, but of installation of the product, and the tests you should run accordingly. Pierre Bourgeix: With the Security Industry Association (SIA), we are working right now on a standard that includes analysed scoring on the IT and physical side to identify a technology score, a compliance score, a methodology, and best-of-breed recommendation. Vendor validation would be used to ensure they follow the same process. We have created the model, and we will see what we can do to make it work. Terry Robinette of Sextant: If a standard can be written and it’s a reasonable process, I like the idea of the equipment meeting some standardised format or be able to show that it can withstand the same type of cyber-attack a network switch can withstand. We may not be reinventing the wheel. IT is the most standardised industry you will ever see, and security is the least standardised. But they’re merging. And that will drive standardisation. Jim Elder: I look to Underwriters Laboratory (UL) for a lot of standards. Does the product get that label? I am interested in being able to look at a box on the wall and say, “That meets the standard.” Or some kind of list with check-boxes; if all the boxes are checked I can walk out and know I have good cybersecurity threat management. IT is the most standardised industry you will ever see, and security is the least standardised" The role of training Phil Santore: Before you do any cybersecurity training, you would need to set the level of cybersecurity you are trying to achieve. There are multiple levels from zero to a completely closed network. Wael Lahoud: From an integrator’s perspective, cybersecurity training by the manufacturer of product features would be the place to start – understanding how to partner the database, and the encryption features. We see integrators that know these features are available – they tick the boxes – but they don’t understand what they mean. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation. That would be a good starting point. The role of integrators Wael Lahoud: Integrators like convenience; less time means more money. So, we see some integrators cut corners. I think it is our role (as consultants) to make sure corners are not cut. If you rely solely on integrators, it will always be the weak password, the bypass. We have seen it from small projects to large government installations. It’s the same again and again. Even having an internal standard within an organisation, there may be no one overseeing that and double-checking. Tools will help, but we are not there at this point. I will leave it up to manufacturers to provide the tools to make it easy for consultants to check, and easier for integrators to use the controls. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation - so training is very important The impact of pricing Pierre Bourgeix: The race to the cheapest price is a big problem. We have well-intended designs and assessments that define best-of-breed and evaluate what would be necessary to do what the client needs. But once we get to the final point of that being implemented, the customer typically goes to the lowest price – the lowest bidder. That’s the biggest issue. You get what you pay for at the end of the day. With standards, we are trying to get to the point that people realise that not all products are made the same, not all integrators do the same work. We hope that through education of the end user, they can realise that if they change the design, they have to accept the liability.It’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it" The big picture Wael Lahoud: The Windows platform has a lot of vulnerabilities, but we’re still using it, even in banks. So, it’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it. That’s where the cybersecurity program comes into play. There are many vulnerable products in the market, and it’s up to professionals to properly secure these products and to design systems and reduce the risk. Pierre Bourgeix: The access port to get to data is what hackers are looking for. The weakest link is where they go. They want to penetrate through access control to get to databases. The golden ring is the data source, so they can get credentialing, so they can gain access to your active directory, which then gives them permissions to get into your “admin.” Once we get into “admin,” we get to the source of the information. It has nothing to do with gaining access to a door, it has everything to do with data. And that’s happening all the time.
The amount of data generated by today’s video systems – whether resulting from increasing camera counts and/or higher resolutions such as 4K – is presenting new challenges when it comes to storing the data and making it instantly accessible to end users. The surge in data is opening the way in our market for new, more sophisticated IT systems to manage and store the data. In fact, the sheer volume of video data and increasing application demands make some legacy approaches obsolete. Managing and storing video data The surge in “big video” has attracted several players to the market from the IT side. The latest is Hitachi Insight Group, which has introduced new Video Management Platform (VMP) converged appliances for big video applications. The appliances integrate the rack server, network storage, flash modules and virtualisation software. There are three models that support from 150 to 10,000 cameras and scale up to 16 petabytes of storage. Each “pre-validated, converged turnkey appliance” is scalable and provides a high-availability foundation for video security, monitoring and analytics, according to Hitachi. The appliances support third party video management system (VMS) software (such as Genetec, Milestone, Verint, et. al.) as well as video analytics and infrastructure monitoring software. Their design emphasises high availability and fault tolerance. Vertical markets “Our appliance super-charges VMS systems to enable them to operate as they were designed,” says Justin Bean, Hitachi’s Director of Smart Cities Solutions. Hitachi’s systems have been used in the smart cities/public safety sector, and are now being marketed more broadly to corporate and enterprise security applications. "We are bridging the gap between security integrators and ITmanagers with solutions that areeasy to install and support" “We are experts on storage, and we are bridging the gap between security integrators and IT managers with solutions that are easy to install and support,” says Kirill Sokolinsky, Director, Hardware Solutions, Smart Cities and Public Safety, Hitachi Insight Group. Hitachi’s integrated solution replaces the need to combine disparate systems to achieve the needed functionality. "Five years ago it was hard to get end users to talk about storage," says Mark Jules, VP of Public Safety and Smart City Solutions, Hitachi Data Systems. "Now with issues such as compliance and body-worn cameras, store-and-compute is mentioned in every meeting." Some legacy storage systems can lose data, which can degrade video quality by as much as 20 percent and undermine the effectiveness of video analytics systems. Problems include network resiliency, blurred video, delays in pulling up footage, and lapses in footage. Hitachi seeks to solve the problems and offer the technology to more vertical markets, including gaming, transportation, and corporate campuses. Physical security & ‘big data’ Another common term today is “big data,” which highlights the ability to capture large amounts of data and then to analyse it to yield greater knowledge and insights. The physical security market generates a large amount of its own big data nowadays, whether from access control or intruder systems or video. In addition to the “big video” aspect – all those images – surveillance systems also yield more “structured data,” the results of applications such as crowd counting and license plate recognition. Longer storage times (some driven by regulatory compliance requirements) and greater use of analytics are two additional factors driving the need to store more video data. As evidence of the growth in data, Hitachi points to IHS estimates that 337 additional petabytes of data are generated every day from new surveillance cameras this year compared to last. Given the proliferation of data in ours and related markets, it’s no surprise that Hitachi has been drawn to the opportunity. Considering the massive amounts of data involved, it’s likely even more vendors will join in.
PureTech Systems recently announces a delivery milestone for the next phase of the Border Patrol’s Mobile Video Surveillance Systems (MVSS) program. The latest deliveries, consisting of ruggedised Ford F-150 trucks outfitted with telescoping surveillance payloads, are being deployed in San Diego, CA and will support mobile video surveillance up to 6 miles away. Remote surveillance scenarios The event was followed by Fox 5 News and ABC 10 News in San Diego and highlighted the value to Border Patrol agents in the field, including rapid deployment and ease of use. The MVSS platform utilises PureTech Systems’ PureActiv software as its central command and control, providing video intelligence, user interface display and sensor collaboration logic for the surveillance suite which consists of visible and thermal cameras mounted on a telescoping mast which extends over 35 feet in the air. Mobile surveillance solution In the interview with ABC 10 News, Michael Scappechio, a supervisor with the Border Patrol, said, it’s their increased rate of arrests that landed the trucks here, “nearly a 90 percent increase is significant, that’s going to get attention, that’s going to get resources, that’s going to get man power, infrastructure and technology.” Border Patrol also furthered that these trucks won’t replace the border wall but instead, will go hand in hand with it. PureTech Systems is teamed with Benchmark Electronics to deliver the complete mobile surveillance with the mission to track and identify Items of Interest (IOI) along the U.S. southwest border and other remote surveillance scenarios where rapid mobile deployment is needed. The most recent delivery of the mobile video surveillance solution is not the first, with several systems already being deployed along the border in Texas.
More and more police forces in the EU are getting equipped with bodycams. Recently the State Police of Niedersachsen in Germany, the Police of Mechelen in Belgium and the Police in the Czech Republic have signed contracts for the supply of bodycams by Dutch company Zepcam. Body worn video (BWV) and body worn cameras (BWC) Body worn video (BWV) and body worn camera’s (BWC) improve the safety of law enforcement officers Body worn video (BWV) and body worn camera’s (BWC) improve the safety of law enforcement officers, increase transparency and supply video-evidence for criminal investigation purposes. Surveys in the US, where bodycams are used for years now, show that they de-escalate aggression or have a civilizing effect on police-citizen encounters, thus reducing complaints. Also, police forces want to use bodycams as a countermeasure against the public shooting more and more videos of incidents on their smartphones. Unlike public videos, footages captured by law enforcement can be admissible in court. Zepcam, bodycams supplier for police forces globally Zepcam already supplies bodycams to police forces in 15 countries like Switzerland, Germany, Hong Kong and The Netherlands. The Dutch company is global supplier in Europe, with clients in over 40 countries. It both manufactures and supplies the camera systems and the IT structure which automatically stores and processes the captured footages. Zepcam has seen and enormous increase in the use of bodycams by law enforcement in the past five years The State Police of German State Niedersachsen has ordered 500 bodycams in a 4-year contract. Zepcam has won this tender because its cameras and software platform made the best match with requirements of field users and the central IT department. The region of Mechelen is the first police zone in Belgium to deploy bodycams on a large scale. Zepcam was selected after a test period with 7 different bodycam suppliers. Video management software (VMS) integration The Czech Police in the Central Bohemian Region purchased Zepcam bodycams for law enforcement purposes. Also, the company will assist the police force to expand and integrate the new video management software in the management software that is used in over 80 locations in the Czech Republic. Zepcam has seen and enormous increase in the use of bodycams by law enforcement in the past five years. According to the company the cameras help reduce aggression and allow for better transparency. For instance, because situations tend to de-escalate when people know they are being recorded.
Hikvision, global provider of innovative security products and solutions, is partnering with Green River, a China-based NGO that promotes and organises environmental protection activities, in particular towards protecting the bar-headed goose, one of the highest-flying birds in the world. The Yangtze River source and Bender Lake in Western China is a natural high-altitude habitat for the wild bar-headed goose. Although this area is a “no-man’s land” at 4,700 meters above sea level, it serves as a haven for rare animal species. Threatened by poachers and theft of their eggs, the number of bar-headed geese in this area once plummeted to about 1,000. In 2012, Green River launched its program to monitor and protect the bar-headed goose, with non-stop monitoring and protection of the birds and the local environment. Hikivison security cameras for wildlife monitoring Earlier this year, Green River began using Hikvision security cameras to monitor and protect bar-headed geese. Dozens of bird observation spots have been set up to implement an all-weather, 24/7 monitoring solution in the high-altitude wilderness. Hikvision has provided video technology that reduces the need for conventional manual patrol as well as the associated negative impact of human activities on bird habitats. Green River uses Hikvision equipment to stream high-definition live video to online audiences, raising awareness about the need to protect all kinds of wildlife, including the bar-headed goose. On December 6, 2018, Green River and Hikvision signed a memorandum of understanding (MoU) to continue their collaboration in 2019. Hikvision will develop customised video cameras to be used in high-altitude habitats of the bar-headed goose. The company will continue to support Green River using advanced image processing, data storage and transmission technology, to ensure the organisation can effectively collect and process wildlife data. All of this serves to secure the biodiversity and sustainability in the Yangtze River source region. Advanced video technology Public welfare and environmental protection are benefiting from high-tech applications around the globe" “Public welfare and environmental protection are benefiting from high-tech applications around the globe. In particular, video technology helps wildlife protection efforts immensely. And Hikvision has the tools as well as the willingness to help,” said Yang Xin, founder and president of Green River. He further added, “Signing this MoU is only a start. In the future, we will collaborate to promote research and conservation, and use new technologies to unveil the beauty of biodiversity.” Environmental protection Hikvision is best known as a provider of security equipment that is used to secure businesses, communities, and families. However, as evidenced by its collaboration with Green River, Hikvision’s security equipment can also be used to protect our natural world. Noting that Hikvision video technology has been used in a number of environmental protection projects, Hikvision senior vice president Cai Changyang said that the company is pleased to promote environmental protection and conservation. “In the past few years, Hikvision has accumulated valuable experience and technical know-how in environmental protection with video technology. We have engaged in the protection programs for pandas, Siberian tigers, and now bar-headed geese. But there is still a long way to go,” said Cai Changyang. “And, we will continue to explore new technologies in the future to make our own contribution to the sustainable development of the world.”
On his 2018 two-day visit to Ireland for the World Meeting of Families, Pope Francis’s scheduled activity was protected by high-performance Predator and Invictus cameras from UK CCTV design and manufacturing company, 360 Vision Technology. Specialists in a wide range of leading-edge CCTV, Access Control, PA, AV and radio communications, County Kildare-based Mongey Communications was chosen to provide the additional security surveillance protection measures necessary to secure the Pope’s visit to Dublin. With the massive crowds expected to see the pontiff, the temporary surveillance installation needed to be minimally disruptive and use mobile radio to provide the multi-scene coverage required during the two-day visit. Multi-site CCTV surveillance The camera images were to be used for co-ordination and management by multiple agencies To support an existing small-scale CCTV installation at the Pope’s final venue of Phoenix Park (the largest enclosed city park in Europe), there was a need for further camera coverage along the park’s approach routes, entrance/exit gates, search areas and general areas of crowd movement and congregation. A similar solution was also required for the Pope’s visit to the Knock Shrine pilgrimage site and the Capuchin Day Centre, where public space CCTV was again already in place but of limited overall coverage. Full integration with the existing CCTV system at the 82,300 capacity Croke Park stadium for a papal address to the Festival of Families extravaganza was also required, with communications and CCTV feeds from all locations required to be transmitted back to local on-site control rooms at each location, and additionally to a central Command and Control room at Dublin Castle. At the main Command and Control Centre, the camera images were to be used for co-ordination and management by multiple agencies, including the Office of Public works (OPW), Garda Síochána, Defence Forces Ireland, Dublin Fire Brigade, HSE / Ambulance Services and Civil Defence. High-definition video security to secure Phoenix Park “With 300,000 people expected to attend a papal mass at Phoenix Park to close the World Meeting of Families, we were briefed to provide the very best possible reliability and imaging performance from the additional cameras we employed,” explains Kevin McGrath of Mongey Communications. We needed to be confident of camera reliability straight out of the box, along with simple and fast set-up" He further added, “With this in mind, we needed to be confident of camera reliability straight out of the box, along with simple and fast set-up, and quality high-definition video for forward transmission to the various control rooms. Our very positive experience of employing 360 Vision Technology cameras on many high-security installations in the past led us to be confident about the image and build quality of the manufacturer’s cameras, and product support.” “So, to fulfil the challenges we faced for this high-profile project, we specified the latest version of 360 Vision’s Predator camera, and also their new cost-effective and ruggedised Invictus Hybrid HD PTZ camera.” 360 Vision Invictus Hybrid HD PTZ camera The new 360 Vision Invictus cameras specified for the project employ the latest compact camera modules with a choice of 20:1 or 30:1 zoom and are available with 1/2.8” Sony StarVis or 1/1.9” Sony Exmor (Ultra) sensor packages. Bridging the divide between analogue and IP technology, all Invictus cameras are equipped with Hybrid functionality enabling installation in existing analogue systems and also in full 1080P HD IP video streaming networks. Alongside ONVIF 2.4 Profile S compatibility, this means the Invictus range is not only economical, but simple to install, providing Mongey Communications engineers with a reliable, flexible and high- performance solution with which to enhance the existing electronic surveillance measures for the Pope’s 2018 visit. HD IP video streaming networks An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view Further enhancing camera reliability for this important event, the new Invictus camera range design draws cost-effectively on features usually associated with very high-end cameras, including construction from high grade, hardened aluminium and stainless steel, to ensure a rugged, durable and compact camera. An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view, plus the ability to tilt above the horizon – enabling operators to view targets above camera installation height (i.e. up hills) – an invaluable asset where cameras were being installed in the difficult installation and operational conditions of Phoenix Park. Technical relationship with 360 Vision Technology “Our decision to once again entrust the provision of the best technology available for the project to 360 Vision Technology was proven correct, and we had no issues of consequence with the installation, commissioning and performance of all the cameras - straight out of the box,” explains Kevin. “Because of the condensed set-up period available and challenging terrain of some of the installation areas, we had to act fast to ensure the successful inclusion and full control of the cameras for the multi-agency command and control room,” adds Kevin. “Here our technical relationship with 360 Vision Technology really paid dividends throughout this time-critical project, affording easy integration of all the additional cameras into the control room’s Cathexis VMS. Cathexis VMS Images from the cameras were relayed back to the various event control centres In all, over 60 additional 360 Vision Technology cameras were employed over the various sites throughout the Pope’s visit. With extensive digging and cabling not a practical option, images from the cameras were relayed back to the various event control centres via a network of reliable and secure microwave transmission links, powered by temporary generators and back-up batteries. “The new Invictus cameras were perfect for the role thanks to their low power consumption compared to other similar specification PTZ cameras,” explains Kevin. “Low power consumption really helps when adding multiple cameras to a network with a temporary power system - and meant we could add more cameras for the benefit of maximum scene coverage.” High-speed fibre-optic connectivity High-speed fibre-optic connectivity between the various remote sites and Dublin Castle was installed, together with video walls at the various control rooms. “The Pope’s visit was a great success with no security issues reported,” says Kevin. “Images relayed to the control room from the additional 360 Vision Technology cameras were vital in the smooth running of the visit and allowed all of the state agencies involved to keep a constant update on the movements of the vast crowds drawn over the pontiff’s two-day visit.” “Our long-term technical partnership with 360 Vision Technology and our direct input in to the development of their new products really pays off with high-profile projects like this,” concludes Kevin. “We have many new and exciting installation challenges on the horizon and I’m confident that 360 Vision Technology camera products will continue to be an integral part of those future projects.”
Asnet Technologies and AVT recently installed an AMX by HARMAN SVSI Networked AV Solution to provide Maritime NZ’s new Risk Coordination Center with a scalable, flexible AV system capable of carrying out military-grade operations. AMX by HARMAN SVSI networked AV solution Maritime NZ has a vital role in national security Maritime NZ has a vital role in national security. Their purpose is to ensure that all maritime activities are carried out safely, with minimal impact on the environment and the nation's security. The Risk Coordination Center in New Zealand (RCCNZ) provides search and rescue services to the 3rd largest area in the world, 24 hours a day, seven days a week, 365 days a year. While planning the construction of a new Risk Coordination Center, Maritime NZ reached out to Asnet Technologies for help relocating their existing AV system to the new facility. However, after evaluating the risks involved with moving an aged system, they quickly decided to upgrade to a more modern, flexible technology solution that could adapt to their unique needs. Asnet Technologies selected an AMX SVSI Networked AV solution—one of the first of its type to be deployed in New Zealand. AMX SVSI solution "Looking at the current Risk Coordination Center, we realised that we needed a new system that could adapt to the future developments of Maritime NZ, and the AMX SVSI system was the best possible solution for our needs,” said Paul Thompson, Account Manager, Asnet Technologies. “We needed the ability to switch any input to any output across their environment. The AMX SVSI solution was able to provide us with the flexibility, functionality, and scalability we needed to get the job done." Maritime NZ is responsible for land, air and sea rescue coordination—which meant the installation of the new AV system needed to be completed quickly to prevent disruption in operations. Leveraging SVSI's simple installation the Asnet team took only three days to deploy the solution. This worked within the tight timeframe, ensuring that the risk coordination center was never offline. AMX N1000 Video Over IP encoder/decoders With the new AMX SVSI solution, we can now work faster, smarter and safer" “Our 10-year old video solution was obsolete—and an AV solution is critical for us,” said Aaron Mikoz, CIO Maritime NZ. “With the new AMX SVSI solution, we can now work faster, smarter and safer. During search-and-rescue operations, we can see key information displayed on the screen, providing us with a better understanding of the situation without having to depend on complicated briefings." Asnet Technologies installed AMX touch panels with integrated controllers to integrate the audio system with other AV devices and the AMX N1000 Video Over IP Encoder/Decoders as part of a full AV solution. To be able to address larger groups of people, JBL surface mount and pendant speakers were positioned to reduce audio spill into other areas. The system allows the new and improved RCCNZ to distribute media leveraging common network switches in any size and configuration. "To be associated with Maritime NZ and to provide effective technologies in AV and control products is a privilege for HARMAN Professional Solutions," said Ramesh Jayaraman, VP & GM HARMAN Professional Solutions, APAC. "We would like to thank our country partner, AVT and Asnet Technologies for successfully completing this project within a tight schedule of three days, ensuring zero downtime. To be able to implement mission-critical AV applications for a defense agency is an absolute honor."
The North East Ambulance Service (NEAS) is the first Ambulance Service to trial body worn video cameras in a scheme that launches this week. Approximately 40 of the Trust’s frontline staff will be trying out the use of body cameras in a bid to offer them greater support against the rise of incidents of violence and aggression. Alan Gallagher, Head of Risk, said: “The health, safety and welfare of our staff are of utmost importance. We want to take every precaution possible to ensure that our employees are safe whilst at work.” NEAS staff adorn body worn cameras “Our staff are reporting more incidents of this nature and we are working closely with the police and other partners to respond to those perpetrators with warning letters and, where necessary, criminal action. From previous reports, we know that most of these circumstances happen away from CCTV covered areas so using body worn video cameras will mean that our staff can record evidence of abuse or assaults when they happen, such as when they are in a residential property attending to a patient." We will continue to work on measures to reduce assaults and liaise with police colleagues" "This move is designed to help us bring more prosecutions against people who put our staff at risk and reduce the assaults and abuse they are currently facing in the line of their work. There really is nothing more disheartening than being hurt by someone that you’ve gone to help, particularly when they already work in such challenging circumstances.” Fighting crime “We will continue to work on measures to reduce assaults and liaise with police colleagues to ensure action is taken following any criminal acts against staff or the Trust. We encourage all valuable NHS colleagues not to tolerate such behaviour.” The number of reported physical assaults on NEAS staff has increased by 23% compared to last year. The numbers of addresses across the North East flagged for the potential caution or violence has also increased. This sits against a backdrop of more than 350 prosecutions that have been brought for attacks on ambulance staff over the last year nationally. The scale of the problem is believed to be much greater. Emergency workers’ safety This follows a new law that was recently introduced, the Assaults on Emergency Workers (Offences) Bill, in which individuals who assault, or attack emergency workers will face longer jail terms if found guilty. The Bill was designed to recognise the debt of gratitude the public feels towards emergency services, and for the courage, commitment and dedication they show every day in carrying out their duties. Footage will be admissible as evidence in the court of law utilising Edesix VideoManager software platform Mr. Gallagher continued, “We welcome anything that will help to deter people from abusing or assaulting our staff and we hope that by reporting incidents and providing credible evidence where we can, courts might be able to be much tougher when sentencing those found guilty of assaulting and threatening our staff, prosecuting those people to the full extent of the law.” Edesix VideoManager software Footage obtained in the event of an assault or abuse will be admissible as evidence in the court of law utilising the features available in the Edesix VideoManager software platform. It will only be used for the purposes of providing evidence to the Police in any enquiry intended for the health, safety and protection of staff. The tamper proof cameras, software and support for the three-month trial have been provided free by Edesix. Richie McBride, Chief Executive Officer of Edesix commented, "We're pleased to provide the North East Ambulance Service with our cameras to enhance the protection of staff and to deter any aggressive behaviour towards NEAS workers."