Body worn video cameras
News
At IACP 2023, on booth 1127, i-PRO Americas Inc., (formerly a division of Panasonic), a pioneer in professional security solutions for surveillance and public safety, will demonstrate its latest range of security solutions for law enforcement professionals. i-PRO’s comprehensive portfolio of public safety and law enforcement solutions includes body-worn cameras, in-vehicle video systems, interview room video solutions, as well as on-premises and cloud-hosted digital evidence management solutions. Features of Genetec Clearance™ i-PRO customers maintain full control of their DEMS and VMS strategies, with full-featured choices In addition to the extensive range of imaging and evidence management offerings, the company specialises in advanced, AI-driven software and intelligent analytics, such as automated redaction to protect personal privacy. i-PRO is proud of its open-platform approach to public safety and security solutions, supporting tight integration with partners like Genetec to create CloUDE℠, a digital evidence management system that utilises the features of Genetec Clearance™. i-PRO customers maintain full control of their DEMS and VMS strategies, with full-featured choices using traditional servers and storage, hybrid storage solutions, or cloud-hosted services. VMS dual-mode architecture At IACP, attendees will learn about i-PRO’s latest Interview Room Video Solution. The system is simple to operate and offers automated activation to ensure every interview is recorded. The new VMS dual-mode architecture supports multiple room monitoring and ensures critical video and audio evidence is captured reliably, every time. “We design our public safety products specifically for the on-the-job rigours of police, fire, and EMS crews. i-PRO products deliver unparalleled reliability with a less than 1% failure rate for in-car and body-worn camera systems since 2004, affirming our commitment to excellence,” said David O’Connor, Director, i-PRO Public Safety Division. “We know how important cybersecurity and regulatory compliance are to our customers, so we develop complete solutions that automate processes to enable users to focus on the job, not the technology.” Body-worn camera solutions Cameras themselves are built to the choosy MIL-STD 810H military measure with an IP67 rating i-PRO’s BWC4000 body-worn camera features a unique 12-hour field-swappable battery, providing law enforcement and security officers with extended camera operation without having to deal with cumbersome charging cables. Officers can quickly tag videos with essential metadata using an easy-to-use LCD menu. Options such as automated activation in response to specific events such as drawing a weapon guarantee that important video evidence is available every time. Designed to provide officers with a more durable and reliable way to capture video and audio evidence in virtually any conditions, i-PRO body-worn cameras utilise the industry-standard Klick Fast™ mounting system which provides many options to easily secure the camera. The cameras themselves are built to the demanding MIL-STD 810H military standard with an IP67 weather-resistant rating. In-car video system i-PRO’s in-car video (ICV) system, the ICV4000, takes in-car video technology into the future with a powerful video processing unit (VPU4000), wireless networking, enhanced security features, and improved image quality. The system employs MPEG-4 recording, eliminating the need for proprietary media formats to provide a more streamlined approach for reviewing and sharing video. The ICV4000 can utilise 4G/5G connectivity from a mobile router or the squad MDT (Mobile Data Terminal) for evidence uploads and live streaming. With support for up to five total cameras and several options for front-view cameras, the ICV4000 can provide 1080p Full HD recording with a wider field of view and 360-degree coverage around a vehicle. Additionally, the system incorporates embedded bluetooth (BLE) and two wireless LAN modules to support seamless integration with i-PRO’s BWC4000. The system supports up to 16 triggers for system activation or status indicators. Panoramic front cameras for police vehicles IACP attendees will be able to see WV-VCF41P 4K Panoramic Front Camera for police vehicles IACP attendees will also be able to see the WV-VCF41P 4K Panoramic Front Camera for police vehicles. A component of i-PRO’s powerful in-car video (ICV) system, the camera is ideal for law enforcement agencies seeking wide-angle coverage and high-resolution capture of video evidence from the vehicle. Unlike traditional forward-facing cameras, the WV-VCF41P provides a full 150-degree field of view. The innovative lens is specifically designed to minimise distortion and edge warping, resulting in the widest angle offered. Behind the lens, the camera’s 4K sensor is i-PRO’s highest resolution sensor for mobile video evidence applications. With support for detailed forensic zooming into areas of interest without image blurring, the WV-VCF41P presents the clearest possible evidence. Unified digital evidence management i-PRO’s in-car video system and law enforcement cameras enable officers to easily upload video evidence into the CloUDE digital evidence management system (powered by Genetec Clearance) using either Wi-Fi, a mobile router, or a mobile data terminal with a cellular connection. CloUDE allows officers and investigators to store, manage, review, and share evidence from their in-vehicle or body-worn cameras efficiently and easily from within a single application. Authorised individuals can share cases and digital video evidence with cooperating agencies, prosecutors, attorneys, or members of the media. Secure access and chain of custody are controlled through straightforward policies managed in the application. Additionally, advanced logging creates an audit trail of all user actions, available for management review at any time.
With Ensenso C, IDS presents a stereo vision camera that not only generates 3D point clouds, but also delivers 2D images in colour (RGB) thanks to an additionally integrated image sensor. This enables realistic 3D images and supports subsequent processes–for example when the images are to be further processed to perform sorting tasks. Its compact housing is completely enclosed and complies with protection class IP65/67. This reliably protects the components from environmental influences and vibrations. In addition, the camera is delivered pre-configured and is thereby ready to use. Ensenso C is suitable for the automation of many industrial processes, such as in quality control, on assembly lines or for picking tasks. Features of 3D camera Camera is designed in such a way that temperature-related deviations of depth values are reduced Initially, the 3D camera is available with a baseline of approx. 240 mm; soon additional models with a baseline of approx. 455 mm will be offered. Thanks to the combination of powerful 200 W projector power and the high resolution of 5 MP, the camera delivers precise data even in large-volume applications. With the large baseline and small field of view, the models achieve a reproducible Z-accuracy of 0.2 mm at a 2 m object distance. Moreover, the camera is designed in such a way that temperature-related deviations of the depth values are reduced to a minimum: deviations at 30 cm distance at 10°C temperature change less than 0.075 mm, for example. A diffused white light LED also supports with 2D colour imaging in applications with changing ambient light conditions. Ensenso selector The Ensenso C fits seamlessly into the 3D camera range from IDS. The Ensenso product line is specifically designed for industrial requirements and combines precision with cost-effectiveness. Whether with fully integrated housing, modular design or integrated data processing: The Ensenso N, S, X, XR and as of now Ensenso C families provide solutions for a wide range of requirements from bin picking to quality control. Users can consult the Ensenso selector on the IDS website to find the right model for their particular application.
Quanergy Solutions, Inc. is showcasing how its innovative Q-Track™ 3D LiDAR (Light Detection and Ranging) solution can help retailers combat theft and criminal activity here at the 2023 LPRC Impact Conference in booth #505. A seamlessly integrated solution that combines Quanergy’s long-range 3D LiDAR sensors with its advanced perception software, Q-Track delivers real-time object detection, classification and tracking for enhanced loss prevention and security. Author's quote “With our attendance at the LPRC conference, we are effectively introducing 3D LiDAR to an industry that has historically relied on traditional, reactive security methods to protect their inventory, personnel and assets,” said Enzo Signore, CEO, Quanergy. We want to show retailers that there is a transformative alternative available today" “We want to show retailers that there is a transformative alternative available today. Our Q-Track 3D LiDAR solution not only fortifies perimeter security, it also empowers retailers to proactively mitigate shrinkage, elevate the customer experience, and stay one step ahead of rising crime and emerging challenges impacting today’s retail industry.” 3D LiDAR solutions Quanergy’s pioneering 3D LiDAR solutions offer an array of capabilities for retailers and businesses determined to enhance their loss prevention strategies. This includes: Precise Object Detection: Quanergy provides unmatched accuracy in detecting and tracking objects as small as a pen to cm level accuracy. With this heightened level of awareness, retailers can proactively identify and address potential instances of theft and loss in real time. Comprehensive Intrusion Detection: With Q-Track, retailers can pinpoint the exact location of a potential intrusion while tracking the direction and speed at which an intruder is moving to enable continuous tracking over the entire perimeter. Each Q-Track sensor further provides an impressive coverage area of 165,000 square feet (15,000 square metres), ensuring high accuracy and low total cost of ownership. Privacy-assured operation: Unlike traditional video surveillance systems, Q-Track does not capture any personally identifiable information (PII), ensuring the privacy of both customers and employees. Beyond loss prevention, Quanergy’s Flow Management platform can also be used to automate key retail processes to increase revenue by optimising room, floor, or building occupancy, regulating foot traffic, reducing wait times, increasing energy efficiency and workspace utilisation, and optimising existing resources.
Just like fighting against the spread of disease in a clinical environment, healthcare providers must mobilise, coordinate with interconnected partners, and apply sufficient budgetary resources to combat an ever-changing cyberattack landscape. A new set of safeguards is necessary to protect the confidentiality, integrity, and availability of critical healthcare business operations and data. Ponemon Institute report Not “if,” but “when” healthcare facilities expect a cyberattack - It’s no longer a question of if a healthcare facility–will suffer a cyberattack—it’s when. Plus, the extensive facilities are no longer the only targets. Not surprisingly, the healthcare industry, which maintains some of the most sensitive data and has stretched budgetary resources, is the biggest target for cyberattacks and has a high associated response cost, according to the latest report by the Ponemon Institute. The Ponemon Institute studies the costs of global cybercrime and data breaches year over year. The Ponemon Institute studies the costs of global cybercrime and data breaches year over year The Ponemon Institute report, made in collaboration with IBM, states the average total cost of a data breach reached an all-time high of USD 4.45 million in 2023. The increase represents a 2.3% increase from the 2022 cost of USD 4.35 million. Since 2020, the average cost has risen 15.3% from USD 3.86 million in the 2020 report. The report recommends that the healthcare industry invest in incident response planning, testing, employee training, threat detection, and response technologies. Safeguard critical information The statistics on cyberattacks are sobering. According to CISA (Cybersecurity and Infrastructure Security Agency), the United States operational lead for federal cybersecurity, cybercrime is happening exponentially. Furthermore, it is sometimes occurring at the hands of sophisticated government-backed criminals. Cybersecurity can no longer be left solely to the IT department. Instead, it is an organisation-wide and industry-as-a-whole duty. Common phishing strategies Initial attack vector is an internal phishing attack along with stolen credentials Every healthcare facility workforce member, including contractors and volunteers, with access to digital information, electronic health records, or network resources, including the internet, must share the duty to safeguard critical information—because it takes just a single unmitigated incident to put a healthcare facility at risk. According to The Joint Commission, a US nonprofit that accredits healthcare organisations and programmes, just one person can jeopardise an organisation’s security efforts if they fall prey to common phishing strategies. The initial attack vector–16% of the time worldwide–is an internal phishing attack along with stolen credentials, according to the Ponemon Institute. Current cyber risks in healthcare The current risk landscape in healthcare includes significant regulatory compliance risks and sophisticated, often government-supported cybercriminal networks. The healthcare industry and its caretakers have access to much more comprehensive patient information due to the push towards interoperability and interconnected healthcare organisations. However, the regulatory landscape demands heightened security and more accessible patient information. It’s important to note this expansive sharing of healthcare data poses a significant risk to patient privacy and security and a wide variety of regulatory obligations. HIPAA regulations 21st Century Cures Act and its implementing regulations require healthcare and certain technology The well-established HIPAA regulations, increasingly new and broad state privacy regulations, and even the European Union’s sweeping General Data Protection Regulation (“GDPR”) all carry the colossal potential for fines and regulatory oversight. The 21st Century Cures Act and its implementing regulations require healthcare and certain technology providers to offer much less burdensome access and sharing of electronic patient data and prohibit “information blocking” with massive risks for regulatory fines and exclusions for noncompliance. Availability and assignment of sufficient budgetary resources for such compliance-related safeguards are becoming increasingly complex. Cybercrime Cybercrime is the other severe risk. Every connected device faces the potential of a cyberattack targeting healthcare data and systems. While some hospital data breaches appear in the news, most don’t reach the public’s attention. In 2020 alone, one in three healthcare organisations around the globe reported a ransomware attack, according to the American Association of Medical Colleges (AAMC). Why is that? Because healthcare data is ten times more valuable to cybercriminals than credit card information. In addition, sophisticated criminals know about the healthcare industry’s struggle to keep up with the risks they pose. Medical identity theft Healthcare data is precious and increasingly sold on the “dark web,” according to healthcare privacy attorney Sheila Stine, JD, CIPP/US, who helps healthcare clients prepare for and respond to data breaches and teaches about identity theft. Stine says, “The dark web is the ‘web below the web’ or a part of the internet only available using special tools. It is the bad guy’s sophisticated marketplace. Medical data sets have great value to cybercriminals for medical identity theft." Cybercriminals can sell medical data sets via the dark web in exchange for access to emergency care" "Cybercriminals can sell medical data sets via the dark web in exchange for access to emergency care, access to prescriptions and durable medical equipment and even fraudulent access to commercial health insurance or Medicare/Medicaid. They are smart enough to even know to sit on the data for a year or more after accessing it to avoid detection during the standard one-year period of credit protection that some organisations offer their customers and patients.” Cyberattacks with adequate security Healthcare administrators tend to focus stretched resources on patient services. AAMC senior director of information security, Dr. Stephen Lopez, says, “It can be hard to divert resources to information security if it seems to come at the expense of patient services.” However, healthcare organisations can only defend against ransomware and other cyberattacks with adequate security measures. There should be an appropriate balance between information security defense and patient services. Yet, that balance can be challenging to determine. Cyberattacks have become so prominent numerous articles have been published surrounding hospitals and clinics in numerous states that have been hit by these intrusions, causing emergency rooms to be closed and ambulances diverted to other hospitals. In an article by ABC News, the American Hospital Association's National Advisor for Cybersecurity and Risk, John Riggi says, “These are threat-to-life crimes, which risk not only the safety of the patients within the hospital, but also risk the safety of the entire community that depends on the availability of that emergency department to be there,” Malware attack Immediately after this incident, all USB drives were disabled, along with a host of other protocols In personal history as a director of safety and security for a major healthcare organisation, seen the extent of damage that can occur from a seemingly careless act. At a healthcare system in the Midwest, organisation was hit with a malware attack when a healthcare worker found a USB drive in the parking lot. Colleague in a suburban clinic thought she could identify who it belonged to by seeing what files were on it. Once she inserted the drive into a computer, ransomware infected the clinic system against her knowledge. Thankfully, the team discovered the malware, which only infected the regional clinic. The ransomware asked for over $200,000.00. However, organisation rebuilt the system and had to re-enter the data for the clinical day manually. Immediately after this incident, all USB drives were disabled, along with a host of other protocols. Every day, this type of incident happens countless times across the healthcare industry and beyond. It’s not worth the cost and effort when workers can train on the appropriate response. How Milestone can help In such an unpredictable and highly regulated landscape, healthcare organisations must leverage their people's power and the strength of their security solutions to defend against cyberattacks. The Joint Commission found that 'healthcare organisations must guard against a wide variety of attacks and teach staff to expect the unpredictable as hackers continuously adapt their strategies.' Attack vectors vary widely from phishing attempts to network penetrations and device attacks. Consequently, video management software (VMS) and connected devices are vulnerable to criminals seeking data access and system control. Pro security platform products XProtect® VMS by Milestone is designed and alone tested to meet the highest security standards Milestone Systems recommends continuous updating of the VMS as one method to secure systems and data against a cyberattack. XProtect® VMS by Milestone is designed and independently tested to meet the highest security standards, and a security response team supports it. In addition, Milestone offers a choice of software maintenance packages and professional services to help pro security platform products. Also, consider the following methods to strengthen the security network against cyberattacks: Add strong camera passphrases or long 10+ character passwords following industry-recommended standards of a combination of upper case, lower case, numerals, and symbols. Whenever possible, isolate security networks from other PC and workstation networks. Secure the network to ensure only installed cameras can communicate. Deploy individual logins with role-based permissions appropriate to the operator’s role which, expire or are validated periodically. Prohibit sharing and writing down passwords. Individual role-based passwords may help determine the root cause of an incident or attack. Fully document suspected incidents and maintain those according to formal incident response and record retention policies. Conduct periodic systemwide risk assessments. As they become known: Fully document known or reasonably suspected risks. Determine how to mitigate such risks within expected completion timeframes. Evaluate acceptance of residual risk by authorised management personnel. Conduct thorough vendor due diligence. For instance, only purchase cameras and VMS from reputable, sound security companies and avoid organisations with known cybersecurity vulnerabilities. Disable USB ports and device cameras that are unnecessary for routine work. Carefully design BYOD or “bring your own device” policies to limit authorised use of personal devices. Deploy firewall security for internet connection. Insure organisation against various types of cyber liability. Teams should frequently backup critical data and then “backup the backup” in a different physical location. Periodically train and retrain workforce members on privacy, security, and escalation of incident requirements. Document reasonable sanctions against workforce members who violate organisational policy, contractual, or legal requirements. Security measures and risks Additionally, healthcare organisations can bolster their security measures through “hardening” — continuously identifying and countering evolving security risks. To harden video technology, enact several actionable steps: Identify the components that need protection on a written log or other documentation; Harden the surveillance system’s servers, computers, device networks, and cameras on a routine basis; Document, maintain, and periodically update security settings for each system; Deploy security software patches and updates reasonably promptly; and Train the team to help identify future threats and implement countermeasures. Smaller healthcare organisations can also leverage many available resources for small businesses offered by governmental agency resources, such as the National Institute of Standards and Technology (NIST) small business cyber security resource page. These are just some initial recommended steps toward a successful defensive security posture. There are still multiple opportunities for cybercriminals to attack both internally and externally. However, healthcare organisations can better protect their vulnerable security infrastructure by automating and strengthening processes in partnership with Milestone Systems. Defend against “walk-in attacks” While many cyberattacks often launch from a distance, some incidents physically grab a place While many cyberattacks often launch from a distance, some incidents physically take place in the facility. For example, “walk-in attacks” occur when a criminal enters a facility with or without authority and may look for easy targets, such as unsecured laptops to steal, open ethernet ports to hack, unsecured portals, sites “open to the internet,” or weak passwords on Wi-Fi networks. Most facilities and networks have safeguards to defend against such apparent threats. However, employees must still maintain vigilance and watch for people who don’t belong. For instance, healthcare facility policy and training should prohibit “piggybacking” or allowing someone to follow an authorised person through a locked door without using their credentials. Using best practices, the security team should train the workforce to watch for those not appropriately picture-badged in restricted areas. Integrations for the XProtect platform Milestone Systems works with a community of technology providers with integrations for the XProtect platform to alert facility security members of unauthorised people in restricted areas. For example: Video analytics determine activity and behaviours captured by cameras, triggering automated processes and notifying operators of problems, such as unauthorised personnel crossing a virtual perimeter into a restricted area. Access control allows or restricts entry at doors based on credentials. In addition, with integration into the XProtect platform, nearby cameras can be used for video verification when needed. Infrared sensors detect human activity in restricted areas. Alerts can be sent to security operators for immediate action when necessary. Range of security protocols Milestone Systems also has developed a range of security protocols and integrations for the platform, for example: Security through network separation XProtect uses a tiered system architecture to separate the camera network and the core server/client network, so there is no direct routeing between the two. The architecture increases the system’s resilience and lowers a potential attack’s impact on the system. Secure camera connection Certificate-based HTTPS communication provides secure access for management client and smart client users and bidirectional communication encryption between all the system’s components, which prevents eavesdropping and tampering. Leveraging certificate-based HTTPS communications ensures secure, trusted access for facility administrators while preventing decryption eavesdropping and tampering. Secure video storage XProtect corporate can encrypt and password-protect media data, meaning recorded data is protected even if someone accesses the data files on the storage system or network share. XProtect corporate also supports a digital signature on the recorded media data, proving the video is the original. Strict server-side authentication and authorisation XProtect uses consistent server-side user authentication and authorisation for all clients and integration interfaces. This authentication applies to all users and system services accessing the system via the Milestone Integration Platform SDK or Milestone Open Network Bridge. Used together with strict user rights and roles, it provides complete control of access to the system. Built on Windows security infrastructure XProtect supports Windows active directory (AD) with both native Windows NTLM and Kerberos authentication, alongside OpenID Connect and OAuth2, for maximum security. Secure remote user access XProtect uses a dedicated mobile server as a system gateway to shield and protect the core VMS servers when users connect remotely. The mobile server, mobile client, and web client communication support HTTPS to prevent eavesdropping and tampering, providing secure authentication and bidirectional encryption, which includes user credentials, configuration, and media data. Protection of evidence material To protect exported forensic material, XProtect uses encryption, digital signing, and password protection of the media databases. XProtect’s smart client player ensures that exported evidence is original and unaltered by verifying signatures and preventing evidence from re-exporting to control the media once it leaves the VMS. Milestone Systems supports healthcare facilities and their data by continually updating the platform. As a result, organisations can focus on patient-centric care. Working towards what’s next How healthcare facilities face the challenges of tomorrow depends on the planning and choices they make. With an adaptable, scalable, and open platform such as XProtect VMS, healthcare facilities can be ready for what comes next and quickly pivot to improve their business outcomes. When a large healthcare organisation uses the XProtect open platform, the workforce can mitigate risks, maximise existing resources, and stretch budgets further. Count on Milestone Systems as a collaborative partner, supporting endeavour to prepare for the current risks and future challenges faced in healthcare.
Expert commentary
Open platform video technology software is more than just a product; it's a tool that helps customers achieve their desired business outcomes. Safety, round-the-clock security, and increased operational efficiencies are now the norm due to video technology. Responsible Technology Despite humanity’s impressive technological advances, we also recognise the immense responsibility that comes with technological innovation. It's not enough to focus solely on the positive impact video technology can make, we must also be vigilant in identifying and addressing any potential negative consequences it can have on society and its citizens. This is the role of Responsible Technology. Data privacy We want to use all the good things that technology innovation brings, whether it be video, AI, ML, facial recognition, etc. We want to use all the good things that technology innovation brings, whether it be video, Artificial Intelligence, machine learning, facial recognition, etc. to serve people in societies in a responsible way. That means making sure that we regulate technology in a way that respects human rights and data privacy. Addressing the challenges The challenge is, that rather often technology leaders and policymakers either have conflicting interests or collaborate too late. To be responsible, business leaders must support their societies and policymakers in making regulations in the interest of the common good. At Milestone Systems, we are actively looking at how we develop our software responsibly, how our partners responsibly sell our software, and very importantly, how our customers use our software with a responsible mindset. Ensuring good corporate governance As a long-time partner within the security industry, we’re celebrating our 25th Anniversary this year, we are supporting the regulation of video technology for the good of society. However, it of course needs to strike the fine line between the right legislation and not hindering innovation. UNGP The UNGP is the most authoritative and widely adopted set of principles for responsible business At Milestone Systems, we want to play an active role in this and that is why we have pledged our support to the UN's Guiding Principles on Business and Human Rights (UNGP). The UNGP is the most authoritative and widely adopted set of principles for responsible business. The principles call on governments and companies to identify, prevent, mitigate, and remedy actual and potential human rights abuses. Since its launch in 2011, the UNGPs have received wide support from states, civil society organisations, and the private sector, making them the key global foundation for business and human rights. Protect, respect, and remedy Through this commitment, we are taking steps to ensure good corporate governance and ethical standards in the development of our technology. We're generating mechanisms to prevent misuse and we are building educational practices internally. Based on the UNGP’s three pillars: protect, respect, and remedy, we are developing a set of Responsible Technology Principles and procedures for the development, selling, and use of our products. Need for video technology regulation In addition, we are currently evaluating all the various technology areas in which our video software can be used, such as with third-party integrations that utilise e.g., facial recognition. We are mapping out the advantages and disadvantages for societies. One key area of concern is how local authorities are mapping and storing data about us as individuals. This is the reason why we're inviting more legislation to regulate video technology rather than less. Engaging With policymakers We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard We are proactively reaching out to and connecting with policymakers and other relevant stakeholders to discuss our approach to and take on Responsible Technology and encouraging the political landscape to work with us around regulation and legislation. We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard and where we can openly weigh the advantages and the challenges of technology, whether it is video, facial recognition, machine learning, Artificial Intelligence, or other technologies. Striking a balance Implementing Responsible Technology is a journey, not a destination. To give it the focus needed, we have created a dedicated team to implement this initiative at Milestone Systems. At the same time, we are reaching out to the political landscape to discuss how we balance regulation without hindering innovation. Video technology used ethically We are a global company with worldwide operations, and we are having dialogues about how video technology is being used and how we can have meaningful talks about what regulation and legislation should look like. However, we don’t necessarily want to limit access to the technology itself. Facial recognition We encourage the policymakers to engage with us in the industry so that together we can strike the fine line Facial recognition is a great example of this. The EU is considering making live facial recognition illegal. That would be a huge inhibitor of proactive terrorism prevention. For example, if a well-known terrorist is walking down the street and is being mapped out against Interpol’s most wanted list, the authorities should be able to react. However, if a person walking down the street but is not mapped out or does not have any priors then the city should not be allowed to store the data of that individual’s whereabouts at that point in time. This potential legislation is concerning to me as a citizen of Europe. Instead, we encourage the policymakers to engage with us in the industry so that together we can strike the fine line for the better good of all of us. Maintaining high ethical standards We have a firm understanding and expectation that ethical standards are a huge driver in the security business. Citizens are not in favour of technology companies abusing data about them and monetising from things that they have not opted in to do. Soon, I think we will see many more companies and governments leaning toward suppliers that do have a responsible mindset and high ethical standards for partnerships. Ethical practices Our journey toward Responsible Technology is an ongoing process, and we must remain steadfast in our commitment to ethical practices and the protection of human rights. We recognise that the rapidly changing technological landscape continually presents new challenges and opportunities. For this reason, we continuously look into how we can improve, for example, our end user licence agreements to avoid potential human rights abuses. An industry responsibility Security companies must prioritise careful planning and preparation, including developing policies and procedures For Responsible Technology to truly become a reality, compliance with international human rights laws and data privacy regulations is critical. Security companies must prioritise careful planning and preparation, including developing policies and procedures that govern the ethical use of video surveillance systems. The secure and ethical community In today's technology environment where deep integrations, machine learning, and artificial intelligence are becoming the norm, Responsible Technology is more relevant than ever. The security industry has a unique opportunity to set an example for other sectors by promoting a secure and ethical development community that prioritises Responsible Technology, trustworthy data collection, and the protection of human rights. We must all rise to this challenge and embrace our role as ethical leaders for the greater good of both people and societies.
Inadequate security measures on your essential infrastructure can have severe consequences. Consequences Consider the rail industry: If a vandal cuts the cables on a vital mechanism that controls train signals, train safety is jeopardised. To avoid train collisions or derailments and thus significant damage to property and potential loss of life, the operating company must shut down the service until the infrastructure is repaired and the network is up and running again. The disruption affects the rail ecosystem itself, but also the people using the trains, the transportation of cargo, and more. The financial cost of repairing the damage, restoring signal functionality, and compensating for delays can be substantial. For another example, consider electrical substations: A fire or targeted attack can damage the system and lead to devastating power outages. Traditional surveillance limitations Traditional video surveillance has its limits when it comes to protecting transformer stations Traditional video surveillance has its limits when it comes to protecting transformer stations. The facilities are often located in rural areas, where straying animals or flying leaves trigger false alarms. 3D Surveillance solutions overcome these challenges by volumetrically securing the area and immediately detecting intruders only raising the alarm in the event of a human intruder and even identifying drone attacks. Protecting critical infrastructure with 3D surveillance Critical infrastructure must be monitored. It remains at risk if operators do not have systems for monitoring entire areas rather than just the periphery if security personnel has limited information in case of an intrusion and if security response protocols are not automated. 3D Surveillance solutions 3D Surveillance is an important tool for protecting critical infrastructure and ensuring the safety of those who rely on it. Integrating LiDAR technology, 3D Surveillance solutions provide a comprehensive view of the area being monitored with real-time monitoring and response, protecting critical infrastructure from damage and providing a more comprehensive security system. Advanced analytics and artificial intelligence Security personnel can identify and verify threats more easily and track the movements of individuals or vehicles, as well as respond to incidents as they happen. 3D Surveillance systems can be equipped with advanced analytics and artificial intelligence (AI) capabilities to detect patterns and anomalies that may indicate a potential threat. This can help to prevent potential attacks or accidents before they occur, as well as enable more accurate responses to incidents. Talent challenge Turning to autonomy by implementing sensor- and software-based solutions requires fewer if any, in-person patrols 3D Surveillance can also help tackle the talent challenge in the industry: Recruiting security professionals involves extensive background checks, and jobs in the industry are notorious for their low salaries, which results in high staff turnover. Turning to autonomy by implementing sensor- and software-based solutions requires fewer if any, in-person patrols and ensure reliable infrastructure protection. Additional security measures In many countries, more stringent legislation now mandates the implementation of additional security measures to safeguard critical infrastructure, particularly at a country's points of entry, such as airports and harbours. Protecting the perimeter is no longer enough. For instance, airport management must ensure that critical areas, including the space around aircraft and near unauthorised access points, are secure. While multi-layered screening of individuals at the perimeter is a valuable security measure, it must be complemented by smooth and efficient surveillance of the entire area, which can only be achieved through advanced technology. Different adoption rates 3D Surveillance technology is only beginning to gain traction in most locations, and adoption rates differ significantly from one region to another. For instance, Scandinavia and Eastern Europe have embraced 3D Surveillance to a greater extent than Western Europe. Regions with lower adoption rates will likely catch up as they seek to reinforce the security of their critical infrastructure, especially given the conflict in Eastern Europe. Vandalism and damage protection 3D Surveillance enhances the security of critical infrastructure, reduces the risk of downtime and loss of revenue 3D Surveillance offers reliable protection against vandalism and damage - major concerns for companies that rely on critical infrastructure. LiDAR-based, software-enhanced 3D Surveillance solutions provide real-time insights and enable automatic processing of the information so that operators can autonomously and quickly detect and respond to potential threats. These solutions are scalable and customisable, allowing companies to adapt their security measures to their unique needs and changing environments. 3D Surveillance enhances the security of critical infrastructure, reduces the risk of downtime and loss of revenue, and ensures compliance with regulatory requirements. Asset management and maintenance planning Beyond its security benefits, 3D Surveillance can help with tasks such as asset management and maintenance planning. It can help identify potential problems or maintenance needs before they become more serious issues by providing a real-time view of the monitored infrastructure. This can help to reduce downtime and keep critical infrastructure running smoothly. Real-time management The same technology can also perform volume monitoring tasks and thus facilitate the management of valuable resources such as bulk material, grain, wood chips, or chemicals. By scanning the stock 24/7 and automatically calculating stock volume updating records in real-time, this technology supports lean production systems and automated processing.
The security industry is going increasingly digital these days, with more small- and medium-sized businesses joining their global brethren by moving their data to the cloud, leveraging the benefits of artificial intelligence, and embracing more open solutions. Innovation is expected to continue at a rapid pace, thanks in part to the residual effects of the pandemic which has driven changes that might have otherwise taken five years or a decade or more to get into customers’ hands on a global scale. Let’s take a look at the trends that will dominate ISC West 2023. Improved analytics Analytics is about expedience, and in the surveillance world, it makes it possible to identify and search for the “who did it?” clip you need. For analytics, along with the cloud, it comes back to the core themes of being able to do more with technology Analytics also provides more actionable intelligence than a simple surveillance camera may provide, from identifying high-traffic areas during select times of the day and alerting staff to pay greater attention to these areas, to business intelligence that can enable a company to staff a store with more employees. For analytics, along with the cloud, it comes back to the core themes of being able to do more with technology and relying less on humans. Leveraging the cloud The cloud story is very related: it provides the ability to perform video-related tasks from anywhere on any device. In addition, the cloud makes it easier to share videos with other stakeholders and collaborate on investigations. By storing video on the cloud, end users reduce their total cost of ownership because they no longer have to invest in onsite storage solutions, while gaining greater storage capabilities and thereby future-proofing their solutions. Deployment patterns Because the cloud requires a less total cost of ownership and can be intuitive, it is driving interest in solutions Another interesting trend that we’ll be hearing more about this year is the overall deployment patterns of video surveillance systems. This is part of the cloud trend, but the broader trend is the amount of effort it takes to deploy, monitor and maintain the video surveillance system. Because the cloud requires less total cost of ownership and cloud access can be intuitive, it is driving interest for solutions that can be hosted in the cloud. Interoperability vs. proprietary Related to the debate of open vs. closed solutions is how much the surveillance market prefers a turnkey solution compared to a more custom best-of-breed and tailored solution. Smaller and mid-market companies will be more interested in the turnkey solutions provided by a single vendor, while enterprise-level companies traditionally gravitate toward investing in customised solutions that are more likely to address their unique security challenges. One other related trend to keep an eye on is the role of the integrator as part of the rise of cloud and Video Surveillance as a Service (VSaaS) offerings.
Security beat
Technology is driving new opportunities in the security industry. Innovation trends include artificial intelligence (AI), edge-based systems, mobile systems, a greater focus on software, and efforts to simplify operation of security systems, even as capabilities become more complex. ISC West 2022 reflected these changing trends. “In addition to emphasising technology innovation, ISC West also reflected an industry that is resilient, dedicated and passionate,” said Mary Beth Shaughnessy, the Event Director of ISC Security Events. ISC West 2022 “Almost 12,000 dealers, installers, integrators, end users and consultants reconnected at ISC West 2022, and there were nearly 20,000 total industry professionals in attendance (including manufacturers),” adds Mary Beth Shaughnessy. The 550 exhibitors and brands on display reflected an industry that has come through the COVID-19 pandemic in better shape than ever, poised for even greater success in the years ahead. Turning video and access control into knowledge Deployment of AI to ‘watch video’ can inform users of what’s happening in real-time Motorola Solutions emphasized several themes that were heard repeatedly throughout the show. “One trend is fulfilling the need to turn video and access control into sources of knowledge, inside the enterprise,” said John Kedzierzski, Motorola Solutions’ Senior Vice President of Video Security and Access Control. Deployment of AI to ‘watch video’ can inform users of what’s happening in real-time, while monitoring access control yields the equivalent of an operating system inside a building. Using the Cloud offers consumer ease-of-use to systems The second trend listed by Motorola Solutions is working to bring the consumer ease-of-use experience into enterprise security solution applications. Professional security systems were previously complicated to buy, install, manage and upgrade. However, using the Cloud, even distributed enterprises can bring consumer ease-of-use to systems, from improving the out-of-box installation experience to boosting the ability to manage the system. Transition to ‘mobile first’ interfaces The third trend emphasised by Motorola Solutions is transition to ‘mobile first’ interfaces, reflecting the need for busy security executives to be on-the-go, but with full access to their systems, without being chained to their desks. Since the last springtime ISC West show in 2019, Motorola Solutions has grown rapidly, both organically and through acquisition of IndigoVision, Pelco, Openpath, Envysion, and Ava Security. Cloud-based Orchestrate system Integration is simple through a ‘drag-and-drop’ approach that doesn’t involve writing code In addition, the company is making it easier to integrate video and access control systems with Motorola’s radio systems, typically carried by security guards. The cloud-based Orchestrate system translates ‘events’ from access control and video, to trigger notifications on a mobile radio. Integration is simple through a ‘drag-and-drop’ approach that doesn’t involve writing code. Simplifying implementation of AI Artificial Intelligence (AI) has traditionally been associated with the use of large servers or even intelligence in the Cloud. Several exhibitors at ISC West helped to change that misconception. For example, Oosto offers a simpler and more economical approach. They supply edge appliances for AI. The purpose-built Vision AI appliance, a small box, puts intelligence at the ‘near edge’, by connecting to up to five cameras. Easy and dependable ‘failover’ ensures redundancy without a big investment, and the system can work with any IP camera, including an end user’s installed base of cameras. Oosto’s TCO (total cost of ownership) calculator Oosto’s TCO (total cost of ownership) calculator spells out how much a customer can save versus using a big server, including lower costs such and power and cooling. AI was probably the biggest buzzword at ISC West, but there was also emphasis on the practical results of applying AI to physical security. Artificial Intelligence (AI) - the biggest buzzword at ISC West I believe our purpose is to bring buzzwords, like Cloud and AI together in a way that is useful to end-users" “What surprises me (at the show) is that there is a lot of generic marketing of AI, but we are trying to step back from our analytics and look at applications that serve certain end-users,” said Jeff Corrall, Vice President - Product Management at March Networks, adding “As an industry, we are still at the stage of AI as a buzzword.” Jeff Corrall further said, “I believe our purpose is to bring buzzwords, like Cloud and AI together in a way that is useful to end-users. We have to live with the buzzwords, but what we really want is to apply them. That creates a stickiness with the end-user — when high technology is making a difference.” March Networks Labs address specific end-user problems and then apply their systems to provide a solution. Jeff Corrall adds, “A lot of AI is responding to what the customer is asking for, and we are stepping back and making sure the end-user will use it on a consistent basis.” ‘Edge versus cloud’ was a common theme at ISC West Edge versus Cloud ‘Edge versus cloud’ was a common theme at ISC West, pondering where in a system the ‘intelligence’, such as AI and machine learning, as well as other functionality, should reside. Among the companies addressing the quandary was Axis Communications, which focused on the issue using a racing theme at their presentation to the industry press. The winner of the ‘race?’ - The combination of both approaches working together as a team, of course. AXIS Speed Monitor on exhibit One introduction at the show was the AXIS Speed Monitor, a speed detection app available using ACAP Axis Communications also highlighted the deep learning analytics of the ARPEC 8 camera chip (introduced during the COVID-19 pandemic), which will be deployed across their camera line. One introduction at the show was the AXIS Speed Monitor, a speed detection app available using ACAP (Axis Camera Application Platform), the capability to load ‘apps’ onto camera chips at the edge. They also introduced the D4100-E Network strobe siren (a smart edge device), the Audio Manager Pro (a cloud-based software system enabling zoning and callouts for specific areas in a building), the W101 body worn cameras with GPS capabilities, and a Barcode Reader for doorstop applications (another ACAP app). ‘App Store’ approach to expanding applications Azena is at the centre of expanding applications at the edge, promoting new applications through an ‘App Store’ approach that sells software apps that can be loaded onto cameras that are equipped with Azena’s operating system. In the last couple of years, the company (formerly known as Security and Safety Things) has expanded its offerings. There are currently 108 apps in the store from 30 to 40 app developers. There are 14 camera models (from six manufacturers) that are commercially available and run their operating system. The newest camera is a fisheye model from Vivotek. “What we have seen is that a lot of the use cases are pretty unique,” said Fabio Marti, Vice President - Marketing for Azena. Two examples are an application that monitors a flame to ensure it is burning cleanly (no smoke). Another system monitors nets covering fish farms to avoid birds getting tangled up in the nets. Fabio Marti said “A challenge is to find new business avenues for integrators. Everybody is not eager to look beyond their comfort zone.” Focusing on software to ensure user experience Software systems are one of the major focal points for innovation in security systems Software systems are one of the major focal points for innovation in security systems and Verkada is focusing on how software innovation can improve systems. “For decades, innovation was on the hardware front,” said Filip Kaliszan, Verkada’s Founder and Chief Executive Officer (CEO), adding “We saw an opportunity for more innovation on the software side. The customer experience revolves around software.” Ensuring an end-to-end experience “We want to guarantee an end-to-end experience,” adds Filip Kaliszan. As a new company with a ‘hybrid cloud’ approach, Verkada focused on appealing to end users to convince them of the value proposition. Once an end user was convinced, Verkada brought in an integrator partner to deliver the solution. In effect, Verkada finds demand and brings that demand to the integrator. Software-centric operation of a modern building Verkada is broadly focused on ‘software-centric operation of a modern building.’ After starting out in video, Verkada has since expanded into systems for access control, alarm systems, and other categories. They use a combination of third-party hardware and equipment that is custom designed to work seamlessly with their software systems. Verkada’s end goal is to put the various systems together into a platform. They will continue building each product category, which will eventually be unified into ‘the operating system for the building of the future.’
Artificial intelligence (AI) is more than a buzzword. AI is increasingly becoming part of our everyday lives, and a vital tool in the physical security industry. In 2020, AI received more attention than ever, and expanded the ways it can contribute value to physical security systems. This article will revisit some of those development at year-end, including links back to the originally published content. In the security market today, AI is expanding the use cases, making technologies more powerful and saving money on manpower costs - and today represents just the beginning of what AI can do for the industry. What it will never do, however, is completely take the place of humans in operating security systems. There is a limit to how much we are willing to turn over to machines - even the smartest ones. Beyond video analytics "Apply AI to security and now you have an incredibly powerful tool that allows you to operate proactively rather than reactively," said Jody Ross of AMAG Technology, one of our Expert Roundtable Panelists. AI made its initial splash in the physical security market by transforming the effectiveness of video analytics AI made its initial splash in the physical security market by transforming the effectiveness of video analytics. However, now there are many other applications, too, as addressed by our Expert Panel Roundtable in another article. Artificial intelligence (AI) and machine learning provide useful tools to make sense of massive amounts of Internet of Things (IoT) data. By helping to automate low-level decision-making, the technologies can make security operators more efficient. Biometrics with access control Intelligent capabilities can expand integration options such as increasing the use of biometrics with access control. AI can also help to monitor mechanics and processes. Intelligent systems can help end users understand building occupancy and traffic patterns and even to help enforce physical distancing. These are just a few of the possible uses of the technologies - in the end, the sky is the limit. AI is undoubtedly one of the bigger disrupters in the physical security industry, and adoption is growing at a rapid rate. And it’s not just about video analytics. Rather, it is data AI, which is completely untapped by the security industry. Bottom line: AI can change up your security game by automatically deciphering information to predict the future using a wide range of sources and data that have been collected, whether past, present, and future. That’s right. You can look into the future. Smarter perimeter protection Now, Intrusion Detection (Perimeter Protection) systems with cutting-edge, built-in AI algorithms to recognise a plethora of different object types, can distinguish objects of interest, thus significantly decreasing the false-positive intrusion rate. The more advanced AI-based systems enable the users to draw ROIs based on break-in points, areas of high-valuables, and any other preference to where alerts may be beneficial. AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store Similarly, AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store. The loitering time and region of interest are customisable in particular systems, which allows for a range of detection options. Smart security is advancing rapidly. As AI and 4K rise in adoption on smart video cameras, these higher video resolutions are driving the demand for more data to be stored on-camera. AI and smart video promise to extract greater insights from security video. Meeting urban needs Complex, extensive camera networks will already require a large amount of data storage, particularly if this is 24/7 monitoring from smart video-enabled devices. Newer edge computing will play an important role in capturing, collecting, and analysing data. There are many more types of cameras being used today, such as body cameras, dashboard cameras, and new Internet of Things (IoT) devices and sensors. Video data is so rich nowadays, you can analyse it and deduce a lot of valuable information in real-time, instead of post-event. In smart cities applications, the challenge of identifying both physical and invisible threats to meet urban citizens’ needs will demand a security response that is proactive, adaptable and dynamic. Optimise security solutions As we look ahead to the future of public safety, it’s clear that new technologies, driven by artificial intelligence (AI), can dramatically improve the effectiveness of today’s physical security space. For smart cities, the use of innovative AI and machine learning technologies have already started to help optimise security solutions. In sports stadium applications, AI’s role in getting fans and spectators back after the COVID pandemic is huge, through capabilities such as social distance monitoring, crowd scanning/metrics, facial recognition, fever detection, track and trace and providing behavioural analytics. Technologies such as AI-powered collaboration platforms now work alongside National Leagues, Franchises and Governing Bodies to implement AI surveillance software into their CCTV/surveillance cameras. AI surveillance software In many ways, it’s the equivalent of a neighbourhood watch programme made far more intelligent through the use of AI This is now creating a more collaborative effort from the operations team in stadiums, rather than purely security. AI surveillance software, when implemented into the surveillance cameras can be accessed by designated users on any device and on any browser platform. One of the biggest advantages of using AI technology is that it’s possible to integrate this intelligent software into building smarter, safer communities and cities. Essentially, this means developing a layered system that connects multiple sensors for the detection of visible and invisible threats. Integrated systems mean that threats can be detected and tracked, with onsite and law enforcement notified faster, and possibly before an assault begins to take place. In many ways, it’s the equivalent of a neighbourhood watch programme made far more intelligent through the use of AI. Fighting illicit trade Using technology in this way means that thousands of people can be screened seamlessly and quickly, without invading their civil liberties or privacy. AI’s ability to detect visible or invisible threats or behavioural anomalies will prove enormously valuable to many sectors across our global economy. Revolutionary AI-driven technologies can help to fight illicit trade across markets. AI technologies in this specific application promise to help build safer and more secure communities in the future. AI can support the ongoing fight against illicit trade on a global scale in a tangible way. For financial transactions at risk of fraud and money laundering, for example, tracking has become an increasing headache if done manually. As a solution to this labour-intensive process, AI technology can be trained to follow all the compliance rules and process a large number of documents - often billions of pages of documents - in a short period of time.
Axis Communications has introduced a body-worn camera solution, which the company says represents a natural extension of their corporate vision, business strategy and core competence. The new body-worn cameras and other elements of the system will provide Axis new opportunities to grow by tapping into existing and new customers. The fast-growing body-worn camera market is an attractive one, and Axis sees opportunities to extend the use of body-worn cameras beyond the current core market of police and corrections officers. Private security applications for the technology include healthcare, education, banking, public venues, retail, logistics, transportation and places of worship. The new body-worn camera system was designed with Axis partners and ecosystem in mind, says Martin Gren, Founder and Director of New Projects at Axis. “We try to make it fit with existing customers.” Deploying and using the system The new body-worn camera system was designed with Axis partners and ecosystem in mind Gren says the system is easy to deploy and use. The Axis W100 camera provides 1080p images, wide dynamic range (WDR) and has dual microphones, operating 12 hours on a single charge. GPS/GNSS global satellite navigation provides location, and a six-axis gyroscope and accelerometer offer additional data beyond the video image. For example, sensors might be triggered in some situations to initiate recording. One-bay (Axis W700) or eight-bay (Axis W701) docking stations enable high-speed supervised data offloading and battery charging, and a system controller (Axis W800) provides a central point for integration and management. Use of Zipstream compression technology saves on bandwidth and storage. Video cannot be accessed in the field, but only when a camera has been docked. There are many layers of security, and encryption protects all data used in the system from being accessed by outside agents. The USB interface cannot be connected to an ordinary computer but only to the docking station. Open standards Open standards ensure easy integration with video management systems and/or evidence management systems, whether on-premises or in the cloud. At the time of release, the Axis body-worn camera system is already integrated with Milestone XProtect, Genetec Security Center, and Axis Camera Station VMSs. It is also integrated with the Genetec Clearance cloud-based evidence management system. An application programming interface (API) will facilitate additional integrations over time. The body-worn cameras will be sold through the current Axis channels The body-worn cameras will be sold through the current Axis channels of distributors, systems integrators and resellers. The camera is part of the Axis “ecosystem,” which includes the company’s familiar network cameras as well as recent additions such as access control, network audio systems (including loud speakers), intercom door stations, a radar detector and other Internet of Things (IoT) devices. “The more things you integrate, the more value you add to customers,” said Gren. The new body-worn camera systems are core products for Axis; they are not made by another original equipment manufacturer (OEM) and merely sold under the Axis label. “When we decided to do body-worn cameras, OEMing was not an option,” said Gren. “Instead we took some experienced Axis engineers and a bunch of new ones to develop this product line to ensure the same Axis quality and compatibility.” Introducing the new product The body-worn camera system was unveiled remotely in a press conference webinar; the original plan was to introduce the new product at ISC West, which was cancelled to minimise spread of the novel coronavirus. In addition to announcing the new product, the Axis executives provided commentary and insight into the ongoing coronavirus crisis. “The security industry is a close-knit community that is connected in more ways than one,” said Fredrik Nilsson, Axis Vice President of the Americas. “We are all in this together. The industry has always exemplified resiliency, ingenuity and vision to address such challenges.” We are all in this together. The industry has always exemplified resiliency, ingenuity and vision" “There is some disruption in the Axis supply chain, but we have a broad partner-based supply chain when it comes to our sub-suppliers, our seven global CLCs (Configuration and Logistics Centers) and the distributors who keep inventory for integrators,” said Nilsson in the March 18th press call. “There is some stress on some components, but things are working relatively well under the circumstances. We are monitoring it on a day-to-day basis, but so far we have been able to hold things up very well.” Gren offered a comment on the possible use of thermal cameras (which Axis makes) to measure body temperature during the COVID-19 crisis: “When we designed our thermal cameras, that was a common question,” he said. “But in general, it is difficult to use a thermal camera to get an accurate reading. We have one model – the Q2901 – that is a temperature-accurate thermal camera, and if you look straight into the camera, it is accurate to around 1° F. However, there are more efficient ways to [measure temperature]. In general, it’s not a business application I would recommend.”
Case studies
Athena Security’s Concealed Weapons Detection System was selected by Champions Club Texas to protect patrons, members and staff at a first-of-its-kind hospitality destination in Houston that features a full-service hotel, lounge and bar with Southern-inspired cuisine and private-membership poker. Located in Houston’s expanding Westchase community, Champions Club Texas is celebrating its grand opening as a destination offering something for everyone, from business travellers seeking comfortable accommodations with well-appointed amenities to locals looking for a unique night out. Weapons detection system Athena's Concealed Weapons Detection System (WDS)/Walk Through Metal Detector is engineered to detect a wide range of mass casualty threats like handguns, shotguns, and rifles without requiring individuals to stop as they pass through the detector. There is no need to have individuals remove phones, wallets, or other extraneous items from their pockets due to the proprietary multiple-sensor detection method. The system adheres to Federal Standards while allowing both auditory and visual alert options, as seen in the best practices of Homeland Security for WDS. The concealed weapons detection system is designed to scan walking at an average speed of one person per second. Unintimidating approach Athena Security is a solution that detects weapons upon entry and is one of the many layers of security “At Champions we are raising the bar in hospitality and gaming, and that includes ensuring the most comfortable and safe atmosphere for our valued customers,” said Trent Touchstone, Director of Security, Champions Club Texas. “Athena Security is a solution that detects weapons upon entry and is one of the many layers of security protocols in place at Champions that improves operational efficiency of our security team as a workforce multiplier.” Athena Security’s low profile, unintimidating approach is a welcome differentiator from historic metal detector tech by eliminating the need to check cell phones and keys, allowing for a better flow into the venue. Modest-full time security team Advanced analytics and management protocols allow for deep visibility and flexibility to maintain staffing levels providing the highest level of safety. Touchstone, a 28-year veteran of the United States Marshals Service Chief with a long history of threat analysis, notes that given the hotel and membership club will require 24/7 attention with a modest-full time security team, he appreciates Athena Security’s ability to provide a feature-rich entryway security experience with the ability to automate and accomplish so much remotely.
Robots do monotonous workflows and less pleasant, repetitive tasks with brilliance. Combined with image processing, they become “seeing” and reliable supporters of humans. They are used in quality assurance to check components, help with the assembly and positioning of components, detect errors and deviations in production processes and thus increase the efficiency of entire production lines. An automobile manufacturer is taking advantage of this to improve the cycle time of its press lines. Together with the latter, VMT Vision Machine Technic Bildverarbeitungssysteme GmbH from Mannheim developed the robot-based 3D measuring system FrameSense for the fully automatic loading and unloading of containers. Pressed parts are thus safely and precisely inserted into or removed from containers. Four Ensenso 3D cameras from IDS Imaging Development Systems GmbH provide the basic data and thus the platform for process automation. Application The actual workflow that FrameSense is designed to automate is part of many manufacturing operations. A component comes out of a machine-here a press- and runs on a conveyor belt to a container. There it is stacked. As soon as the container is full, it is transported to the next production step, e.g., assembly into a vehicle. All these tasks are now to be taken over by a robot with a vision system-a technological challenge Up to now, employees have been responsible for loading the containers. This actually simple subtask is more complex than one might think at first glance. In addition to the actual insertion process, the first step is to determine the appropriate free space for the part. At the same time, any interfering factors, such as interlocks, must be removed and a general check of the “load box” for any defects must be carried out. All these tasks are now to be taken over by a robot with a vision system-a technological challenge. This is because the containers also come from different manufacturers, are of different types, and thus vary in some cases in their dimensions. Positioning of the components For their fully automatic loading and unloading, the position of several relevant features of the containers must be determined for a so-called multi-vector correction of the robot. The basis is a type, shape and position check of the respective container. This is the only way to ensure process-reliable and collision-free path guidance of the loading robot. All this has to be integrated into the existing production process. Time delays must be eliminated and the positioning of the components must be accurate to the millimetre. 3D point cloud These point clouds of all four sensors are combined for the subsequent evaluation To counter this, VMT uses four 3D cameras per system. The four sensors each record a part of the entire image field. This can consist of two containers, each measuring approximately 1.5 × 2 × 1.5 metres (D × W × H). Two of the cameras focus on one container. This results in data from two perspectives each for a higher information quality of the 3D point cloud. These point clouds of all four sensors are combined for the subsequent evaluation. In the process, registrations of relevant features of the container take place in Regions of Interest (ROIs) of the total point cloud. Interference contours Registration is the exact positioning of a feature using a model in all six degrees of freedom. In other ROIs, interference contours are searched for which could lead to collisions during loading. Finally, the overall picture is compared with a stored reference model. In this way, the containers can be simultaneously checked for their condition and position in a fully automated manner. Even deformed or slanted containers can be processed. All this information is also recorded for use in a quality management system where the condition of all containers can be traced. The calibration as well as the consolidation of the measurement data and their subsequent evaluation are carried out in a separate IPC (industrial computer) with screen visualisation, operating elements and connection to the respective robot control. Image processing solution The entire image processing takes place in the image processing software MSS developed by VMT The main result of the image processing solution is the multi-vector correction. In this way, the robot is adjusted to be able to insert the component at the next possible, suitable deposit position. Secondary results are error messages due to interfering edges or objects in the container that would prevent filling. Damaged containers that are in a generally poor condition can be detected and sorted out with the help of the data. The entire image processing takes place in the image processing software Multi-Sensor Systems (MSS) developed by VMT. FrameSense is designed to be easy to use and can also be converted to other components directly on site. Robust 3D camera system On the camera side, VMT relies on Ensenso 3D cameras-initially on the X36 model. The current expansion stage of FrameSense is equipped with the Ensenso C variant. The reasons for the change are mainly the better projector performance-thanks to a new projection process-as well as a higher recording speed. In addition, the Ensenso C enables a larger measuring volume. This is an important criterion for FrameSense, because the robot can only reach the containers to be filled up to a certain distance. The specifications of the Ensenso C thus correspond exactly to VMT's requirements, as project manager and technology manager Andreas Redekop explains: "High projector performance and resolution together with fast data processing were our main technical criteria when selecting the camera. The installation in a fixed housing was also an advantage.” Ensenso models Housing of a robust 3D camera system meets the requirements of protection class IP65/67 The Ensenso C addresses current challenges in the automation and robotics industry. Compared to other Ensenso models, it provides both 3D and RGB colour information. Customers thus benefit from even more meaningful image data. The housing of the robust 3D camera system meets the requirements of protection class IP65/67. It offers a resolution of 5 MP and is available with baselines from current to approx. 455 mm. This means that even large objects can be reliably detected. The camera is quick and easy to use and addresses primarily large-volume applications, e.g., in medical technology, logistics or factory automation. Outlook By automatically loading and unloading containers and the integrated 3D container inspection, manual workstations can be automated with the help of FrameSense. Against the background of the shortage of skilled workers, the system can thus make an important contribution to process automation in the automotive industry, among others. It meets the prevailing challenges of the industry. Ensenso C provides the crucial basis for data generation and exceeds the requirements of many applications. Lukas Neumann from Product Management sees their added value especially here: “The high projector power and large sensor resolutions are particularly advantageous in the field of intralogistics. Here, high-precision components have to be gripped from a great distance with a large measuring volume.” For other stacking or bin-picking applications in classic logistics, he could imagine a similar camera with high projector power but lower resolution and fast recording. So nothing stands in the way of further developments and automation solutions in conjunction with "seeing" robots.
Overview The largest city in the United Arab Emirates, is the epitome of a city where progress meets tradition. Since the inauguration of the 21st century, the city has rapidly grown, with iconic landmarks and business centres populating it. Known befittingly as the Global City, it is the most populous Emirate, and is home to 35,32,000 people as of 2022. As a part of the city’s metamorphosis into one of the prime international destinations, the visionary leaders of the city have developed a progressive transit system with a well-maintained roadway framework, ensuring seamless connectivity within the city’s perimeters. A significant part of ensuring a hassle-free commute in the city is the installation of an RFID-based electronic toll road system, enabling a continuous flow of traffic through toll gates. The challenge Government body had equipped the gantries with a network of cameras with the vision to surveil While the city has a top-notch public transit system, whose efficiency has been magnified with the automated toll system installed at the gantries, the government body of the city is cognizant of the fact that the security of the citizens is paramount. To complement its modern toll system, the city needed a surveillance system to ensure safety. Considering this, almost a decade earlier, the government body had equipped the gantries with a network of cameras with the vision to surveil the traffic conditions and vehicle movement in the area. Video surveillance solution However, the existing surveillance solution, with its limited surveillance and low-resolution video feeds, fell short of the city’s requirements. The inadequate data storage capacity further augmented the issue, often causing slow investigations of critical scenarios. As a result, the city decided to undertake a major security upgrade by demanding a video surveillance solution that is resilient, scalable, and has proven expertise in monitoring the traffic of urban landscapes. Further, with the rapid increase in traffic density, it became pertinent for the city to deploy a surveillance solution that empowers operators located across the city to be able to not only access surveillance data round the clock but also provide them a framework to communicate and collaborate interdepartmentally, adding another layer of security to the schema. The solution Videonetics and Vantage Security collaborated to design an intelligent and surveillance solution In an effort to enhance security measures at toll gantries, decision-makers recognised the opportunity to upgrade the surveillance solution. They sought a system that would not only enable effective communication but also proactively monitor traffic across toll gantries. The industry’s pioneering brands, Videonetics and Vantage Security collaborated to design an intelligent and scalable surveillance solution to keep watchful eyes at toll gantries. The technology partnership between these companies resulted in a bespoke and modular AI-powered unified solution that encompassed an intelligent video management system (VMS) and ultra-high-definition network cameras. Key points of solution Advanced Surveillance Solution for Toll Gantries: The city’s government transport officials required an intelligent surveillance solution that could adapt to future needs and accommodate the city's growing number of vehicles. They prioritised an open platform that could support additional capabilities and applications over time. After a rigorous evaluation process, Videonetics and Vantage Security were chosen for the project. Sixteen toll gantries in the city are equipped with Vantage Ultra high-definition cameras, managed by Videonetics IVMS 3.0. This integrated solution provides 24/7 monitoring through a user-friendly interface and ensures easy accessibility to video data for operators and senior authorities. Enhanced Traffic Monitoring and Incident Recording: The implemented solution empowers control centre operators to monitor traffic activity, maintain traffic flow, and capture any adverse events occurring at toll gantries. The adaptive interface allows dynamic monitoring with swift navigation through the system using a map-based interface. Operators can simultaneously view live and recorded videos on a single display panel, ensuring no critical event is missed and investigations are expedited. The platform's data recovery framework with failover and redundancy features ensures uninterrupted access to critical information, even during unforeseen calamities. Streamlined Collaboration and Rapid Investigations: The unified surveillance solution offers significant advantages in investigations, streamlining the process and accelerating outcomes. Previously, investigators had to sift through extensive video data in separate systems to identify relevant information and suspects. With the platform's unified view, investigators can expedite their work by easily accessing all required data in one place. Additionally, the built-in chat engine facilitates seamless communication among active operators, allowing them to share camera views, events, and screen layouts. This feature enables effective collaboration and enhances the speed and efficiency of investigations. By implementing this advanced surveillance solution, the city’s toll gantries have significantly improved security measures while ensuring scalability and adaptability for future needs. The collaborative efforts of Videonetics and Vantage Security have resulted in an integrated system that enhances traffic monitoring, incident recording, and investigative capabilities, setting a new standard for toll gantry surveillance. The impact This case study examines the remarkable outcomes achieved through this technology The implementation of Videonetics and Vantage Security's unified solution has had a transformative impact on traffic monitoring at toll gantries. This case study examines the remarkable outcomes achieved through this technology, including real-time information for authorities, enhanced security levels, expedited investigations, improved response efficiency, and a more secure and efficient driving experience for residents and commuters. "Partnering with Videonetics to develop a unified solution for the city has been an enlightening and rich experience. With their dedication to continuous innovation and improvement, they have curated an Intelligent Video Management Solution, that, in combination with our powerful cameras, is primed to transform traffic management and surveillance in the one of the wealthiest cities of UAE," Prateek Verma, Sales Director-MEA Region, Vantage Integrated Security Solutions. Key points of impact Real-Time Traffic Monitoring and Enhanced Security: The unified solution provides authorities with real-time information on the traffic situation near toll gantries, enabling easy monitoring and management. By leveraging ultra-HD cameras with wider coverage and sharp details, the overall security level of toll gantries has significantly improved. Round-the-clock monitoring ensures prompt detection and response to potential security threats or incidents. The solution empowers authorities to take proactive measures and ensures a safer environment for all road users. Expedited Investigations and Improved Response Efficiency: The implementation of the unified solution has expedited investigations into incidents, leading to heightened situational awareness and improved response efficiency. Investigators can now access a unified view of all video data, eliminating the need to retrieve information from separate systems. This streamlined process enables quicker analysis of incidents, allowing authorities to take necessary actions promptly. The solution enhances the accuracy and efficiency of investigations, resulting in improved safety and security outcomes. Secure and Efficient Driving Experience: With live visualisation capabilities, operators can identify potential threats or emergencies and respond promptly. The advanced surveillance technology provides a more secure and efficient driving experience for residents and commuters. The presence of the unified solution reassures road users that their safety is prioritised, instilling confidence in the overall transportation infrastructure. The solution's capabilities contribute to smoother traffic flow, reducing congestion, and enhancing the overall driving experience. Future-proof Investment through Flexibility and Scalability: The open and modular architecture of the solution enables seamless integration of additional sub-systems and applications, making traffic management even more robust. Its flexibility and scalability ensure that the surveillance system can adapt to future requirements and technological advancements, making it a future-proof investment for the authorities. The solution can evolve alongside the city's growth and changing traffic patterns, providing long-term value and sustainability. The implementation of the unified surveillance solution has revolutionised traffic monitoring at toll gantries of the city. The outcomes include real-time information for authorities, enhanced security levels, expedited investigations, improved response efficiency, and an overall secure and efficient driving experience. With its future-proof design, the solution ensures that the city’s toll gantries are equipped with advanced technology to meet evolving needs and ensure the safety of road users.
The ever-increasing number of shoplifting incidents is forcing retailers to turn to facial biometrics as a security measure. This has yielded impressive results: store owners confirm that such security systems identify thieves by their faces and cite a reduction in theft-related losses between 50 and 90%. Modern facial recognition systems employ advanced algorithms that both ensure data privacy and adhere to international GDPR. Retail theft and robberies Retail store managers have noted a recent rise in thefts and robberies. As reported by Charged, a British retail news outlet, this disturbing trend emerged in 2018-2019 and has since evolved into a pressing issue. Interestingly, the rise in shoplifting incidents coincides with a broader surge in crime rates, as independent research portal Numbeo assigns a "high" rating to this metric in many Latin American cities. Retail security survey 82% of respondents mentioned intensification in the ferocity of attacks and the involvement of weapons The increase in retail attacks, as well as a growing level of aggression from organised groups, is prompting widespread concern. The 2021 "Retail Security Survey: The State of National Retail Security and Organised Retail Crime" report by the National Retail Federation provides some alarming statistics. According to the report, 64% of respondents observed a surge in losses from organised criminal groups since 2016, while 53% reported an escalation/increase in theft. What is more, 82% of respondents mentioned intensification in the ferocity of attacks and the involvement of weapons. The average loss per theft The National Retail Federation approximates the average loss per theft incident in a store at $462, with organised robberies amounting to nearly $7,500. Furthermore, data from the British Retail Consortium, as reported by the Daily Mail, reveals an alarming increase in-store theft incidents, soaring from 3 million cases in 2016-2017 to 8 million in 2022. Delayed response Theft cases below a certain monetary value are often deemed low-priority and go uninvestigated The often delayed response of the police to shoplifting incidents leaves retail businesses vulnerable to theft. Store employees, wary of potentially armed perpetrators, avoid personally confronting suspects, while law enforcement personnel respond to incidents only after the criminals have already made their escape. Additionally, theft cases below a certain monetary value are often deemed low-priority and go uninvestigated. Latin America relies on biometric technologies Fortune Business Insights predicts the global facial recognition technology market to reach an impressive $13 billion by 2027, with a compound annual growth rate (CAGR) of 14.8%. The 3D recognition sector exhibits even swifter growth, with Market Research Future reporting a CAGR of 21.6%. Biometric technology development The Latin American biometrics market will hit a volume of $8 million by 2027-2028, with a CAGR of 17-22% However, it is Latin America that is considered the most favourable region for biometric technology development, with its biometrics market surpassing the global growth rate by far. Multiple research firms, including Inkwood Research, anticipate that the Latin American biometrics market will hit a volume of $8 million by 2027-2028, with a CAGR of 17-22%. Government investments Analysts identify Brazil, Mexico, and Argentina as key influencers in the regional development of biometric technologies. This trend is attributable to both governmental investments in initiatives like safe cities or digital identification, and private sector endeavours to mitigate the escalating crime rates. How facial recognition protects against theft A facial biometrics system installed in a major retail store chain prevents thousands of crimes Retailers are finding effective protection against growing losses through a combination of organisational protocols, staff training, and the adoption of ready-to-use security solutions, such as anti-theft systems, in-store surveillance, and biometric technologies. Facial recognition systems have proven to be highly effective in preventing theft and robberies. For example, according to the Daily Mail, a facial biometrics system installed in a major retail store chain prevents thousands of crimes each month. AI-based system Additionally, Charged disclosed that a local convenience store saw a staggering 90% reduction in losses following the installation of an AI-based system. Facial biometric systems assist security services in monitoring the store and promptly identifying any infractions. How it works Cameras installed in the store capture video footage, which the system then uses to extract facial images and create biometric profiles stored in a database. The system continuously cross-references real-time video data against the biometric profiles already cataloged in the database. In case a customer was previously involved in theft, vandalism, or similar incidents features on the "stop-list," the system notifies the security service, prompting closer monitoring of the said individual. Detect suspicious activities and alert By integrating facial biometrics with video analytics, the system can quickly detect suspicious activities and alert security personnel. The incorporation of facial biometrics helps to: Significantly reduce losses from theft, robbery, and vandalism, Improve the efficiency of security services, Lessen the strain of manually sifting through footage from multiple cameras, Minimise the potential for human error in in-store security, Enhance interaction with customers by incorporating biometrics into marketing systems. Police departments also benefit from increased crime-solving rates, while retail industry professional associations can curb recurrent thefts by sharing "stop lists" and biometric data on criminal gangs and individual offenders. The security system project was a collaboration between Francaza, a Brazilian integrator, and RecFaces Brazilian Shopping Centre case study Jockey Plaza, a shopping centre in Curitiba, Brazil, implemented a comprehensive security system featuring video analytics and facial biometrics. This modern facility, spanning 200,000 square metres, accommodates 400 stores and 28 food establishments. The security system project was a collaboration between Francaza, a Brazilian integrator, and RecFaces, a facial biometrics solution developer. Id-Guard facial identification software To enhance the security of the shopping centre, automate security operations, and expedite crime investigations, they chose to employ RecFaces' Id-Guard facial identification software. Id-Guard seamlessly integrates with video surveillance and video analytics systems, offering biometric identification, real-time and retrospective face search within video streams, and stop listing capabilities. Saves time Implementation of Id-Guard saves security specialists time as they no longer have to spend hours" "The moment a person on the stop list enters the camera's field of view, the operator is immediately notified," says Cristiano J S Maffessoni, Francaza’s CIO. "Based on our experience, implementation of Id-Guard saves security specialists time as they no longer have to spend hours sifting through video footage when investigating incidents." 50% cut in shoplifting instances According to Cristiano J S Maffessoni, the payback period for the Jockey Plaza shopping centre project is less than 3 years thanks to a 50% cut in shoplifting instances, swift resolution of crimes, and increased efficiency of security services. The return on investment for biometric systems typically spans 1 to 3 years, depending on the crime rate in the vicinity of the shopping centre. To calculate effectiveness, it is necessary to evaluate the average loss per incident, the average number of similar incidents annually, and the incident reduction rate, generally fluctuating between 30% and 70%, based on the security service's efficacy. Ready-to-use biometric solutions Our solutions allow customers to identify offenders, instantly respond to incidents, and foster loyalty" Maria Kazhuro, RecFaces' BDM in Latin America, shares, "RecFaces has developed two lines of ready-to-use biometric solutions specifically designed for the security and retail sectors." "We've seen an immense demand for our ready-made solutions in Latin America, thanks to their quick and easy deployment on any equipment. Our solutions allow customers to identify offenders, instantly respond to incidents, conduct marketing research, and foster customer loyalty." Data storage method RecFaces' Id-Guard, a biometric ready-to-use solution, stores only biometric template feature vectors that cannot be reconstructed into facial images in its database. This data storage method adheres to international GDPR data protection regulations and is supplemented by AES-256 standard encryption mechanisms for critical data.
Round table discussion
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
The role of the integrator/installer in the physical security marketplace is shifting as technologies evolve and applications expand. Integrators are being faced with a need to augment their expertise both in a wider range of systems and deeper into the specifics of each increasingly complex technology. At the end of the day, it falls to the integrator/installer to ensure a system performs as promised, however much a consultant or even a manufacturer might be involved in the process. We asked this week’s Expert Panel Roundtable: How is the role of the security installer/integrator changing?
With 2023 well underway, it’s a good time to look back on what we learned in the tumultuous previous year. In the security marketplace, there was no shortage of technology developments and a few challenges that kept 2022 interesting, to say the least. But what can we learn from the past? We asked this week’s Expert Panel Roundtable: What changes had the biggest impact on the security marketplace in 2022?