Security Technology Executive

SEP-OCT 2018

Issue link: https://securitytechnologyexecutive.epubxp.com/i/1030460

Contents of this Issue

Navigation

Page 39 of 59

40 SECURIT Y TECHNOLOGY E XECUTIVE • September/October 2018 • www. SecurityInfoWatch.com VIDEO TECH and it would pass this information off to other sen- sors as the "friend" moves throughout the property. This capability is typically referred to as "IFF" or "Identify Friend or Foe." Automated Response The use of geospatial data to aid in better identify- ing targets, displaying events and controlling sen- sors on its own is a valuable addition to any security system; however, these capabilities can all work to together and automate many tasks that previously required operator control. This now frees the opera- tor to assess the situation and coordinate a response. As an example, consider a very common intrusion at a perimeter, triggered by a fence sensor. Tradition- ally, such an alarm would require the security person to perform the following tasks: • Understand the location of the event as announced by the fence alarm • Determine the appropriate camera to interrogate the event's validity • Take control of the camera, • Steer it to the point of intrusion, adjusting the pan, tilt and zoom • Once the camera is viewing the event location, maneuver the camera to find the target that has likely moved, • Confirm it is a real event; a human or vehicle versus an animal or debris • Maintain control of the PTZ camera to monitor the continued movement of the target. • Communicate the details of the event to fellow officers to take action Through the use of geospatial capabilities just described; all these actions can be automated. The same event, when detected and responded to by a geospatial surveillance system, looks as follows: • The intrusion is detected by a fence sensor, which communicates location to the geospatial surveillance system. • The system automatically swings a PTZ camera to that location and triggers automatic camera following. • Using a variety of attributes, including geospa- tial data, the system classifies the target (human, animal, vehicle) with a level of confidence, and if is meets the alarm objectives, provides a visual indication of the event. • Understanding location and where the video image exists in map space, the system is then able to place the target on the map, including its target class and update its track in real time. • Once the target is confirmed and being tracked, an LRAD is then automatically steered to the intruder to provide a deterrent message. The deterrent message can then be changed to increase its urgency based on the location, direc- tion and speed of the intruder. • The system then identifies the location of the nearest guard via their GPS enabled radio, assigns them the alarm, provides an alarm over- view including image, video and location and • Steers the officer toward the direction of the event to apprehend the intruder. For much larger installations, the same type of geospatial system can provide expanded response capabilities, such as dispatching a drone to the exact location of an intrusion, finding the target and continuing to track until security personnel arrive; all achieved automatically through the sharing of geospatial / location data between the sensors and devices within the system. Forensic Capability Finally, the forensic value of a geospatial system can- not be overlooked. The ability to assign locations to events carries over into alarm searches and forensic efforts. Each alarm can be viewed at the location it occurred on the map. "Heat Maps" can also be created to show trends or anomalies. A geospatial GUI can About the author: Eric Olson is V ice President of Marketing at Phoenix-based v ideo analytics developer PureTech Systems (w w w. puretechsystems.com). He can be contacted at eric.olson@ puretechsystems.com or v ia t witter @puretechsystems. A Geospatial Surveillance System can allow for map- based activity searches

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - SEP-OCT 2018