Surveillance Warm Up

Thermal imaging technology is sued to keep perimeter security in top shape

THERMAL security cameras are imagers that see heat, or thermal energy, in an object. The human eye cannot detect thermal energy. This energy does not get to the retina because the eye’s lens and fluids absorb it. Thermal security cameras allow users to see what their eyes cannot—invisible heat radiation emitted by all objects regardless of lighting conditions. Thermal cameras form video pictures based on the small temperature differences between objects.

Thermal cameras are extremely effective security tools in any environment. The technology can readily detect intruders and other potential hazards.

Although there are other technologies available that can help users see at night, thermal camera technology has some distinct advantages. To understand the differences between the technologies available, users need to understand how each operate, and the inherent advantages and disadvantages.

Lights
The most common way facilities cope with the darkness of night is to install many powerful lights that generate enough visible light energy for daylight—or even lowlight—cameras to work.

The lights and camera combination has a number of disadvantages. TNot only is this combination expensive, but there are many areas—like waterfronts and wetlands—where the two are not practical. Obviously, lights have uses, they are effective and efficient in small areas, and they act as a deterrent. Whether lights actually help security professionals see anything with a daylight cameras is, at best, debatable.

Reflected Versus Emitted Light Energy
Humans can see reflected light. This is the light energy hitting something and bouncing off it, then received by a detector that turns it into an image. Infrared illuminated cameras, night vision devices and the human eye all work on the same basic principle. Unfortunately, the ability of a given detector—be it in an eyeball or a camera—to create images relates directly to the amount of light available.

At night, there isn’t much visible light to work with, so users are limited to what is provided by star light, moon light and artificial lights. If there isn’t enough, you can’t see. A common limitation for reflected visible light receptors is contrast. Like the eye, cameras create better images if an object has more of contrast compared to its background. If it doesn’t, you won’t see it. In other words, it’s Camouflaged. Camouflage is essentially just a way of decreasing the visible contrast between an object and its surroundings.

Night Vision Goggles
Night vision technology, whether used in goggles or as a discrete camera, works essentially the same way as any other visible light imaging system. Receptors magnify small amounts of visible light thousands of times so objects become visible at night.

But night vision systems have the same weakness as a regular TV camera—the dependance on visible, reflected light. Similarly, too much light can overwhelm the system, causing “bloom” and reduced effectiveness. Because night vision technology needs a minimum amount of light to work, conditions, such as heavy overcast and light fog, can severely limit effectiveness.

Infrared Illuminated Cameras
Infrared illuminated cameras also are sensitive to reflected light energy, just like an eye. As with other visible light imaging systems, infrared illuminated cameras starve for light at night and can’t make a usable image without help. The technology compensates by transmitting energy that reflects off the objects within the camera’s view and using those reflections to make a picture. Unfortunately, even reasonably powered illuminators are weak, resulting in severe range limitations. The range of performance relies on the reflected light energy limited by the strength of the energy being reflected.

Moreover, infrared illuminated cameras are far from covert. Any intruder equipped with a handheld camera can see where infrared illuminators are pointing, and approach in non-illuminated areas.

Going Thermal
Thermal security cameras don’t suffer from the limitations of visible light imaging: light availability and contrast. First, thermal cameras don’t need reflected light energy. The technology sees heat given off by objects. Everything you see normally creates heat energy—day and night, in good and bad weather.

Not only do warm-blooded creatures produce their own thermal energy, but in doing so, create contrast. What’s more, energy seen by thermal security cameras generally creates a better image at night than during the day. The cameras work during the day. As long as there is the smallest amount of temperature contrast between a target and its background, you can see it, but the technology is designed to work best at night.

Thermal security cameras are the only solution available today providing an affordable alternative to visible light imaging. Thermal cameras work day or night, require no special lighting or infrastructure, are not range-limited by sunlight, and have better contrast than visible light cameras. The technology also is immune to almost all forms of camouflage. With the advantages, thermal security cameras are a solution to any nighttime imaging problem.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.