Surveillance Warm Up

Thermal imaging technology is sued to keep perimeter security in top shape

THERMAL security cameras are imagers that see heat, or thermal energy, in an object. The human eye cannot detect thermal energy. This energy does not get to the retina because the eye’s lens and fluids absorb it. Thermal security cameras allow users to see what their eyes cannot—invisible heat radiation emitted by all objects regardless of lighting conditions. Thermal cameras form video pictures based on the small temperature differences between objects.

Thermal cameras are extremely effective security tools in any environment. The technology can readily detect intruders and other potential hazards.

Although there are other technologies available that can help users see at night, thermal camera technology has some distinct advantages. To understand the differences between the technologies available, users need to understand how each operate, and the inherent advantages and disadvantages.

Lights
The most common way facilities cope with the darkness of night is to install many powerful lights that generate enough visible light energy for daylight—or even lowlight—cameras to work.

The lights and camera combination has a number of disadvantages. TNot only is this combination expensive, but there are many areas—like waterfronts and wetlands—where the two are not practical. Obviously, lights have uses, they are effective and efficient in small areas, and they act as a deterrent. Whether lights actually help security professionals see anything with a daylight cameras is, at best, debatable.

Reflected Versus Emitted Light Energy
Humans can see reflected light. This is the light energy hitting something and bouncing off it, then received by a detector that turns it into an image. Infrared illuminated cameras, night vision devices and the human eye all work on the same basic principle. Unfortunately, the ability of a given detector—be it in an eyeball or a camera—to create images relates directly to the amount of light available.

At night, there isn’t much visible light to work with, so users are limited to what is provided by star light, moon light and artificial lights. If there isn’t enough, you can’t see. A common limitation for reflected visible light receptors is contrast. Like the eye, cameras create better images if an object has more of contrast compared to its background. If it doesn’t, you won’t see it. In other words, it’s Camouflaged. Camouflage is essentially just a way of decreasing the visible contrast between an object and its surroundings.

Night Vision Goggles
Night vision technology, whether used in goggles or as a discrete camera, works essentially the same way as any other visible light imaging system. Receptors magnify small amounts of visible light thousands of times so objects become visible at night.

But night vision systems have the same weakness as a regular TV camera—the dependance on visible, reflected light. Similarly, too much light can overwhelm the system, causing “bloom” and reduced effectiveness. Because night vision technology needs a minimum amount of light to work, conditions, such as heavy overcast and light fog, can severely limit effectiveness.

Infrared Illuminated Cameras
Infrared illuminated cameras also are sensitive to reflected light energy, just like an eye. As with other visible light imaging systems, infrared illuminated cameras starve for light at night and can’t make a usable image without help. The technology compensates by transmitting energy that reflects off the objects within the camera’s view and using those reflections to make a picture. Unfortunately, even reasonably powered illuminators are weak, resulting in severe range limitations. The range of performance relies on the reflected light energy limited by the strength of the energy being reflected.

Moreover, infrared illuminated cameras are far from covert. Any intruder equipped with a handheld camera can see where infrared illuminators are pointing, and approach in non-illuminated areas.

Going Thermal
Thermal security cameras don’t suffer from the limitations of visible light imaging: light availability and contrast. First, thermal cameras don’t need reflected light energy. The technology sees heat given off by objects. Everything you see normally creates heat energy—day and night, in good and bad weather.

Not only do warm-blooded creatures produce their own thermal energy, but in doing so, create contrast. What’s more, energy seen by thermal security cameras generally creates a better image at night than during the day. The cameras work during the day. As long as there is the smallest amount of temperature contrast between a target and its background, you can see it, but the technology is designed to work best at night.

Thermal security cameras are the only solution available today providing an affordable alternative to visible light imaging. Thermal cameras work day or night, require no special lighting or infrastructure, are not range-limited by sunlight, and have better contrast than visible light cameras. The technology also is immune to almost all forms of camouflage. With the advantages, thermal security cameras are a solution to any nighttime imaging problem.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.