Navigating the Wireless Waters

Mesh network powers security systems for port, city of Richmond, Calif.

Despite different needs for security, officials from both the port and city of Richmond, Calif., have turned to a technology that is becoming more common every day—an IP video surveillance network powered by wireless mesh technology.

Spread over 32 miles of shoreline, the more than 100- year-old Richmond port is the third busiest in the state with more than 19 million short tons of non-containerized products, including new cars from Kia and Hyundai and liquid bulk items. The port has 15 terminals, five owned by the city and 10 privately owned.

Just a few miles from the Golden Gate Bridge, the city of Richmond, now with more than 100,000 residents, grew up around the port, famed for the Kaiser ship yards that helped rebuild the U.S. Navy fleet during World War II.

That close relationship between the port and the city continued when both were looking for a security solution. City officials began searching for a solution to help combat a rising crime rate in 2006 and turned to a wireless mesh IP video surveillance solution from integrator ADT Security Services.

Monitoring the Port
While the city was beginning to work with ADT, port officials began to become interested in the technology, realizing the homeland security and other benefits a similar system could provide.

“Ports facilities from all over the country are working with the Department of Homeland Security to make ports safer,” said Jim Matzorkis, the Port of Richmond’s executive director. “It’s a huge undertaking for the nation. There are amazing amounts of cargo coming into seaports all over the country at many different locations. But this installation of security technology is a good, positive step forward.”

The main objective of the port’s system is to provide perimeter intrusion support while reducing crime and vandalism surrounding the facility.

And with a $2.5 million grant from DHS, the port tapped ADT to provide the system of 82 Axis IP cameras— 64 fixed and 18 PTZ—to monitor the port’s perimeters and facilities.

With a more than 15-square-mile area of coverage, the port officials said choosing a wireless network for the installation was easy. Beyond not having the cost of running fiber across such an expansive area, using wireless technology allows for easier expansion of the system, which has already been discussed.

Currently, there are 31 nodes in the network that feed the information from across the port back to a 71 TB data center at the port’s main office. The wireless system has more than 1 GB of backhaul, good enough to support the current usage and any expansion.

BelAir Networks provided the wireless mesh technology while backhaul support came from AW Networks. Other support came from Genius Vision’s video storage/management systems, and installation support was provided by Point 1.

Featured right along with the wireless mesh network is another up-and-coming technology—video analytics from Object Video.

Anchored by virtual tripwires across the perimeter of the facility, the analytics are designed to search for user-defined exceptions at the port, including loitering or someone jumping a fence. If an exception is found, an alarm event is created and the pan-tilt cameras give the system operator different views of the situation to determine whether security needs to be alerted.

While the PTZ cameras can zoom in on a object more than a mile away, the surveillance system also records all video, allowing a security operator to play back the event or send the information to personnel in the field.

Despite the movement to edge-based analytics, where rules and exceptions are processed at the camera, the port’s system is designed to send the video back to a centrally-based server. The server then processes the images.

Server-based analytics were chosen because of advances in bandwidth technology and the ease and cost savings of having the hub of the system centrally located.

“My whole issue is to keep everything located at a single box where the information can be administered,” said Jeff Gutierrez, a national accounts manager from ADT who helped design the system. “It’s really tough to go to a camera, go to a bucket truck and play with the camera. Instead, everything is in a single location. I want people in an office working on system instead of at the camera.”

The port’s system was up and running at full capacity in May. The network can be linked with the city’s system but is currently running separately.

Protecting the City
While the port and city system share similar technology, the reasons behind the two are vastly different.

Instead of coming directly from one particular need like the port, impetus for the city’s project came from different areas. Along with cutting down on crime and stopping graffiti, the cameras in Richmond are designed to tackle common urban issues like blight abatement and illegal dumping.

“We did realize that it was a single department that was going to own it,” Richmond City Manager Bill Lindsay said. “It was going to be a partnership between police, public works, information technology and the port, which had its own separate set of needs.”

The city’s system features 34 IP cameras (20 fixed and 14 PTZ) that are monitoring the city’s high-crime areas. With a more tricky landscape than the port’s open spaces, the wireless information is handled by 70 nodes. The city’s system cost $1.81 million and was funded by general funds from the city and the North Richmond Waste and Recovery Mitigation Fund.

Video from the cameras is monitored and recorded by the city’s police department. The second phase of the project, which will allow for transmission of video straight to patrol cars, is ongoing.

While wireless surveillance in public places is often a touchy subject, the city took a proactive approach in alleviating citizens’ concerns regarding privacy. Officials invited members from the ACLU into the oversight process, and police formed a citizen’s committee to introduce training and usage guidelines and policies.

Stressing that the system is not constantly monitored and that the analytics only alert police to a suspicious event helped ease many fears, city officials said.

“The impetus of the project came from the citizens themselves,” said Janet Schneider, assistant city manager. “They were the ones who wanted cameras and got the City Council behind that. There wasn’t initial resistance from the city. We’re a city with a lot of crime, and people felt that cameras could be a possible solution to that.”

Now that the initial system is up, officials said they are looking into plans for expansion, including bringing businesses into the fold by tying in private cameras into the overall network.

“What we will have when this is complete is a very strong backbone of a system that we can continue to build on, and that’s what we’re looking forward to doing,” Lindsay said. “Hopefully we’ll be adjusting and expanding to meet more functions in the community.”

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3