Who Goes There?

IP video cameras enhance security and safety at petroleum processing facility

In an age of heightened security concerns, potentially vulnerable manufacturing and processing plants are re-evaluating their security systems and looking for new ways to protect assets. This is particularly true of expansive facilities handling vast amounts of volatile materials, as monitoring large, dimly lit areas has long been a security challenge.

When a petroleum processing facility came to Pacific Beach Tower looking for a video surveillance solution to cover sensitive and hard-to-monitor areas, officials did a walk-through security assessment and designed a system to tighten the facility’s security net.

Security officials solved the challenge of monitoring many acres of pipelines, storage tanks, equipment sheds, railways and gantries by strategically placing PTZ network cameras to watch over the facility’s sensitive, hardto- see areas 24/7. The Canon cameras were selected because of low-light capabilities and 40x optical zoom. By capturing images in low-light situations, security staff can be alerted and zoom in on suspicious activity from inside the security command center.

Put to the Test
Shortly after their installation, the cameras proved their value.

One night, a suspicious car drove into a remote corner of the facility and parked in a newly constructed parking lot with no lighting. Fortunately, the recently installed cameras revealed the presence of the vehicle and alerted security. In virtually no light -- no street lamps or other nearby lighting sources -- security was able to watch the suspects enter, observe their silhouettes moving around and provide critical information to help police make positive identifications.

The cameras were set up to record on motion detection, as this saves drive space and makes finding important video segments easier. The built-in, prerecord set-up, and the cameras’ robust software, provides the ability to capture video of the area three, five or even 10 seconds prior to the motion event.

In addition, motion detection and auto-tracking features enable users to designate up to four motion-detection areas, each with varying levels of sensitivity.

The cameras have the ability to track a subject’s movement following a motion event (indicated by a change in pixels) by automatically panning and tilting to keep the subject in the frame.

Although not used in this particular application, pre-recorded audio also can be set to play back on cue.

During the day, the cameras are monitored from a remote location to watch over all activity around the facility and ensure that workers and contractors comply with all regulations.

To keep images consistently looking sharp, the cameras use a Smart Shade Control that automatically adjusts contrast to compensate for backlit subjects.

This proved valuable in identifying and preventing a potential safety issue at the facility. Recently, one of the cameras captured someone breaking one of the rules, and the client was overheard calling the manager responsible for that person to notify them of the error.

The cameras also offer a number of other useful features in addition to its 40x optical zoom lens, such as image stabilization. The lens is equipped to automatically focus on the subject while quickly conforming to resolution.

The image stabilization feature helps keep images steady in locations prone to vibration, such as on towers or poles or next to rail tracks and hightraffic areas.

Sending Images Back to Base
The facility’s video security system is configured to transmit images captured by the on-site cameras wirelessly over a HauteSpot Networks router to an NVR. Images can be transmitted in both high-quality VGA-size -- 640x480 -- MPEG-4 and M-JPEG formats at a full 30 fps simultaneously without loss of frame rate. The cameras’ powerful hardware-based compression engine performs all encoding, encryption and transmission, while also enabling them to simultaneously distribute M-JPEG video in three sizes.

The router provides high data rates and superior throughput for data-intensive and latency-sensitive applications.

It can be configured to use either the “TDMA-like” protocol, which delivers unparalleled video streaming performance for the most demanding IP surveillance applications, layer-2 or layer-3 mesh, or standard 802.11.

Powering Up
The cameras can be powered with PoE -- via Cat-5 cable -- or DC. In this case, independent A-plus and A-minus lines were used so the cameras are on an uninterruptible power system and tied to the grid. This same power system also can be tied directly to solar panels.

The biggest consideration when marrying solar power with a camera and a wireless system is the efficiency of the products. Even when these cameras are actively running all PTZ and auto-focus servos at once they only draw about 6,000 milliwatts, which makes them very adaptable to alternative power options.

Safe, Secure and Happy
The petroleum facility is pleased with the high-quality results of their new networkbased video-surveillance system and the “live-looking” images it provides.

Clients are increasingly looking for real live-looking video in their surveillance solutions. The images on these cameras look really outstanding -- even when the NVR requires that settings be adjusted down.

This article originally appeared in the issue of .

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3