Remote Possibilities

Using remote video surveillance reshapes physical security

A security guard doing his nightly rounds on the perimeter of a power plant encounters a car left in a restricted area outside the security fence. The driver is nowhere to be found. Is this a threat?

The guard takes a snapshot of the license plate on his smartphone, places the image in a secure directory that initiates a search of the license plate recognition database. When the license plate is found, it also brings up an image of the driver license associated with that vehicle. The command center forwards this information to the guard’s smartphone while he continues his tour and eventually locates the owner of the vehicle. He compares the driver license image to the person standing in front of him. If the two match, the security guard politely escorts the individual back to his car and sends him on his way. If the photo and the individual don’t match, or the command center has issued detention instruction because the person is on a watch list, the guard detains the individual until law enforcement arrives.

This flow of information between a central command center and the front lines is a prime example of remote video surveillance in action. The command center observes the video streaming from multiple locations and directs the attention of on-location staff to a particular event. Headquarters may provide additional video content analysis to the field and assist in an ongoing investigation while security in the field provides up-to-date intelligence about the situation as it unfolds.

As remote surveillance technology becomes ever more prevalent in applications ranging from city center security to mass transit safety, we’re seeing more security resources shifting from the command center out to the field. With robust wireless technology and advanced mobile devices, it’s now possible to stream high-quality video in real time to staff on the front lines.

Top Remote Surveillance Configurations

There are a variety of deployment options when it comes to capturing video remotely, storing and cataloguing it, and then displaying it on mobile devices. The three most popular are the managed/ hosted/virtualized approach, the central station automation platform, and the video management system.

  • Managed/hosted/virtualized approach. In this configuration, the video servers are housed in a private or public cloud, where they can be shared and virtualized for more cost-effective use of resources. Instead of dedicating servers just for surveillance, these same servers can be repurposed for other applications on the fly as video storage demands peak and ebb. It’s an elastic cost model because you pay a monthly fee based on actual usage. The advantage of the hosted solution is that your service provider is contractually bound to provide service levels that you may not have the internal resources to guarantee yourself. The agreement not only addresses quality of service and uptime requirements, but also data security, disaster recovery and other critical issues to ensure business continuity.
  • Central station automation platform. This type of remote surveillance solution is primarily event based. It integrates video surveillance with other physical security systems such as intrusion detection and door access control to help you verify that an actual event is taking place. This approach helps avoid any municipal-driven fines for responses to false alarms, which can be a boon to the bottom line. If the central station receives an alert indicating that there’s been motion detected or a door contact opened or other anomaly, the video cameras that are closest to the detected event can stream live images back to the station. The operator can then relay that video to security guards on patrol so that they have the critical situational awareness necessary to safely investigate the event further. The central station operator can also stream the video to company managers who can decide whether to call local law enforcement or handle the situation internally with security staff already on the premises.
  • Video management system. This is the most common remote surveillance solution for medium to large-scale operations with 100 or more cameras. In this case, the complex cataloguing of video and detailed search functions would be handled by an in-house central command center. It might include smart-search technology such as object-left-behind and video analytics that would incorporate such things as license plate capture and recognition systems. Video clips could be sent to mobile devices via email or text messages, allowing the remote security staff to click on a link to view the video stream. Or they could initiate a search of the video database or view a live feed from a particular camera directly on their mobile devices.

Are They Secure?

Security is a justified concern when it comes to streaming highly sensitive video. So it’s important to employ strict security protocols on the network itself as well as on the network cameras and remote mobile devices. The network—whether wired or wireless— should incorporate encryption of the video stream. Every port also should employ authentication techniques such as 802.1x protocol to prevent unauthorized access to the network, hijacking of the video to an unauthorized device or denial of service attacks on the network.

Camera manufacturers are currently taking steps to tighten security even further. The industry is moving toward network cameras that support public key infrastructure similar to those used for physical access control. Certificates and credential verification will be used not only to determine who can remotely access and manipulate the network cameras but also who will be authorized to view that video on their mobile devices. Employing this kind of identity verification process will virtually eliminate the possibility of video hijacking.

Does Remote Streaming Hog Bandwidth?

Another concern that security professionals often raise is in regard to bandwidth consumption. Can the network really handle video traffic streaming to mobile devices without bringing other network activity to a standstill?

The answer is yes.

Because of their small-screen form factors, mobile devices don’t require much bandwidth to render a decent video image. With such a small display, you can actually stream video at a lower frame rate and still have the eye perceive the video as running in near real time. The other thing to consider is that your video management system—whether an in-house system or hosted by a service provider—is smart enough to control the transmission to minimize bandwidth consumption. When there’s limited bandwidth available for video traffic on the network, the video management system can throttle back the frame rate and image resolution on the fly and still provide an adequate stream to the mobile device.

Making a Difference Remotely

Remote surveillance has become a force multiplier for many security situations—from screening and apprehending criminals at venue checkpoints to validating alarms and verifying the identities of after-hours intruders at a retail store or warehouse. They can help track down stolen objects by streaming video to security guards of any activity occurring during the estimated window of opportunity to help focus the investigation. But there are also some amazing out-of-the-box applications where remote video surveillance has saved lives and livelihoods.

  • Medical emergency. Sirens blaring, EMTs rush to the aid of a man suspected of having a stroke. His life hangs in the balance as the ambulance speeds to the nearest hospital some 30 minutes away. As paramedics hook him up to life support, network cameras inside the ambulance are transmitting high-resolution video and vital signs to the emergency doctor on call at the hospital. He quickly triages the patient, confirms their initial diagnosis that the patient was experiencing a stroke, and directs EMTs to administer lifesaving medication. Because of the remote surveillance, first responders are able to avert irreparable brain damage and save the patient’s life in transit. Treatment continues once the man arrives at the emergency room, and he achieves a full recovery.
  • Troubleshooting production line. Manufacturing downtime can cost a company thousands of dollars a minute. So getting the production line back up and running as quickly as possible is paramount. For companies operating multiple remote manufacturing plants, it’s often more cost-effective to locate highly paid support specialists in the home office rather than fly them to a site or hire a full-time expert for each facility. With network cameras strategically deployed on the manufacturing floors, troubleshooters at headquarters can view live video, remotely diagnose a problem, and help in-factory staff resolve it themselves.

For instance, from the surveillance command center the support technician accesses the cameras with the best field of view of the situation, zooming in for a closer look at the warning lights flashing on a control panel. He sends the appropriate schematics and tutorial repair videos to the staff on the ground, talking them through the steps they need to take to fix the problem. Monitoring the live video streaming from the remote cameras, the technician can verify and correct local staff activity in real time to minimize delays in getting the machinery up and running again.

The Increasing Role of Mobile Devices

Mobile devices have become key components of remote surveillance— not only to provide enhanced situation awareness with real-time display and camera control but also to deliver safety and operations information about the resilience of your business. Multiple mobile industry reports predict a significant uptick in mobile device usage in the next five years. These reports forecast that by 2016:

  • Mobile broadband subscriptions will reach nearly 5 billion, mostly on HSPA, CDMA and LTE networks;
  • 75 percent of all physical security network video will be accessed via mobile devices;
  • Almost all smartphones will have touch screens;
  • Smartphone “digital wallets” will account for most in-store purchases made in the UK; the United States is expected to follow suit.

There is a caveat, however, when it comes to relying on the resilience of public and private networks for remote surveillance solutions. The Security Industry Association recently reported that “a surprise earthquake that hit the East Coast last summer not only interrupted cell phone service for millions of citizens, but an emergency cell phone service available only to select federal and municipal employees also failed.” So you should have a backup plan in place in case of catastrophic network disruption.

Shaping Security Remotely

Remote video surveillance balances the best of both worlds: the efficiencies of centralized storage and analysis with the immediacy of feet-on-the-ground investigation. While the command center can do a look-in on a particular location, it can also, more importantly, share information in real time with staff at local checkpoints while they’re in the field. The command center houses the processing power to expedite searches and perform data-intensive analysis. And operators can push those results to mobile devices in real time to provide critical insights to those onsite pursuing an investigation.

With today’s wired and wireless networks becoming ever more robust, capturing full-motion HDTV-quality video is quite doable. Intelligent video management technology helps to conserve bandwidth by streaming video to remote mobile devices at a reduced frame rate and lower resolution without compromising situational awareness.

Security protocols continue to evolve to protect video data on the network as it travels from network cameras to the command center to mobile devices. Implementing port authentication and soon-to-be-available certificate verification infrastructures will allow companies to credential users of their video surveillance system in much the same way they authorize employees to access other programs on their networks.

And finally, with heightened awareness of security threats, so many venues are promoting a campaign of “See something. Say something.” With strategic deployment of network cameras at a facility or event venue, when a bystander reports an incident, eyes on the target can help security verify the situation remotely and stream the evidence to staff on the ground so they can respond accordingly.

This article originally appeared in the February 2012 issue of Security Today.

Featured

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3