The New Mobility

Technological dreams come to life

The New MobilityWhen I was growing up, one of my favorite comic book characters was Dick Tracy—not the Warren Beatty variety— but the heroic police detective of Sunday newspaper comic strips. He had the coolest gadgets to fight crime. Perhaps the most widely remembered—and the coolest—was that video wristwatch. At the time, I could only imagine the possibilities and promise that such a futuristic technology could provide in the real world. Oh, to dream...

Not only has such innovative technology been invented, it’s now widely implemented with smartphones and apps, like Skype, that allow you to make a video call to anyone who has a similar setup on their end. That is practically everyone over six years old in the world these days. People everywhere are already communicating with mobile video like Dick Tracy and shooting high-quality video that they share with friends and strangers in a growing variety of ways.

What if the proliferation of smartphones was harnessed on a large scale for professional video surveillance and security devices? Virtually every smartphone on the market today has a megapixel camera embedded in it, which can conceivably be used to capture and transmit real-time video to a centralized station—and conversely be used as a remote portal to retrieve and view video from any security command center or other mobile device. In fact, the widespread use of smartphones for mainstream video surveillance applications is close to becoming a reality, which has significant implications for security professionals.

The Possibilities

Let’s break this down further and look at both possibilities: mobile image capture and image monitoring. The use of mobile cameras, such as wearable cameras or fixed-in vehicles, is definitely on the rise. We see such devices widely deployed by law enforcement and military personnel, in taxi cabs and school buses, aircraft and robotic drones. However, the vast majority of these applications are typically for image capture and transmission. Add smartphones to the equation and a whole new range of possibilities opens up for remote monitoring and even system control.

The migration to networked video surveillance has triggered thinking outside of conventional systems architecture spurred by the influx of both old-school IT pros and the new generation of computer-savvy technologists. The initial benefits defined for networked IP video surveillance and security systems were immediately apparent in terms of functionality, versatility and scalability. As an industry, we were actually behind the business products, consumer electronics and professional and broadcast video industries that had adapted network technology to increase the overall efficiency of their solutions. Though the video surveillance and security industry was simply slow to jump on the network bandwagon, we are catching up, rapidly.

Video management systems (VMS) have helped accelerate the migration from analog to networked system technology in the past few years. The improved overall performance and utility that VMS solutions deliver to professional security applications clearly eradicate any previous arguments in favor of legacy video control and switching systems. There is simply no longer a basis of comparison between VMS and analog video-control technologies by any standard of measure. As more applications continue to be developed by VMS suppliers and mobile technology partners, the use of smartphones to capture and monitor useable video images is in fact a reality. The network issues involving bandwidth limitations and ensuing frame rate transmission issues continue to fade away, opening up a whole new realm of possibilities.

For example, the continued emergence and deployment of public Wi- Fi makes accessibility to the Internet widespread and readily available. If you go beyond conventional definitions of a hard-wired networked system to include Wi-Fi connectivity, the potential to extend the coverage areas of a video surveillance system goes global. Virtually anyone with a smartphone can now contribute to maintaining a more secure environment. Accessibility privileges need to vary based on the user’s system and security parameters, but the prospect holds tremendous potential for law enforcement and security management.

Law Enforcement Application

Today, VMS mobile clients are available that employ GPS tracking to identify the locations of incoming video signals from smartphones. This bridge technology allows common smartphones to push live video to virtually any networkdriven video surveillance system.

The most obvious application is for law enforcement in metro areas. Public Wi-Fi systems can be enabled with the ability for citizens to directly push video to local police command centers. In addition to increasing response times with the ability to evaluate threat levels and the best form of response, these video feeds can provide documentation for ensuing investigations and prosecution. Then there’s the increased deterrent factor that has proven to help reduce common criminal activity. This is all achievable with existing technology that’s reliable, cost-effective and already in the hands of millions of people.

On a smaller scale, security guards could be armed with common smartphones to report and document activities, using video in real time without needing any special hardware or software. Video connectivity can be achieved through password-protected, wireless Ethernet that’s limited to specific interior and exterior boundaries. Video captured from conventional guard patrols also could be used to supplement general operations by documenting maintenance issues to help prevent liability issues.

Already, VMS solutions are available that provide remote access for viewing and even management capabilities. Samsung, for example, has been developing mobile solutions for professional security applications. Samsung’s iPOLiS mobile app provides the ability to view live streaming video, and control Samsung’s iPOLiS network video cameras and DVRs using either the iPhone or Android mobile platforms. The mobile app is password protected and can register up to 32 cameras supporting H.264/MJPEG formats. Samsungs’ mobile app puts access to video from Samsung’s cameras and DVRs in users’ hands, greatly expanding the overall functionality of Samsung video systems. The possibilities are endless.

Consider the scenario of a large gaming environment where security staff can now track a suspect across the casino floor, retail shops and surrounding grounds—using their smartphones. In addition to providing an inconspicuous monitoring device, security professionals can track every movement in real time while maintaining close cover. The same holds true for law enforcement and first responders who can use real-time video in activity coordination.

The practical use of smartphone and even tablet video surveillance is still being developed, but huge strides have been made in the past few years to bring their use as professional security tools to fruition. However, to revitalize now dated terminology, technology convergence is actually at its highest levels. Manufacturers are continually developing new image capture and mobile devices that deliver enhanced functionality and cost-efficiency partnering with best-in-breed software developers to innovate new integrated mobile video solutions. And they don’t have to be expensive, but efficient in providing new capabilities and solutions where none existed before.

This article originally appeared in the May 2013 issue of Security Today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3