Veterans Memorial Service

Lisa Morris of Cedar Park, Texas, is the first to admit that she is far from being a security expert. There’s no doubt, however, that she is a loving mother and an extremely involved citizen. Her son, Army Spc. Matthew Morris, was among those Central Texas veterans who gave their life while serving in Operation Iraqi Freedom. In 2011, his mother, along with several other volunteers, joined forces with the Cedar Park Veterans Memorial Citizens Advisory Group to honor military veterans who have given their lives serving our country.

The group raised money to build the Cedar Park memorial that includes a sevenfoot, bronze-cast statue of a soldier inspired by Morris. The black granite column for the monument weighs approximately 15,000 pounds and has a gray granite base that is 12 feet in diameter with six-foot-tall panels. The statue is located in a somewhat secluded and natural wooded area of the memorial park. This makes the area quiet, but also vulnerable to vandalism and even theft.

On a mission, Morris and her team began making calls to local security companies to explain the location of the memorial and the unique environmental factors. What Morris found was initially disappointing.

However, after receiving a few similar proposals, the group found Austin-based Totus Solutions. Morris and the team of volunteers were then introduced to the company’s platforms. The platform is an all-in-one, outdoor lighting-based system that uses LED lighting, IP video surveillance, multi-day media storage, and an option of secure wireless communications. The platform’s IP-based cameras deliver complete situational awareness of any site they’re placed on, from memorial parks to public transit stations to construction sites. The technology means Morris and Veterans Park staff can successfully secure the memorial and circumvent traditional security systems’ flaws, where the cameras are ineffective because they are not pointed in the right direction or breaches in security are captured after the fact.

Not only does the technology have the ability to capture high-quality video of what’s happening at a location—using a 360-degree fisheye, three-megapixel hemispheric IP camera—but the system can also discourage unscrupulous behaviour with audio broadcasts and flashing lights. Totus calls this event-triggered piece of the security puzzle Active Deterrence. Miller calls the technology peace of mind.

Active Deterrence technology uses analytics-triggered lighting and audio to draw attention to an incident. It has continuous, 360-degree field of view and recording to capture video and still clips of on-site events. After park hours, the system is triggered by unwanted events inside a specified parameter or geo-fence. When events are detected, the Totus system flashes lights and plays a pre-recorded audio message such as, “The park is closed; you are under video surveillance.” If motion is detected and the individual proceeds, the event is escalated. The system continues, “Security has been called; video clips are being emailed to the police and city employees.”

A veteran himself, Bill Kreger, a senior consultant with systems integrator ASG Security, was honored to be involved in this project. He believes that the active deterrence capabilities of the system, as well as the 360-degree, IP cameras, made this system a clear choice.

Working with the Cedar Park Authority, Kreger determined the optimal viewing angles for the cameras. He wanted to clearly capture video of the stairway, the pedestal and the monument. The “open book” design of the technology allowed Kreger to precisely illuminate the areas that are most vulnerable with only two light-based systems. Along with Morris, Kreger was happy not to interfere with the carefully crafted aesthetics of the memorial. The IP cameras are powered by the embedded PoE network hub.

Kreger placed two surveillance platforms about 22 feet above the two main walkways to the memorial. He also positioned the system to keep a clear line of sight with the park’s pool house; Wi-Fi radios were used for wireless network connection to the city’s wide-area network. Kreger also installed an omni- directional wireless transceiver for sharing electronic data. Once the city was able to open the appropriate ports, images and video could be recorded and stored on the internal SD card, as well as sent over the secure network.

Another feature of the security platforms is that the lighting can be programmed to dim at night. And because they use LED technology, the lighting system saves up to 70 percent energy versus legacy streetlights. By setting the light-based system to 25 to 50 percent brightness at night, even remote areas have greater security and higher levels of protection.

“The 360-degree surveillance capability of Totus technology itself is like having 16 cameras in one, so we only needed two systems total,” Kreger said. “The software is designed to evaluate the picture and show it to be vertical and horizontal, depending on what section you want it to look at. You can tilt the image to whatever size you want, which just isn’t possible with other systems I’ve seen.”

Kreger and Morris are happy with the results of the security platforms to date. Although they realize warmer summer months ahead will translate to more activity at the park, with the technology in place they are hopeful and confident vandalism will be discouraged. Six months after the system has been up, no damage has been recorded at the monument site and the bronze soldier statue remains as it should—luminous and left in peace.

This article originally appeared in the June 2013 issue of Security Today.

Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”