Video Surveillance software - Expert commentary

Fighting Illicit Trade With Artificial Intelligence
Fighting Illicit Trade With Artificial Intelligence

AI has opened doors to many transformation opportunities and increasingly minimised many risks  -- personal and economic -- that are alarming today. And illicit trade is one of those pains AI can offer a promising solution against. Illicit trade is a serious threat and problem that affects governments and societies on every level. While governments lose financial funds in tax revenues, thriving businesses are losing potential customers, and customers are getting tricked into purchasing counterfeit, low-quality products. Transnational organized crime generates revenue of $2.2 trillion through transnational criminal organizations, complicit corrupt facilitators, and other threat areas. The list of criminal activities is long and involves such horrific crimes as trafficking of narcotics, opioids, arms, humans, fake medicines and other counterfeit and pirated goods; illegal tobacco and alcohol; illegally-harvested timber, wildlife, and fish; pillaged oil, diamonds, gold, and other natural resources and precious minerals; stolen antiquities; and other contraband or valuable items sold across streets, social media, online marketplaces, and the dark web. In short, illicit trade is a contributing cause to large-scale insecurity and instability across markets. AI-driven technologies Here is where revolutionary AI-driven technologies come in, with their capability to fight illicit trade across markets. AI technologies in this specific application promise to help build safer and more secure communities in the future. There are a few ways that AI can support the ongoing fight against illicit trade on a global scale in a tangible way. Transnational organized crime generates revenue of $2.2 trillion For financial transactions at risk of fraud and money laundering, tracking has become an increasing headache if done manually. As a solution to this labour-intensive process, AI technology can be trained to follow all the compliance rules and process a large number of documents -- often billions of pages of documents -- in a short period of time. Among these documents widely in circulation, most have an unstructured and inconsistent format -- from invoices to insurance documentation -- are a complex system to tackle; in this whirlwind of pages, the likelihood of non-compliant and misrepresented figures to go by unnoticed. But this is also where AI can thrive as solutions become a necessity, enhancing humans’ capabilities of identifying fraud risks in the early stages. Relying on natural language processing, the technology can begin interpreting the text from the scanned and digitised documents in order to process trade information at high speed. In this context, AI-powered solutions are capable of comparing, contrasting document information and identify anomalies worth looking into further. By automating a large portion of the process, AI-driven technology allows the staff to focus on more pressing, high-involvement issues that require human judgement while saving time on the time-consuming manual work of analyzing documents by hand. Identifying covert interactions between criminals As criminal networks become increasingly intricate in their illegal operations, cutting-edge AI technology is crucial in the battle against it. In 2019, EU launched a project with the goal to deploy advanced AI technology and robots to identify smuggling across the borders of Portugal, Estonia, Italy, Greece, Bulgaria, Romania and Hungary.  With the help of AI, it will be possible to send drones and autonomous vehicles to the most dubious border areas in order to enforce border control and detect smugglers quickly and efficiently. Illicit trade triggers a chain reaction of negative impact across industries, governments and individuals The issues the EU is trying to address through the project include drug and weapon smuggling, as well as human trafficking. From tight border control tracking crossings to communication monitoring to identify covert interactions between criminals on both sides of the border, the project is one among many that will expand the scope of solutions to the illicit trade problems today. AI’s contribution is significant on many levels: from predicting crime and threats to safeguarding public health and safety (in face of human trafficking, counterfeit medicines, and toxic products), these are simply inklings of major shifts that AI technology promises for the future of the battle against illicit trade. So why is fighting illicit trade so crucial? Here are a few reasons why AI’s role in fighting this global issue is crucial. In a world where customers run the risk of being deceived and tricked into buying counterfeit products, companies who provide the original products suffer through the loss of revenue and market share. The same companies are also robbed of their intellectual property and proprietary data. Furthermore, people who are employed in these companies run the risk of losing their jobs as a result of revenue and market share loss. And finally, the last straw is the loss of brand integrity and reputation to the need to compete with low-quality, sometimes even dangerous counterfeit products. Just like a domino effect, illicit trade triggers a chain reaction of negative impact across industries, governments and individuals. And it’s time for AI to step in and stop it.

Edge Computing, AI and Thermal Imaging – The Future of Smart Security
Edge Computing, AI and Thermal Imaging – The Future of Smart Security

Smart security is advancing rapidly. As AI and 4K rise in adoption on smart video cameras, these higher video resolutions are driving the demand for more data to be stored on-camera. AI and smart video promise to extract greater insights from security video. Complex, extensive camera networks will already require a large amount of data storage, particularly if this is 24/7 monitoring from smart video-enabled devices. With 4K-compliant cameras projected to make up over 24% of all network cameras shipped by 2023 – there is a fast-growing desire for reliable storage on-board security cameras. The question for businesses is: do they look to break up their existing smart video network, by separating and compartmentalising cameras to handle data requirements, or do they increase its storage capabilities? As some people begin to venture out and return to work following initial COVID-19 measures, we are also seeing demand for thermal imaging technology increase. New technology like this combined with more of these always-on systems being rolled out, means organizations will need to carefully consider their smart video strategy. Newer edge computing will play an important role in capturing, collecting, and analyzing data and there are some key trends you can expect to see as a result of this evolution. There are many more types of cameras being used today, such as body cameras, dashboard cameras, and new Internet of Things (IoT) devices and sensors. Video data is so rich nowadays, you can analyze it and deduce a lot of valuable information in real-time, instead of post-event. Edge computing and smart security As public cloud adoption grew, companies and organizations saw the platform as a centralized location for big data. However, recently there’s been opposition to that trend. Instead we are now seeing data processed at the edge, rather than in the cloud. There is one main reason for this change in preference: latency. Newer edge computing will play an important role in capturing, collecting, and analyzing data Latency is an important consideration when trying to carry out real-time pattern recognition. It’s very difficult for cameras to process data – 4K surveillance video recorded 24/7 – if it has to go back to a centralized data center hundreds of miles away. This data analysis needs to happen quickly in order to be timely and applicable to dynamic situations, such as public safety. By storing relevant data at the edge, AI inferencing can happen much faster. Doing so can lead to safer communities, more effective operations, and smarter infrastructure. UHD and storage AI-enabled applications and capabilities, such as pattern recognition, depend on high-definition resolutions such as 4K – also known as Ultra High Definition (UHD). This detailed data has a major impact on storage – both the capacity and speeds at which it needs to be written, and the network. Compared to HD, 4K video has much higher storage requirements and we even have 8K on the horizon. As we know, 4K video has four times the number of pixels as HD video. In addition, 4K compliant video supports 8, 10, and 12 bits per channel that translate to 24-, 30- or 36-bit color depth per pixel. A similar pattern holds for HD — more color using 24 bits or less color using 10 or 12 bits in color depth per pixel. Altogether, there is up to a 5.7x increase in bits generated by 4K vs. 1080 pixel video. Larger video files place new demands on data infrastructure for both video production and surveillance. Which means investing in data infrastructure becomes a key consideration when looking into smart security. Always-on connectivity Whether designing solutions that have limited connectivity or ultra-fast 5G capabilities, most smart security solutions need to operate 24/7, regardless of their environment. Yet, on occasion, the underlying hardware and software systems fail. In the event of this, it is important to establish a failover process to ensure continued operation or restore data after a failure, including everything from traffic control to sensors to camera feeds and more. Consider the example of a hospital with dozens or even over a hundred cameras connected to a centralized recorder via IP. If the Ethernet goes down, no video can be captured. Such an event could pose a serious threat to the safety and security of hospital patients and staff. For this reason, microSD cards are used in cameras to enable continuous recording. Software tools – powered by AI – can then “patch” missing data streams with the content captured on the card to ensure the video stream can be viewed chronologically with no content gaps. Thermal imaging Health and safety is the number one priority for all organizations as people return to work and public spaces. Some organizations are deploying thermal imaging to help screen individuals for symptoms as they return. Organizations that operate with warehouses, depots and assembly lines will traditionally have large amounts of cameras located outside of the entrance. With thermal imaging smart video in place, these cameras can now serve a dual purpose as a screening device. The thermal imaging technology is capable of detecting elevated body temperatures, with 10-25 workers being scanned in one shot, from one camera – making it an efficient and accurate process. This way, staff can use the information to help identify people who may need further screening, testing, and/or isolation before returning to work. There are many more types of cameras being used today, such as body cameras, dashboard cameras, and new Internet of Things (IoT) devices While this may not increase data storage requirements, it can change your retention policies and practices. Smart security today is about utilising AI and edge computing, to deliver an always-on, high-resolution video provision that can help keep people safe 24/7. These trends increase the demands and importance of monitoring, which means requirements of the supporting data infrastructure improve to match that, including the ability to proactively manage the infrastructure to help ensure reliable operation. Companies need to make sure they have considered all the storage and policy challenges as part of their smart security strategy for the future.  

The New Marriage Between AI and Stadiums
The New Marriage Between AI and Stadiums

Stadiums around the world are still paralyzed from the effects of COVID-19. Fans and spectators in masses have been absent from stadiums since April and there doesn’t seem to be a concrete plan on how or when they’ll be able to return to near capacity. The NBA recently opted to form a bubble philosophy concept in Disney’s facilities, although it’s been a relative success, it’s also been a $200 million temporary solution. This then begs the question: How long can stadiums survive like this without spectator’s present? History tells us that stadiums, venues and sport recover from disasters, so what can stadiums do to speed up the process? This is the catalyst for AI to be integrated on mass level to stadiums around the world. AI is the answer AI’s role in getting fans and spectators back is huge, through capabilities such as: Social Distance Monitoring Crowd Scanning/Metrics Facial Recognition Fever Detection Track & Trace Providing Behavioural Analytics Technologies such as IREX.ai is now working alongside National Leagues, Franchises and Governing Bodies to implement AI surveillance software into their CCTV/surveillance cameras. This is now creating a more collaborative effort from the operations team in stadiums, rather than purely security. Stadiums around the world are still paralyzed from the effects of COVID-19 AI surveillance software such as IREX.ai when implemented into the surveillance cameras can be accessed by designated users on any device and on any browser platform. Crowd metrics Arming stadiums with AI-powered surveillance tools can detect crowd metrics such as “people counting” and “group statistics”. This ensures stadium personnel can monitor social distancing with precision, accuracy and immediately. Alerts can be set up throughout parts of the stadium to alert senior staff members when overcrowding can appear with real time videos, analytics and photos to their hand-held device, such as a smartphone. Fever detection Thermal cameras have been implemented throughout facilities including stadiums and are helping assist to spot people with elevated temperatures. What IREX.ai implements is an alert system, coupled with facial recognition of any individual(s) that read an elevated body temperature. This alert system then provides security and health officials with a photo of the individual with the elevated body temperature, meaning staff can react quicker to the situation prevent this individual from entry. Pandemic monitoring by facial recognition  Thermal cameras have been implemented throughout facilities including stadiums and are helping assist to spot people with elevated temperatures Through facial recognition, staff members will be able to locate individuals through simply uploading a photo. It has never been easier to find a person of interest. With masks becoming an everyday part of society, facial recognition has come under scrutiny regarding the accuracy when a mask is worn. Irex.ai still maintains a 96% accuracy with individuals wearing masks and can set up alerts for any individuals not wearing a mask. Another important aspect of facial recognition is finding persons of interest quickly through technology like IREX.ai’s “searchveillance”. The future is here. Designated staff can track a person from when they enter the stadium by simply uploading their photograph. An example of how this can assist stadium personnel is to help relocate lost children inside the stadium with their guardians/parents when they are separated. Another attribute would be any individuals banned from entering the stadium would trigger alerts once they appear under surveillance, a fantastic collaborative tool to use with Law Enforcement.    Return on investment With security solutions, one of the biggest issues with any security investment is a lack of an ROI. This is where AI security is breaking the mould. The ability to provide business analytics, consumer/fan behaviours, traffic patterns, etc, allows other departments within the organization to gain vital information that can assist with their strategies and practices. Stadium security will never be the same in a post-COVID world, so why will its practices stay the same? AI & Stadiums is no longer the future, it’s the 2020 solution.

Latest PCSC news

PCSC And Coolfire Solutions Collaborate To Deliver Top-level Capabilities For Access And Security
PCSC And Coolfire Solutions Collaborate To Deliver Top-level Capabilities For Access And Security

PCSC, a designer and manufacturer of access control solutions and Coolfire Solutions, a St. Louis based software company known for creating Military-Grade situational awareness platforms, collaborate to deliver top-level capabilities for access and security. Coolfire Solutions created its innovative Ronin Platform to deliver software that sits on top of existing systems and infrastructure to transform data into actionable intelligence. Originally developed for the U.S. military, the Ronin Platform is being widely adopted by industry leaders and organizations who recognize the importance of placing the right data, in the right hands, in real-time, so that intelligent decisions can be made. LiNC-NXG PSIM System Stacking the Ronin Platform on top of the data provided by PCSC’s LiNC-NXG PSIM system provides a robust, real-time common operational pictureStacking the Ronin Platform on top of the data provided by PCSC’s LiNC-NXG physical security information management system provides a robust, real-time common operational picture, visually representing physical security events, and enabling a coordinated security response. For instance, urgent security related event details are pushed to mobile devices of nearby security officials for immediate action. An additional benefit, in the case of an on-premises environment, the underlying access management system is not exposed, only the top-level data is managed. Extend The Capabilities Of Access Solutions “An extremely impressive GUI for our industry and an actionable set of features extend the capabilities of PCSC’s access solutions for real-time response,” said Mas Kosaka, President and CEO of PCSC. “The expansion possibilities are virtually limitless too. We’re excited to debut the capabilities of Ronin to our Business Partners during the PCSC Symposium in conjunction with ISC West, the largest security industry trade show in the U.S.” Coolfire Solutions and PCSC have the experience and capabilities to transform the way security professionals do their job every day" “Coolfire Solutions and PCSC have the experience and capabilities to transform the way security professionals do their job every day. We can maximize the value of existing technology investments by combining data from any source and making it actionable," said Don Sharp, CEO at Coolfire Solutions. "Security professionals have an incredibly challenging job and it’s only getting tougher. By bringing all of their critical data onto a single pane of glass we can increase the level of security while driving significant operational efficiencies.”

Suprema To Globally Provide And Support BioConnect Identity Platform
Suprema To Globally Provide And Support BioConnect Identity Platform

The BioConnect Identity Platform provides an integration of Suprema's biometric solutions with the majority of leading access control systems BioConnect and Suprema have announced Suprema's launch of the BioConnect Identity Platform. Developed by BioConnect, Suprema's long-standing strategic partner in North America, the BioConnect Identity Platform provides an integration of Suprema's biometric solutions with majority of the leading access control systems in the global security market. Under the appointment, Suprema will provide and support the BioConnect Identity Platform globally from June 1st, 2016 onward. Powerful Integration FeaturesWith the BioConnect Identity Platform's powerful integration features and BioConnect's and Suprema's partner eco-systems, enterprises benefit from the ability to take advantage of deploying biometrics with their existing (or their choice of) access control vendor, standards, devices and way of operating. The BioConnect Identity Platform enables the seamless integration of Suprema's biometric terminals with access control systems, ERP and time and attendance systems, supporting biometric and multi-factor authentication, biometric enrollments and user ID management. One Central System The solution enables greater security, identity assurance and convenience from one central system and has ultimately changed the way that the physical access control market can consume biometrics as an authentication strategy. No other manufacturer around the world has been able to offer this level and quality of integrations - with the BioConnect Identity Platform boasting over 20. "With the BioConnect Identity Platform, BioConnect complements our goal of providing industry-leading biometric security solutions to the global market. The product is a ready-made bridge solution that provides easier integration of cutting-edge Suprema biometric technology together with a customer's choice of leading access control systems," said Young Moon, VP of Suprema. "We are looking forward to providing the BioConnect Identity Platform to a more global security market and are excited to offer our customers a seamless and cost-effective way of adopting Suprema's biometric security solutions," Moon added. Innovative Technologies From the perspective of the access control provider, the BioConnect Identity Platform opens up the option to provide a Suprema biometric solution and continue to benefit from the complete product line as Suprema brings new and innovative technologies to market. "As a Suprema partner we have experienced a lot of growth in the North American and UK markets due to its leadership and continued emphasis on producing biometric products of superior quality, versatility and range," said Steve Greb, Strategic Director of Business Development at BioConnect. "We're very excited to draw on Suprema's impressive partner network and continue to build out our Quest for Rightful Identity on a global scale." Integration With Leading Systems The BioConnect Identity Platform integrates the following leading access control systems with the Suprema biometric terminals; ACT ACTManage, AMAG Symmetry, Axis A1001, Brivo OnAir/OnSite, Genetec Security Center, IMRON IS2000, Lenel OnGuard, Open Options dnaFusion, Paxton Net2, Honeywell ProWatch, Honeywell WINPAK, RS2 AccessIT!, S2 Netbox, Software House CCURE 9000, Stanley SecureNET, Gallagher Command Centre and now PCSC LiNC-PLUS. Suprema and BioConnect will team together to showcase the BioConnect Identity Platform at IFSEC 2016 in London on June 21st-23rd at Stand E1400.

Do’s And Don’ts Of Managing Legacy Systems – Migration Better Than Rip-And-Replace For Enhancing Security Control System Functionality
Do’s And Don’ts Of Managing Legacy Systems – Migration Better Than Rip-And-Replace For Enhancing Security Control System Functionality

Systems may be reliable and performing as originally intended, but can also beoutdated in comparison to current technology offerings Let’s start by defining what a legacy system is in the context of a security control system. Legacy refers to an installed and operating security control system made up of numerous components, both hardware and software, that have been eclipsed by newer technologies. A shortage of parts and pieces may be creeping in, and it’s also likely the older stuff has a service tech scratching his head when faced with a configuration setting or data entry protocol. The newer technologies, however, may still be providing much of the desired functionality required by the legacy system user. Legacy in this context then is not necessarily a pejorative term. The system may be both reliable and performing as originally intended but is outdated in comparison to current technology offerings both from a communications standpoint and as it relates to applications and data mining. So what to do? For openers, as my dad would day, do a Ben Franklin list of do’s and don’ts. Naturally you’d love to move to a new, bigger or smaller, better and faster system. But, first, what does that list look like? I for one think is might begin to look like this: Things To Do When Managing Legacy Systems Do you have a handle on your current technology capabilities? Many legacy systems are underutilised and have features that are not used. Revisit your systems capabilities: You are likely to make some pleasant discoveries. Do you have a handle on your current technology capabilities? Many legacy systems are underutilized and have features that are not used Do you currently know how all of the pieces and parts in your system are currently communicating? A great start for planning the next steps is to understand the “plumbing.” Associated with that is the location of communication; specifically, how are things wired and where are they terminated, recorded and catalogued? What does your power distribution for the system components look like? Do you have backup and other means of maintaining operations during a loss of power, and where is that stuff? If not done recently, this step provides an opportunity to ensure you are ready for things that don’t happen and also to revisit codes. It’s always worthwhile if a maintenance provider is available to a system test in this area, or it can be self-conducted. What is the state of your record management, and when was the last time you did some basic housekeeping, such as backup and the like? If you don’t remember when you did it last, stop reading and go do some housekeeping — it’s clearly due now! What works for you and your organization, and what have you developed a work-around for? If your “super users” have found ways to manage desired system outcomes by some clever workaround, are there other desired features?  Do you have a relationship with an authorized service provider or an on-staff trained first responder? Do you have attic stock (stuff you own) to support those older components? I like to think of it like making a road trip with a spare tire and basics in the trunk in case an extended unplanned stop on the side of the road interrupts your trip. Have you developed a plan for an eventual upgrade? What’s first, what does it cost and whom will I let provide pricing to do so?  Rip-and-replace isn't your only option. There are many products and servicesavailable to migrate from a legacy to next steps utilizing embedded infrastructure Planning And Management What are my/your basic functional requirements, and where are the gaps now you must fill for enterprise sustainability? That legacy system likely has paid its way and now needs to be retired; I’m not ready either. Do you have a business case for this refresh – applications, data mining, new and reporting and risk mitigation strategies? If not, you are missing this first step of legacy migration planning and management. Managing the age includes a system exit strategy. Getting C suite, namely your CFO’s, attention is key; sustainability of your enterprise is 101, so functionality as it relates to risk mitigation is essential to keeping your entity flourishing. So What Are The DON’T’s? Don’t trivialize the migration or response to the Do’s or you’ll end up in a big To Do. Don’t minimize the relationship with existing integration resources you have worked with, old and new. Organizations evolve, some for the best, some not so. Refresh these relationships as well; resources are like bridges – you never know when a crossing is needed. Don’t rush into the latest and greatest; be wary of who’s definition you subscribe to. There’s a reason they call it the “cutting” edge. Don’t believe that rip-and-replace is your only option. There are many legacy systems in our industry, and many well-made and well-thought-out products and services are available to migrate from a legacy to next steps utilising embedded infrastructure. The bottom line: Define your parameters, select your partners and engage companies with a history of legacy migration and thought leadership. If your legacy includes some products with forward-thinking engineering thought leadership, you may be able to manage your needs with security control board-level replacements or the flashing of new firmware and upgrades to software. I‘m aware of several companies whose products elegantly move through time, adding new applications and functionality without wholesale rip-and-replace. These legacies carry on. The market has responded to you and others eager to know their options. There are many ingenious and clever ways to upgrade communications and transport of data, reliable mainstream products designed to meet this challenge head-on. There are solutions aimed at allowing you to use current IT and Internet of Things (IoT) apps and functionality. However, there are also quite a number of technology partners able help make the leap from analog to digital using existing pathways. The bottom line: Define your parameters, select your partners and engage companies with a history of legacy migration and thought leadership. They are most likely to produce the best results and allow you to leave behind the legacy you want to be associated with.

Related white papers

Market Report: Cannabis At A Glance

6 Questions To Ask When Choosing A Security System

Optimize Your Business with Analytics and AI