A big sign, stating: “Diamond theft hurts us all – Don’t do it”, is one of the first things visitors see when they arrive at the small airport of Oranjemund, Namibia.

Oranjemund, meaning mouth of the Orange River is situated in the far south western corner of Namibia. The town was established in 1936, following the discovery of diamonds on the north bank of the Orange River. Accessing the town is impossible without a special permit issued by the Namibian Ministry of Mines and Energy. Diamond theft is a big concern, for Oranjemund which is located within one of the richest diamond fields in the world. In order to prevent diamond theft, Namdeb has installed FLIR Systems thermal imaging cameras.

Oranjemund And Namdeb Diamond Corporation

Diamonds originated deep in the interior of Southern Africa. Over millennia, the Orange River carried them to the Atlantic Ocean where they were deposited on ancient beaches, which in time became part of the mainland.

Prior to the discovery of diamonds in the Namibian desert, some prospecting had taken place along the coast as early as 1863. In 1908, a railway worker Zacharia Lewala, stumbled on a shiny treasure that started a major diamond rush. As a result, diamond mining regulations were introduced in 1911 and the Sperrgebiet or “forbidden territory” was declared.

In 1920, Sir Ernest Oppenheimer formed Consolidated Diamond Mines of South West Africa (CDM). Oranjemund, a unique town that owes its existence to diamond mining, was established in 1936. It services the Mining Area 1 and Orange River mines.

In 1994, an agreement between CDM and the Government of the Republic of Namibia resulted in the formation of Namdeb Diamond Corporation (Pty) Limited. Namdeb Diamond Corporation (Pty) Limited is owned in equal shares by the Government of the Republic of Namibia and De Beers Centenary AG. Namdeb's predecessor, Consolidated Diamond Mines (CDM), was a wholly owned subsidiary of De Beers until 1994.

All of the De Beers group's existing Namibian mining licenses and related rights were replaced by a consolidated and rationalized mineral agreement, drawn up under Namibia's postindependence mineral legislation.

Different Mining Processes To Find Diamonds

Diamonds were formed at least 990 million years ago, although some are estimated to be as many as 4.25 billion years old, thereby pre-dating life on this planet.

Diamonds are formed at pressures of 45-60 kbar. This corresponds to a depth of 125-200 kilometers below the Earth’s surface where the pressure is around fifty thousand times that of atmospheric pressure at the Earth’s surface.

Different Ways Exist To Extract Diamonds:

  • Open-pit mining, where diamond deposits are on the surface of the ground - Underground mining, where diamond deposits are below ground
  • Alluvial Mining, where diamonds are extracted from alluvial deposits and are removed from sand, gravel and clay
  • Alluvial mining is undertaken by either coastal and inland mining where sand and soil are removed to find diamonds or by marine mining where diamonds are extracted from the seabed.

Alluvial Mining, Cleaning The Bedrock

Namdeb Diamond Corporation (Pty) Ltd. is the world’s leading alluvial diamond miner. It extracts diamonds from sand, gravel and clay using the open-pit method. The process involves removing the overlying ground and then extracting the diamonds.

The first step in the mining process is to remove the overburden – the surface material covering the diamonds. This can be up to 40m thick and can vary from loose sand to cemented conglomerate. Most of the ore is excavated by trackdozers and excavators. They create windows from which front-end loaders remove ground and place into haultrucks.

The bottom part is called bedrock. This underground is hard as a rock and it is the bed on which the diamonds were deposited by the river so many years ago, and resting. The bedrock is cleaned by workers using a containerised vacuum cleaning system.

FLIR SR-100 thermal camera is mounted in a stainless steel housing which protects it against harsh weather conditions alongside Namibian coast
Over 16 FLIR SR-100 cameras were installed to overlook the bedrock areas

Once excavated, the ore is transported to ore processing plants where it is crushed to pieces smaller than 150mm. A process of dense medium separation produces a diamond-rich concentrate from the crushed gravel. The final concentrate represents around 1% of the material originally fed to the plant. The concentrate is sent to a central recovery plant, which produces the final 100% diamond product.

Namdeb currently holds multiple mining licenses from which diamonds are recovered. The Mining Area No.1, Bogenfels and Elizabeth Bay Mining Licenses extend from the Orange River in the south to Lüderitz in the north of Namibia, and approximately 5.5 kilometers off shore in the Atlantic Ocean to approximately 20 to 35 kilometers inland. These areas generate the bulk of Namdeb's production.

Diamonds are very small and easy to conceal. Therefore making sure that as little as possible diamonds are being stolen is of the utmost concern to Namdeb.

Using Ingenious Methods To Steal Diamonds

“Diamond theft is serious issue”, explains Mr. Freddie Groenewald, Security Chief Technician at Namdeb, Oranjemund. “Our mines are very rich and produce stones of the highest quality. Most of our product is gem stone quality, used for jewelery, with only a very small percentage of industrial stones. Our mines are so rich that workers that are working on the bedrock, the bottom layer where the diamonds are situated, regularly spot diamonds with the naked eye. If a worker picks up a diamond and hands it over, Namdeb’s experts will determine the value of the stone and 70% of its value is given to the honest finder. This way we try to discourage theft. Nowhere else can a worker gain this amount of money for a precious stone.”

“Still, numerous people are trying to steal the diamonds. At first sight this seems unbelievable since at the “black market” they will only receive a small amount of the stone’s value. The problem is that workers are sometimes under pressure from criminal organizations to steal diamonds. Although strict security measurements are in place, they still try to steal using different methods. Since all people that come out of a secure area are scanned, various methods to conceal diamonds are used, for example hiding them in the heels of shoes or in work tools.”

Security At The Bedrock Area

“Needless to say, that the bedrock area is a critical area for security.”, explains Mr. Harold Schoeman, Security Senior Technician at Namdeb, Oranjemund. “We monitor the workers closely to see that they are not trying to take away diamonds. We have introduced movable wireless camera systems called “spider cameras” on the bedrock mining sites. These are small, movable CCTV cameras installed on the bedrock, close to the workers. We can zoom in and follow their activities from a centralized video monitoring facility. The camera systems have assisted us with good quality video footage, which are used as evidence in disciplinary actions and in court cases of diamond theft.”

Thermal Imaging Helps For Security During The Night

“The workers are aware that they are being monitored so they are careful of what they do. Sometimes they hide stones in a remote area of the bedrock area. Once it is dark, they will try to come back and pick up the diamonds. In order to avoid this we have installed thermal imaging cameras.”, says Mr. Groenewald. “We have installed mobile surveillance systems on all active bedrock sites. These systems include a FLIR Systems SR-100 thermal imaging camera.”

“There is not supposed to be any activity on the bedrock sites during night time and if anyone does try to access it in darkness to pick up diamonds, we see it immediately on one of our monitors. Since the cameras are installed on a pan/tilt head, we can follow the person while a security patrol is on the way to arrest him. The cameras do not help us only during the night. The area where we are mining is close to the sea and foggy conditions are not unusual. The thermal imaging cameras also help us to see through the fog.”

FLIR Systems SR-100 Cameras

PTZ-35x140 MS has the ability to zoom in and have a closer look at suspect activities which is perfect for Oranjemund, Namibia
FLIR thermal cameras are excellent tool for spotting activity in total darkness and in harsh weather conditions

“We recently purchased 16 FLIR Systems SR-100 cameras to overlook the bedrock areas. We had experience with other thermal imaging cameras in the past and were very much aware how thermal imaging can help us. We decided however to buy FLIR Systems thermal imaging cameras for various reasons.”, Mr. Groenewald continues.

“The FLIR Systems cameras contain a Vanadium Oxide detector and produce an excellent image on which the smallest of details can be seen. Since they are producing images with a frame rate of 9 Hz we did not need any export license to install them in Namibia. The 9 Hz images are not a problem for us and suit our needs perfectly. Furthermore, the cameras which we had installed previously contained a BST detector. In order to operate well, they contain an internal mechanical chopper that calibrates the image. This chopper was very susceptible to breakdowns. Each time we had to send a camera in for repair it was away for quite some time. By buying FLIR Systems material we are eliminating all these problems. We are convinced that we are getting excellent value for our money.”

Operating Under Climatically Harsh Conditions

“The cameras we are operating on the bedrock areas are operating in extremely harsh conditions. Not only are they installed close to the sea, which means they are susceptible to salt spray, they are also exposed to strong winds. It is like their housing is being sandblasted continuously.”, Mr. Groenewald continues. “Although the cameras are extremely well protected, we decided that they could use some extra protection in these conditions.”, explains Mr. Tinus Diedericks, Timeless Technologies FLIR Systems distributor in South Africa. “Therefore we have constructed “Stainless Steel 316” housing. The FLIR Systems SR-100 cameras are installed in the housing together with a CCTV camera which overlooks the bedrock during daytime. The housing containing the two cameras is installed on a pan/tilt which increases situational awareness and allows following people when necessary. ”

“To protect the lens of the SR-100 cameras we have installed an 8 mm thick germanium window. More than 99% of the infrared radiation transmits through it. The germanium window has been hardened with cobalt on the outside and has an anti-reflexive coating on the inside. This way we can assure a perfect image quality and extremely high protection of the thermal imaging cameras.”

Movable Systems

“The cameras and other equipment are powered by solar energy. A solar panel provides more than enough power to operate. Batteries, which can last up to 4 days, are being used as a back-up. The entire system has been installed on a small trailer. This way, Namdeb has the possibility to move it from one mining area to another. Once an area is mined out, they can easily move it to the next one without any problems.”, Mr. Diedericks explains.

Monitoring The Images In The Control Room

The control room where all the images of the different camera systems are coming in is in Oranjemund. Some mining areas, like e.g. Bogenfels, are more than 200 kilometers away from this control room.

“Thermal imaging cameras have proven their worth here in Oranjemund. They are an excellent tool for spotting activity in total darkness and in harsh weather conditions”, says continues Mr. Groenewald, Security Chief Technician at Namdeb, Oranjemund

“It works really simple!”, explains Mr. Diedericks. “The small spiders cameras installed on the bedrock are connected wireless to the station on which the thermal imaging cameras are installed. From this station, all signals are send wireless to a small local control room. This again allows for moving the cameras easily to a new location. A fiber optic cable goes from these control rooms to the main control room in Oranjemund. There the images of all cameras can be monitored and the cameras can be controlled.”

Monitoring The Entrance And Exit Of Mining Area 1

Not only the bedrocks are being monitored with thermal imaging cameras but also the exit and entrance to Mining Area 1 is being overlooked by a thermal imaging camera. All personnel and equipment that goes in or out, this area undergoes thorough security screening. When coming out of the area, everyone goes through an X-ray machine to check if they have not concealed diamonds. The entrance to Mining Area 1 is in the town of Oranjemund itself. Between the mining area and the town a “no-man’s land” has been created. In this “no-man’s land” dogs are patrolling continuously to make sure that no one tries to enter or leave the area in an unauthorized way.

FLIR Systems PTZ-35x140 MS Overlooks Critical Areas

“Although we also have other equipment in place, we monitor the entrance and exit to Mining Area 1 and the “no-man’s land” continuously with a FLIR Systems PTZ-35x140 MS thermal imaging camera.”, Mr. Groenewald continues. “The camera is installed on a high mast on which also our communication and other equipment are installed. During daytime, we can use the daylight camera installed in the PTZ-35x140 MS. When it gets dark we switch to thermal. The PTZ-35x140 MS has the ability to zoom in and have a closer look at suspect activities which is perfect for us.”

“One of the ways in which people are trying to get diamonds out of the mining area is by shooting crossbow arrows over the “no-man’s land”. The arrows are hollow and the inside is filled with diamonds. An accomplice picks up the arrows on the other side. Thanks to the PTZ-35x140 MS, we can now monitor, in total darkness and also in foggy conditions, what is happening alongside the fence. If we see people approaching and suspect illegal activity we send out a patrol. Since the PTZ-35x140 MS is mounted on a robust pan/ tilt mechanism, we can overlook an entire area and if necessary follow a suspect person so that he cannot get away.”

Advantages Of Thermal Imaging Compared To Fences Are Clear. More Projects Are Being Considered

“Thermal imaging cameras have proven their worth here in Oranjemund.”, continues Mr. Groenewald. “They are an excellent tool for spotting activity in total darkness and in harsh weather conditions.”

“Thermal imaging provides us with other options as well. At Namdeb we are trying to work in an ecological friendly way. If a mining area is mined out, we rehabilitate the area to its original state. Although sometimes fences are necessary, we try to avoid them as much as possible. We are investigating thermal imaging to further assist us with perimeter protection. This may reduce the civil works cost for expensive fencing options.”

Thermal Imaging For More Than Security Only

“With the advanced knowledge gained by working with thermal imaging cameras, I also want to use the technology for activities I do in my spare time.”, continues Mr. Groenewald. “Apart from being an amateur photographer I am technically assisting a scientist, Dr. Ingrid Wiesel, with the Brown Hyena Project. We are researching the behavior of this fascinating animal that lives in the Namibian dessert. We would like to install a small thermal imaging camera, in co-operation with Tinus Diedericks from Timeless Technologies, in front of one of the dens to see exactly what happens during the night. After all, for seeing what is going on in total darkness, for security or any other application, there is no better tool than a thermal imaging camera.”, Mr. Groenewald concludes.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version

In case you missed it

Security Technology And AI: A Powerful Duo In The Fight Against COVID-19
Security Technology And AI: A Powerful Duo In The Fight Against COVID-19

A person infected with the Coronavirus (COVID-19) infects an average of 2.5 other people within five days. You do not need to be a mathematician to realize that early detection of infected people is key to successful pandemic containment. The aim of effective containment strategies is therefore not so much to reduce the number of absolute cases as it is to extend the time frame within which they occur. Without effective containment measures, the virus spreads rapidly and is beyond the capacity of the health care system. However, if infection rates can be minimized through early detection and rapid, targeted identification of further infections, cases will continue to occur over a longer period of time and remain within the capacity of the health care system. Identifying, testing and results For example, the goal of many countries is to carry out as many Corona tests as possible to quickly identify infected people. It is then necessary to identify and reach potentially-infected people and isolate them in quarantine. This is a tried and tested procedure. But this method also costs valuable time in the fight against the virus and has many unknowns. The determination of a concrete test result alone sometimes takes up to 48 hours due to limited laboratory capacity. Added to this is the imprecise and slow procedure for determining contact persons. Or do you still remember exactly who and where you shook hands with in the last ten days - and could you provide information on this? Security technology to the rescue When it comes to the time factor, security technology can be a great help. Thermal imaging cameras and temperature sensors, for example, can help to detect a person with elevated body temperatures. Fever can also be one of the symptoms in those infected with the Coronavirus. At neuralgic points such as airports and train stations, or at entrances to hospitals, thermal imaging cameras can quickly reveal which people have fever. Presumably infected people can be easily separated and asked about other symptoms. Physical security technology can make a great contribution here. Dr. Frank Gillert, a professor at the University of Applied Sciences in Wildau, Germany states, however, as one of the leading scientists for logistics-centric security research, he demands "rapid innovation in dealing with situations like COVID-19 should be a priority". He sees enormous potential in the possibilities of IT and artificial intelligence; "We should use the disruptive changes that are currently taking place and that are challenging global orders to strengthen the significance in IT infrastructure development and also in security technology development.“ The goal in a global crisis And he is right: In global crises such as the Corona pandemic, security-related deficits become apparent and space is created for technical innovations. The goal of governments and companies is to restore security and save human lives as quickly as possible. The German data analytics powerhouse G2K, for example, has developed a Corona Detection & Containment System (CDCS) that is ready for immediate use in record time. Detection takes place in combination with AI-supported data analysis to specifically identify virus hotspots and distribution routes, as well as to identify other potentially infected persons. When developing the system, the focus was on two questions: How do I detect a suspected infected person in crowded environments and even more importantly, how do I quickly and comprehensively determine the person's contacts and previous whereabouts, and find correlations and patterns in this information? The data experts of the Berlin-based company found the answer in the combination of physical security technology and their existing data analytics platform. The G2K system The system is based on G2K's scalable IoT platform "Situational Awareness Builder" (SAB), which is already in use in several projects worldwide and sets standards in process automation and process optimization, including security management. As soon as a person with fever is detected by the system, he or she can be immediately screened to avoid contact with other people and thus prevent possible new infections, i.e. to interrupt the chain of infection. For this purpose, stationary thermal imaging cameras or smartphones equipped with a temperature sensor accessory can be used. The potentially infected person must now be registered and referred to a doctor or hospital for further specific diagnostic measures. The entire process is covered by a mobile G2K application. A combination of security and medicine The platform can bring together available hospital capacity, infection reports, movement and contact profiles and provide an excellent picture of the source of infection. Thus, medically necessary isolations can be implemented quickly. At the same time, infected patients can use the app to document their recovery and become actively involved. All this data is centrally managed and analysed, using deep learning methods. This provides crisis managers with a single monitoring, control and resource management tool that enables immediate action to be taken to combat the spread of the virus and gives officials full transparency on the status of the pandemic. Karsten Neugebauer, founder and CEO of the company behind the solution, explains his commitment as follows "A few weeks ago we too were faced with increasing difficulties due to the Corona crisis. As we have a strong presence in Europe in particular, we had to struggle with postponed project starts and limited resources". But instead of burying their heads in the sand, G2K's dedicated team decided to declare war on the virus." "In our entrepreneurial duty, we, therefore, decided to use our available technology and equip it to fight COVID-19. Our team has been working day and night over the last few weeks to expand our software platform to enable us to contain the pandemic quickly and effectively. Politicians must now immediately push ahead with the unbureaucratic implementation of prevention and control measures such as our CDCS to ensure the stability of our public systems," demands Karsten Neugebauer. The pandemic continues As the COVID-19 pandemic spreads from continent to continent, researchers around the world are working to develop antidotes to the virus. As long as this has not been found, the spread of the virus must be slowed down internationally. Only by this can system-relevant infrastructure be held consistently. Combining modern physical security technology with platform technology and artificial intelligence provides an excellent possibility to slow down the current and for sure, future pandemics.

Face Recognition: Privacy Concerns and Social Benefits
Face Recognition: Privacy Concerns and Social Benefits

News reports and opinion columns about face recognition are appearing everyday. To some of us, the term sounds overly intrusive. It even makes people shrink back into their seats or shake their head in disgust, picturing a present-day dystopia. Yet to others, face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crime. What are the facts about face recognition? Which side is right? Well, there is no definitive answer because, as with all powerful tools, it all depends on who uses it. Face recognition can, in fact, be used in an immoral or controversial manner. But, it can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence.  Concerns of facial recognition With the increased facial recognition applications, people’s concerns over the technology continuously appear throughout news channels and social media. Some of the concerns include: Privacy: Alex Perry of Mashable sums up his and most other peoples’ privacy concerns with face recognition technology when he wrote, “The first and most obvious reason why people are unhappy about facial recognition is that it's unpleasant by nature. Increasing government surveillance has been a hot-button issue for many, many years, and tech like Amazon's Rekognition software is only making the dystopian future feel even more real”. Accuracy: People are worried about the possibilities of inaccurate face detection, which could result in wrongful identification or criminalization. Awareness: Face recognition software allows the user to upload a picture of anyone, regardless of whether that person knows of it. An article posted on The Conversation states, “There is a lack of detailed and specific information as to how facial recognition is actually used. This means that we are not given the opportunity to consent to the recording, analyzing and storing of our images in databases. By denying us the opportunity to consent, we are denied choice and control over the use of our own images” Debunking concerns  The concerns with privacy, accuracy, and awareness are all legitimate and valid concerns. However, let us look at the facts and examine the reasons why face recognition, like any other technology, can be responsibly used: Privacy concerns: Unlike the fictional dystopian future where every action, even in one’s own home, is monitored by a centralized authority, the reality is that face recognition technology only helps the security guard monitoring public locations where security cameras are installed. There is fundamentally no difference between a human security guard at the door and an AI-based software in terms of recognizing people on watchlist and not recognizing those who are not. The only difference is that the AI-based face recognition software can do so at a higher speed and without fatigue. Face recognition software only recognizes faces that the user has put in the system, which is not every person on the planet, nor could it ever be. Accuracy concerns: It is true that first-generation face recognition systems have a large margin for error according to studies in 2014. However, as of 2020, the best face recognition systems are now around 99.8% accurate. New AI models are continuously being trained with larger, more relevant, more diverse and less biased datasets. The error margin found in face recognition software today is comparable to that of a person, and it will continue to decrease as we better understand the limitations, train increasingly better AI and deploy AI in more suitable settings. Awareness concerns: While not entirely comforting, the fact is that we are often being watched one way or another on a security camera. Informa showed that in 2014, 245 million cameras were active worldwide, this number jumped to 656 million in 2018 and is projected to nearly double in 2021. Security camera systems, like security guards, are local business and government’s precaution measures to minimize incidents such as shoplifting, car thefts, vandalism and violence. In other words, visitors to locations with security systems have tacitly agreed to the monitoring in exchange for using the service provided by those locations in safety, and visitors are indeed aware of the existence of security cameras. Face recognition software is only another layer of security, and anyone who is not a security threat is unlikely to be registered in the system without explicit consent. The benefits In August 2019, the NYPD used face recognition software to catch a rapist within 24 hours after the incident occurred. In April 2019, the Sichuan Provincial Public Security Department in China, found a 13-year-old girl using face recognition technology. The girl had gone missing in 2009, persuading many people that she would never be found again. Face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crimeIn the UK, the face recognition system helps Welsh police forces with the detection and prevention of crime. "For police it can help facilitate the identification process and it can reduce it to minutes and seconds," says Alexeis Garcia-Perez, a researcher on cybersecurity management at Coventry University. "They can identify someone in a short amount of time and in doing that they can minimize false arrests and other issues that the public will not see in a very positive way". In fact, nearly 60% Americans polled in 2019 accept the use of face recognition by law enforcement to enhance public safety. Forbes magazine states that “When people know they are being watched, they are less likely to commit crimes so the possibility of facial recognition technology being used could deter crime”. Saving time  One thing that all AI functions have been proven to achieve better results than manual security is speed. NBC News writes, “Nearly instantaneously, the program gives a list of potential matches loaded with information that can help him confirm the identity of the people he’s stopped - and whether they have any outstanding warrants. Previously, he’d have to let the person go or bring them in to be fingerprinted”. Facial recognition can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence With AI, instead of spending hours or days to sift through terabytes of video data, the security staff can locate a suspect within seconds. This time-saving benefit is essential to the overall security of any institution, for, in most security threat situations, time is of the utmost importance. Another way in which the technology saves time is its ability to enable employees (but not visitors) to open doors to their office in real-time with no badge, alleviating the bottleneck of forgotten badge, keycode or password. Saving money A truly high-performance AI software helps save money in many ways. First, if the face recognition software works with your pre-existing camera system, there is no need to replace cameras, hence saving cost on infrastructure. Second, AI alleviates much of the required manual security monitoring 24/7, as the technology will detect people of interest and automatically and timely alert the authorities. Third, by enhancing access authentication, employees save time and can maximize productivity in more important processes. The takeaway AI-enabled face recognition technology has a lot of benefits if used correctly. Can it be abused? Yes, like all tools that mankind has made from antiquity. Should it be deployed? The evidence indicates that the many benefits of this complex feature outweigh the small chance for abuse of power. It is not only a step in the right direction for the security industry but also for the overall impact on daily lives. It helps to make the world a safer place. 

Axis Expects Body-Worn Camera System to Expand the Technology Use Cases
Axis Expects Body-Worn Camera System to Expand the Technology Use Cases

Axis Communications has introduced a body-worn camera solution, which the company says represents a natural extension of their corporate vision, business strategy and core competence. The new body-worn cameras and other elements of the system will provide Axis new opportunities to grow by tapping into existing and new customers. The fast-growing body-worn camera market is an attractive one, and Axis sees opportunities to extend the use of body-worn cameras beyond the current core market of police and corrections officers. Private security applications for the technology include healthcare, education, banking, public venues, retail, logistics, transportation and places of worship. The new body-worn camera system was designed with Axis partners and ecosystem in mind, says Martin Gren, Founder and Director of New Projects at Axis. “We try to make it fit with existing customers.” Deploying and using the system The new body-worn camera system was designed with Axis partners and ecosystem in mind Gren says the system is easy to deploy and use. The Axis W100 camera provides 1080p images, wide dynamic range (WDR) and has dual microphones, operating 12 hours on a single charge. GPS/GNSS global satellite navigation provides location, and a six-axis gyroscope and accelerometer offer additional data beyond the video image. For example, sensors might be triggered in some situations to initiate recording.  One-bay (Axis W700) or eight-bay (Axis W701) docking stations enable high-speed supervised data offloading and battery charging, and a system controller (Axis W800) provides a central point for integration and management. Use of Zipstream compression technology saves on bandwidth and storage. Video cannot be accessed in the field, but only when a camera has been docked. There are many layers of security, and encryption protects all data used in the system from being accessed by outside agents. The USB interface cannot be connected to an ordinary computer but only to the docking station. Open standards Open standards ensure easy integration with video management systems and/or evidence management systems, whether on-premises or in the cloud. At the time of release, the Axis body-worn camera system is already integrated with Milestone XProtect, Genetec Security Center, and Axis Camera Station VMSs. It is also integrated with the Genetec Clearance cloud-based evidence management system. An application programming interface (API) will facilitate additional integrations over time.  The body-worn cameras will be sold through the current Axis channels The body-worn cameras will be sold through the current Axis channels of distributors, systems integrators and resellers. The camera is part of the Axis “ecosystem,” which includes the company’s familiar network cameras as well as recent additions such as access control, network audio systems (including loud speakers), intercom door stations, a radar detector and other Internet of Things (IoT) devices. “The more things you integrate, the more value you add to customers,” said Gren. The new body-worn camera systems are core products for Axis; they are not made by another original equipment manufacturer (OEM) and merely sold under the Axis label. “When we decided to do body-worn cameras, OEMing was not an option,” said Gren. “Instead we took some experienced Axis engineers and a bunch of new ones to develop this product line to ensure the same Axis quality and compatibility.” Introducing the new product The body-worn camera system was unveiled remotely in a press conference webinar; the original plan was to introduce the new product at ISC West, which was canceled to minimize spread of the novel coronavirus. In addition to announcing the new product, the Axis executives provided commentary and insight into the ongoing coronavirus crisis. “The security industry is a close-knit community that is connected in more ways than one,” said Fredrik Nilsson, Axis Vice President of the Americas. “We are all in this together. The industry has always exemplified resiliency, ingenuity and vision to address such challenges.” We are all in this together. The industry has always exemplified resiliency, ingenuity and vision" “There is some disruption in the Axis supply chain, but we have a broad partner-based supply chain when it comes to our sub-suppliers, our seven global CLCs (Configuration and Logistics Centers) and the distributors who keep inventory for integrators,” said Nilsson in the March 18th press call. “There is some stress on some components, but things are working relatively well under the circumstances. We are monitoring it on a day-to-day basis, but so far we have been able to hold things up very well.” Gren offered a comment on the possible use of thermal cameras (which Axis makes) to measure body temperature during the COVID-19 crisis: “When we designed our thermal cameras, that was a common question,” he said. “But in general, it is difficult to use a thermal camera to get an accurate reading. We have one model – the Q2901 – that is a temperature-accurate thermal camera, and if you look straight into the camera, it is accurate to around 1° F. However, there are more efficient ways to [measure temperature]. In general, it’s not a business application I would recommend.”