Public safety and the protection of property initiatives led the city of Mankato, Minnesota to deploy a city-wide IP-based video surveillance system. Founded in 1852, the city is the seat of Blue Earth County. It encompasses 18.26 square miles of land and water, and supports a population of about 41,000 (2015 US census estimate). Home to a variety of natural landmarks and higher educational institutes, Mankato provides a dynamic lifestyle for its citizens all year round.

Surveillance For Key Community Areas

The new city surveillance system uses a range of Arecont Vision megapixel cameras to cover key areas of the community, with the largest concentration of cameras deployed in the popular downtown entertainment district. Surveillance is also in place throughout Mankato’s city hall, civic event center, shopping areas, parking ramps, public safety center, municipal water plant, public work center, regional airport, and for multiple public parks and community streets.

The limitations of the previous surveillance system inspired extensive enhancements and capabilities for the new project. The original system NVR supported primarily analog technology cameras, with a small percentage of early generation IP cameras supporting only JPEG video.

The image quality of megapixel cameras could not be matched by this system, nor could it be cost effectively grown to address city requirements. In order to enjoy enhanced security, increased public safety, and the protection of property, a more modern and capable surveillance system was required. The city thus engaged security and communications integrator WW Communications to design and deploy such a project.The limitations of the previous surveillance system inspired extensive enhancements and capabilities for the new project

WW Communications

WW Communications’ COO Mike Bales led the effort and selected Arecont Vision’s IP megapixel cameras as the core of the new project. With regards as to why Arecont Vision was selected for the project, Bales explained: “A variety of factors led to the use of Arecont Vision, not least of which was the commitment and quality they provide as an American-based manufacturer. They are one of the few vendors who design and build their cameras in the U.S., and their cameras’ features and reliability reflect that.”

Delving further into what features specifically appealed to them, Bales concluded, “Simplified installation features such as remote focus, along with advanced features such as true WDR (wide dynamic range) were key factors in the decision. Additionally, the SurroundVideo camera series’ cost effectiveness and coverage capabilities placed Arecont Vision ahead of its competitors for the job.”

SurroundVideo cameras were first designed and pioneered in the surveillance industry by Arecont Vision in 2006. Now in their fifth generation, they provide non-stop coverage with four individual megapixel sensors for superior situational awareness and image quality while reducing the total number of cameras required for surveillance projects.

After deciding on a manufacturer, Milestone Systems was then brought on as the video management software for Mankato’s new surveillance system. Arecont Vision and Milestone are proven integration partners, having completed thousands of seamlessly-integrated city surveillance projects around the world.

Arecont Vision And Milestone Systems

Additionally, Milestone is a top-tier participant in the Arecont Vision Technology Partner Program and its VMS software is among those used in Arecont Vision’s MegaLab. “The close technology and support integration between Arecont Vision and Milestone helped ensure that a best-in-class surveillance system was delivered to the Mankato,” commented Bales. “The result is a single system for the city that is second to none in capabilities and can grow with the community’s needs.”

Arecont Vision remote monitoring Mankato study
The surveillance system has exceeded the expectations of the city to protect both people and property

City Surveillance Project Phases

Phase one of the project included deploying thirteen cameras to the newly-built public safety center. Phase two resulted in the deployment of thirty-seven cameras to the city’s entertainment district. The effectiveness of these cameras led to additional installations at city sites which greatly assisted in reducing common vandalisms and other public safety crimes.

Phase three of the project involved the installation of twenty-three MegaDome 2 single sensor cameras onto the fourth floor of a brand-new, four-story parking facility in the downtown area. Surveillance of the structure was further enhanced through use of a SurroundVideo Omni — a unique omni-directional camera introduced to the industry by Arecont Vision in 2014.

Unmatched Surveillance Capabilities

The Omni camera series offers four megapixel sensors that are mounted on three-axis gimbals inside a low-profile dome enclosure. The sensors can be individualized to cover virtually any direction, providing unmatched surveillance capabilities with a single high-resolution camera that is fully integrated with the VMS.

With the recent Public Works Center campus construction project, another three MicroDome G2 and five SurroundVideo Omni cameras were added to the city’s overall surveillance system. Five SurroundVideo Omni cameras and MicroDome G2 cameras were also installed along a pedestrian walkway that stretches from local hotels to the city’s civic center and entertainment district. The system is expected to continue growing in order to address public safety and property protection concerns as they arise.

Security And City-Wide Situational Awareness

After a Mankato bar closed for the night, a major altercation took place, where the Arecont Vision Cameras were crucial in solving the crime

Depending upon the location and local requirement, the Mankato’s city surveillance system uses a range of Arecont Vision cameras. These include single sensor 2 – 5MP MegaDome 2 and MicroDome G2 cameras. 20MP SurroundVideo multi-sensor cameras provide 180° situational awareness coverage, while omni-directional SurroundVideo Omni G1 and G2 cameras cover an even wider range of deployments.

The city surveillance system is managed and monitored from a command center with a multitude of large screens displayed across a wall. “The surveillance system and the screens are critically important during high-traffic events in the city,” said Mr. Bales. “With three colleges here in town, homecoming is a very busy time of the year. There are also numerous festivals that take place in the city combined with a very dynamic downtown. Our staff is able to view the activities as they happen, enhancing security and city-wide situational awareness.”

Video Streaming To Cellphone Devices

It is not just the security center that can monitor this system either — video can also be streamed to cellphone devices and can be monitored for official use all over the city. The system provides public monitoring as well. There are about half a dozen locations downtown with indoor walkways and skyways that are covered by Arecont Vision cameras with live video, providing the public with supplementary awareness and security.

The surveillance system has exceeded the expectations of the city to protect both people and property. An example of the system’s usefulness was evident in a recent incident that made national news. After a Mankato bar closed for the night, a major altercation took place, where the Arecont Vision Cameras were crucial in solving the crime.

The city surveillance system caught the incident on camera, providing detailed video evidence which assisted law enforcement in proceeding accordingly. The cameras prompted the ideal outcome in an unfortunate situation, helping make the legal process more efficient and serving to greater deter the occurrence of future incidents.

When probed on how the system has performed to date, Bales responded that Arecont Vision “exceeded the expectations.” Arecont Vision looks forward to continuing this legacy throughout its work with the City of Mankato.

Download PDF version

In case you missed it

Drawbacks Of PenTests And Ethical Hacking For The Security Industry
Drawbacks Of PenTests And Ethical Hacking For The Security Industry

PenTesting, also known as “ethical hacking” or “white-hat hacking,” has always been viewed as the “sexy” side of cybersecurity, a task that is far more exciting than monitoring systems for intrusions, shoring up defenses, or performing compliance audits. Numerous security conferences are devoted to the fine art of attempting to hack into systems – with an owner’s full knowledge and permission – and reporting on the results. At an organizational level within businesses, they also value PenTesting under the premise that it allows them to identify security vulnerabilities before cyber criminals can. There are some regulatory requirements like PCI-DSS that require penetration assessments as part of their PCI compliance. However, many organizations have come to over-rely on PenTesting, thinking that if all the issues were identified in a PenTest, they’re good to go. Not only is this not helping them improve their security posture, it is also leaving them with a false sense of security. A penetration test is a simulated, live attack on your environment by a white-hat hacker What Is PenTesting? A penetration test is a simulated, live attack on your environment by a white-hat hacker, customized to address specific problem areas, such as web-based applications, mobile applications and infrastructure services like border VPNs and firewalls. The PenTest may include different types of attacks based on the requested scope from an organization so that the tester attempts to come at each system from all sides, the way a cyber-criminal would. The goal is to identify which systems and data the tester was able to access and how an organisation can address the vulnerabilities that allowed them to get in. The Limitations Of PenTesting There is great value in performing periodic PenTests, which is why PCI DSS and other security standards mandate them. However, PenTesting has three significant limitations: PenTesting does not provide solutions Let’s be honest: No one likes reading technical reports, but typically, that's the only deliverable provided by a PenTester. The value of a PenTesting report varies wildly based on the scope of the testing, the PenTester’s technical expertise and their writing ability. The tester may miss some things, or not clearly convey their findings. Additionally, a PenTest is a snapshot in time and the PenTester could miss changes in the systems, configurations, attack vectors and application environments. Even if your system “passes” a PenTest, will it crumble in the face of a brand new, more powerful attack vector that emerges a week later? The worst type of “PenTest report” consist of an analyst producing nothing more than the results of a vulnerability scan. Even if the PenTester produces a well-written, comprehensive report filled with valuable, actionable information, it’s up to your organization to take the action, which leads to the next limitation of PenTesting. The value of a PenTesting report varies wildly based on the scope of the testing, the PenTester’s technical expertise and their writing ability PenTesters only exploit vulnerabilities and do not promote change PenTesting does not highlight the missing links in your organisation's technology stack that could help you address your security vulnerabilities. This is often in the guise of being agnostic to the technologies that exist because their expertise is only offensive security – unless, of course, the performing company has “magic software” to sell you. PenTests also do not help to develop your organizational processes. Additionally, they do not ensure that your employees have the knowledge and training needed to treat the identified fixes. Worst of all, if your in-house expertise is limited, any security issues that are identified during a PenTest aren't validated, which leads to a misrepresentation of their magnitude and severity while giving your team a false sense of security. PenTesters are self-serving Too often, PenTesting pits the assessment team against the organization; the goal of the assessment team is to find the best way to "shame" the business into remediation, purchasing the testing company’s “magic software”, then call it a day. Once the PenTesters find, for example, a privilege escalation or a way to breach PII, they stop looking for other issues. The testers then celebrate the success of finding a single “flag”. In the meantime, the business is left in a precarious situation, since other unidentified issues may be lurking within their systems. Shifting The Paradigm Of PenTesting The goal of PenTesters is to find the best way to "shame" the business into purchasing the testing company’s “magic software”, then call it a day Penetration testing can uncover critical security vulnerabilities, but it also has significant limitations and it’s not a replacement for continuous security monitoring and testing. This is not to say that all PenTesting is bad. PenTesting should be integrated into a comprehensive threat and vulnerability management program so that identified issues are addressed. The purpose of a mature vulnerability management program is to identify, treat and monitor any identified vulnerabilities over its lifecycle. Vulnerability Management Program Additionally, a vulnerability management program requires the multiple teams within an organisation to develop and execute on the remediation plan to address the vulnerability. A mature threat and vulnerability management plan takes time and is helpful to partner with a managed security services provider (MSSP) to help you in the following areas: Improve your cyber-risk management program so that you can identify and efficiently address vulnerabilities in your infrastructure, applications and other parts within your organisation’s ecosystem on a continuous basis; Perform retests to validate any problems identified through a vulnerability scan or a PenTest assessment; Ensure that your in-house staff has the knowledge, skills and tools they need to respond to incidents. Cyber risk management and remediation is a "team sport." While periodic testing conducted by an external consultant satisfies compliance requirements, it is not a replacement for continuous in-house monitoring and testing. To ensure that your systems are secure, you must find a partner who not only performs PenTesting but also has the engineering and development experience to assist you in fixing these types of complex problems in a cost-effective manner and ensuring that your systems are hardened against tomorrow’s attacks.

Intelligent Video Surveillance And Deep Learning Dominate MIPS 2018 Agenda
Intelligent Video Surveillance And Deep Learning Dominate MIPS 2018 Agenda

Milestone Systems is embracing artificial intelligence and deep learning in a big way at this week's yearly Milestone Community Days (MIPS 2018) in Las Vegas. The Danish company's theme is "Creating an Intelligent World," and Milestone's stated goal is to make "the Milestone community part of every surveillance installation in the world."   Science Fiction Becomes Reality In a presentation on opening day, Milestone CSMO Kenneth Hune Petersen pointed to the 2002 movie The Minority Report as highlighting a variety of gadgets and systems that seemed futuristic at the time but are now perfectly possible, and in some cases outdated. Movies have previously highlighted gadgets and systems that were futuristic, but are now perfectly possible, or outdated "If we dare to dream together we can make this a better world," says Petersen. "Through AI and machine learning, we can help define tomorrow. There's no doubt about it: There is a massive business opportunity for us in artificial intelligence." Despite all the talk about artificial intelligence, only about 0.5 percent of all the data in the world has currently been analyzed or used, says Peterson. "Our open platform technology is the foundation for intelligent video systems and our partners have the expertise and infrastructure needed to reach the next frontier in intelligent video solutions," said Bjørn Skou Eilertsen, Milestone Systems CTO. "Together, we can provide unlimited solutions for our customers." Deeper Integration And Broader Coverage Expanding the Milestone community this year has included the addition of 1,000 new models of supported hardware devices; there are currently more than 7,000 models supported. Milestone is also pursuing broader coverage of installations through their partners, with deeper integration of functionality, and by deepening existing relationships with customers. ‘Creating an intelligent world’ includes deep learning and lots of video systems, says Milestone at their annual conference Under new agreements, hardware partners such as Dell EMC and BCDVideo now provide XProtect Essential+ software pre-loaded on servers they sell. The focus at MIPS 2018 on AI included a presentation by Tanmay Bakshi, the "world's youngest IBM coder" and TED Talk speaker, at 14 years old. The prodigy, who has been coding since the age of 4, has worked with IBM and other companies on a variety of AI-related projects. Using deep learning with video is currently limited because so much video is unlabelled and unstructured In his MIPS 2018 keynote speech, Bakshi traced the development of AI through high-profile events, such as IBM's development of the "Watson" computer, which successfully competed on Jeopardy!, and Google's development of AlphaGo, a program that successfully plays the complex ancient board game, Go. Data Demands Deep-Learning Bakshi focused on security and healthcare as two disciplines where deep learning can potentially have a big impact. Using deep learning with video is currently limited because so much video is unlabeled and unstructured. Still, projections are that there will be a billion cameras worldwide by 2020, providing an over-abundance of data that demands the use of deep learning to make sense of it all. "There is a misconception that AI is meant to replace us, to make humans obsolete. AI is not replacing us. It is created by humans to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently," said Bakshi. He suggested that AI is equivalent to IA; Bakshi's abbreviation meaning "intelligence augmented." Johnmichael O’Hare (left) of the Hartford Police Department, and Tanmay Bakshi (right) discusses key security issues of the modern day The ability to scale AI applications using "distributed deep learning" and graphics processing unit (GPU) hardware is paving the way for greater use of deep learning in video applications. Adam Scraba, Global Business Development Lead at NVIDIA, outlined the trends that are making the current "Big Bang" of deep learning possible. He said it is "the most exciting time in tech history," with "software that can write its own software" now among the tools that make previously unsolvable problems now solvable. AI-driven intelligent video analytics can now achieve "super-human" results, he said. An Intelligent World To Combat Crime Instead of sitting for hours staking out a suspected drug dealer alone, entire investigations now take hours instead of days A success story about the game-changing capabilities of video data was supplied by Hartford, Conn.'s Capital City Crime Center (C4). The Hartford police department uses video data in a "predictive policing" approach. They have created an "intelligent world with smart policing to combat drug trafficking," according to C4 Supervisor Johnmichael O'Hare of the Hartford Police Department. Instead of sitting for hours staking out a suspected drug dealer, for example, video of a site can be analyzed to determine areas with higher levels of foot traffic that indicate drug buys. The result is investigations that take hours instead of days. Hartford incorporates several technologies, including ShotSpotter gunshot detection, Briefcam video synopsis and other systems, all tied together using the Milestone platform. More than 700 attendees make MIPS 2018 the largest such event ever, and exhibits by around 60 Milestone partner companies attest to the continuing expansion of the Milestone community. [Main image:Tanmay Bakshi (left) and Johnmichael O’Hare of the Hartford Police Department (right) discuss key security issues of the modern day]

Has The Gap Closed Between Security Fiction And Security Reality?
Has The Gap Closed Between Security Fiction And Security Reality?

Among its many uses and benefits, technology is a handy tool in the fantasy world of movie and television thrillers. We all know the scene: a vital plot point depends on having just the right super-duper gadget to locate a suspect or to get past a locked door. In movies and TV, face recognition is more a super power than a technical function. Video footage can be magically enhanced to provide a perfect image of a license plate number. We have all shaken our heads in disbelief, and yet, our industry’s technical capabilities are improving every day. Are we approaching a day when the “enhanced” view of technology in movies and TV is closer to the truth? We asked this week’s Expert Panel Roundtable: How much has the gap closed between the reality of security system capabilities and what you see on TV (or at the movies)?

Key highlights
  • Surveillance for key community areas
  • WW Communications
  • Arecont Vision and Milestone Systems
  • City surveillance project phases
  • Unmatched surveillance capabilities
  • Security and city-wide situational awareness
  • Video streaming to mobile devices