Download PDF version Contact company

The recently announced body-worn camera solution moves Axis into a new market.

Tested both in the labs and the field to ensure reliability and robustness, and designed with an open architecture for seamless integration with existing software, the solution is the world’s most flexible.

Some of the team members behind the solution, Fredrik Andersson, Lina He, and Rob Messer, talk about the benefits, technical features, and field studies of the new system.

Body-worn cameras 

Being the industry pioneer in network video, entering the market of body-worn cameras was a logical extension of an existing business. Based on needs addressed by customers within the law enforcement and private security field, it provides a new way for making the world a safer, smarter, and more secure place.

Putting a camera on the torso of a police officer, a security guard or a train attendant creates a more secure workplace, better possibilities for collecting evidence, and can provide input for developing better work methods or training. The possibilities and use cases are endless.

Ultimate flexibility

For adventurers or explorers like James Cook, Neil Armstrong, and even Lara Croft, research and preparation before a new mission make sure they can use their strengths in the best way when entering new environments.

It’s the same philosophy Axis follows in developing new products, and it has done so in expanding its surveillance portfolio into the body-worn camera market.

Open architecture

The body-worn solution reflects the high quality found in all Axis products. Just as many other Axis solutions are based on an open architecture, this solution allows for integration with existing software. This ensures that current customer investments aren’t wasted.

Fredrik Andersson, Global Product Manager, explains, “One of the system’s strongest features is its open architecture, which allows customers to integrate the body-worn cameras with existing Video Management Systems (VMS) or Evidence Management Systems (EMS).”

The body-worn solution can be used with VMS and EMS, on-premise or in the cloud

“The Axis body-worn solution can be used with a third-party VMS and EMS, on-premise or in the cloud, allowing for integration with other video surveillance data. It can also be delivered as an end-to-end solution, using AXIS Camera Station, the company’s own VMS.”

Tackling poor conditions

With decades of experience in developing security cameras, suited for various challenging environments, Axis knows how to tackle conditions like poor light conditions and make robust cameras that can withstand knocks and harsh surroundings, while still delivering high-quality images.

And this knowledge is condensed in all parts of the new body-worn camera system.

System components

The system consists of three main hardware components: the cameras, the camera docking station, and the system controller. The docking stations can be placed safely on the premises and the system controller sends the footage to the destination of choice for analysis and storage.

While the cameras store the video when used in the field, the system controller also deletes the files automatically from the cameras, so the device is immediately ready for use again.

The “Swiss Army knife” of cameras

Axis was looking for the ‘Swiss Army knife’ of cameras: it needed to develop a small, lightweight device, with good battery power without losing any image quality or robustness, while also allowing easy on-camera operation. It was a completely new design format for Axis.

Lina He, the Product Specialist, says, “Given law enforcement operators and security guards are walking – and even running – around with the camera, the Axis team made sure the devices provide clear images in changing situations.

The camera captures video up to 1080p @30fps and includes features like wide dynamic range technology (WDR). It ensures the image remains visible and in high-quality even if the person wearing the camera is exposed to very challenging light conditions.”

Signal and noise modulation

The software helps to modulate noise and signal since the footage will have to serve as evidence in the courtroom

As it’s included in most of our products, we have also used software that helps to lower any noise and improve the signal, because ultimately, the footage will have to serve as evidence in the courtroom.”

“For the audio, we used dual microphones to improve the quality of speech and reduce noise. Since officers can’t disrupt their work to charge the device, the cameras have an operating time of around 12 hours of footage in full HD resolution and can be configured to operate for up to 17 hours – so longer than the length of an average shift.”

Compression technology

“We used compression technology, Axis Zipstream for body-worn, to reduce the demand for storage and bandwidth. The cameras also have internal storage of 64GB, which again is enough to cover a full shift in full HD resolution.”

Quality promise put to the test

Quality has always been a main part of the Axis philosophy – be it in the product itself or in its usability.

To maintain standards for its body-worn cameras and to fulfill the usability requirements, Axis put the new cameras to the test in the lab, imitating the potentially rough conditions to which the cameras will be exposed, such as dropping the cameras hundreds of times to ensure robustness and functionality.

Device testing

The cameras also have to pass tests for weather-proofing, button durability, chemical resistance, and many other factors and conditions they might have to withstand.

This is one of the reasons why Axis is confident to give its body-worn cameras a three-year warranty, an above-average length of time for these kinds of cameras. Furthermore, customers can rely on a broad network of partners for high-quality support.

Data encryption 

As with every device in the company’s portfolio, Axis has ensured the highest level of security for the solution itself. Ultimately, the footage of body-worn cameras might be needed in court, offering unbiased evidence of the incident and actions of all the parties involved.

All data is encrypted both at rest and in transfer using AES256 and TLS. In addition, video data can be fully end-to-end encrypted with specific integrations,” explains Fredrik.

Watermarked data

The cellphone app accompanying the solution allows users to review the footage, which is then watermarked and includes a camera and user ID.

The process of transferring the video material of the camera and onto a server is fully automated 

 In addition, the process of transferring the video material of the camera and onto a server is fully automated, which means no human interaction is needed and, therefore, no video section can be taken out of the footage during the process.

Safety measurements

Moreover, all cameras are registered to one ‘home’ system, which is the only system they are programmed to transfer their material to.

They were really satisfied with the benefits the cameras provided as they felt safer knowing they could always look at the footage of their shift in case of an incident

All these safety measurements ensure that it can be proven that not a single frame has been tampered with. It also keeps the solution safe from cyber disruptions.

Trials in the field

When it comes to (new) cameras and their features, it’s a common practice to test devices in the field to ensure they meet all the needs.

Axis has run a large number of trials to test the system and identify features that would make body-worn cameras a valuable addition for its users in real-life conditions.

For example, cameras have been tested in airports, with private security companies, and law enforcement organizations.

Mission accomplished

A pilot undertaken in Poland was a good way of showing what Axis was up against in the product design phase, as Rob Messer, Product Introduction Manager, illustrates, “The findings of these pilots were very interesting and at times quite surprising.

In a trial, we undertook in Poland, we equipped the local police with some of the body-worn cameras. They were really satisfied with the benefits the cameras provided as they felt safer knowing they could always look at the footage of their shift in case of an incident.”

Architecture for future enhancement

Axis will continue to use its expertise as well as the feedback from all the ongoing real-life use cases to add features and constantly optimize the solution.

The solution immediately stands out in its flexibility, cost-effectiveness, and future-proofing

With its open architecture giving customers the ability to integrate the body-worn cameras with existing VMS and EMS software, the solution immediately stands out in its flexibility, cost-effectiveness, and future-proofing.

As the market develops, and the benefits of body-worn cameras are seen in multiple industry sectors and environments, this architecture will bring benefits in further integrations and applications.

Tapping the potential

Fredrik concludes, “While we’re just at the beginning of our journey into the world of body-worn cameras, we know there is a lot of unused potential in our hardware that we can and will tap into.”

“We are already planning the next features and combinations with the latest video analytics, storage, and management solutions to better support users and operators, whatever the application.”

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

Why Visualization Platforms Are Vital For An Effective Security Operation Center (SOC)
Why Visualization Platforms Are Vital For An Effective Security Operation Center (SOC)

Display solutions play a key role in SOCs in providing the screens needed for individuals and teams to visualize and share the multiple data sources needed in an SOC today. Security Operation Center (SOC) Every SOC has multiple sources and inputs, both physical and virtual, all of which provide numerous data points to operators, in order to provide the highest levels of physical and cyber security, including surveillance camera feeds, access control and alarm systems for physical security, as well as dashboards and web apps for cyber security applications. Today’s advancements in technology and computing power not only have increasingly made security systems much more scalable, by adding hundreds, if not thousands, of more data points to an SOC, but the rate at which the data comes in has significantly increased as well. Accurate monitoring and surveillance This has made monitoring and surveillance much more accurate and effective, but also more challenging for operators, as they can’t realistically monitor the hundreds, even thousands of cameras, dashboards, calls, etc. in a reactive manner. Lacking situational awareness is often one of the primary factors in poor decision making In order for operators in SOC’s to be able to mitigate incidents in a less reactive way and take meaningful action, streamlined actionable data is needed. This is what will ensure operators in SOC truly have situational awareness. Situational awareness is a key foundation of effective decision making. In its simplest form, ‘It is knowing what is going on’. Lacking situational awareness is often one of the primary factors in poor decision making and in accidents attributed to human error. Achieving ‘true’ situational awareness Situational awareness isn’t just what has already happened, but what is likely to happen next and to achieve ‘true’ situational awareness, a combination of actionable data and the ability to deliver that information or data to the right people, at the right time. This is where visualization platforms (known as visual networking platforms) that provide both the situational real estate, as well as support for computer vision and AI, can help SOCs achieve true situational awareness Role of computer vision and AI technologies Proactive situational awareness is when the data coming into the SOC is analyzed in real time and then, brought forward to operators who are decision makers and key stakeholders in near real time for actionable visualization. Computer vision is a field of Artificial Intelligence that trains computers to interpret and understand digital images and videos. It is a way to automate tasks that the human visual system can also carry out, the automatic extraction, analysis and understanding of useful information from a single image or a sequence of images. There are numerous potential value adds that computer vision can provide to operation centers of different kinds. Here are some examples: Face Recognition: Face detection algorithms can be applied to filter and identify an individual. Biometric Systems: AI can be applied to biometric descriptions such as fingerprint, iris, and face matching. Surveillance: Computer vision supports IoT cameras used to monitor activities and movements of just about any kind that might be related to security and safety, whether that's on the job safety or physical security. Smart Cities: AI and computer vision can be used to improve mobility through quantitative, objective and automated management of resource use (car parks, roads, public squares, etc.) based on the analysis of CCTV data. Event Recognition: Improve the visualization and the decision-making process of human operators or existing video surveillance solutions, by integrating real-time video data analysis algorithms to understand the content of the filmed scene and to extract the relevant information from it. Monitoring: Responding to specific tasks in terms of continuous monitoring and surveillance in many different application frameworks: improved management of logistics in storage warehouses, counting of people during event gatherings, monitoring of subway stations, coastal areas, etc. Computer Vision applications When considering a Computer Vision application, it’s important to ensure that the rest of the infrastructure in the Operation Center, for example the solution that drives the displays and video walls, will connect and work well with the computer vision application. The best way to do this of course is to use a software-driven approach to displaying information and data, rather than a traditional AV hardware approach, which may present incompatibilities. Software-defined and open technology solutions Software-defined and open technology solutions provide a wider support for any type of application the SOC may need Software-defined and open technology solutions provide a wider support for any type of application the SOC may need, including computer vision. In the modern world, with everything going digital, all security services and applications have become networked, and as such, they belong to IT. AV applications and services have increasingly become an integral part of an organization’s IT infrastructure. Software-defined approach to AV IT teams responsible for data protection are more in favor of a software-defined approach to AV that allow virtualised, open technologies as opposed to traditional hardware-based solutions. Software’s flexibility allows for more efficient refreshment cycles, expansions and upgrades. The rise of AV-over-IP technologies have enabled IT teams in SOC’s to effectively integrate AV solutions into their existing stack, greatly reducing overhead costs, when it comes to technology investments, staff training, maintenance, and even physical infrastructure. AV-over-IP software platforms Moreover, with AV-over-IP, software-defined AV platforms, IT teams can more easily integrate AI and Computer Vision applications within the SOC, and have better control of the data coming in, while achieving true situational awareness. Situational awareness is all about actionable data delivered to the right people, at the right time, in order to address security incidents and challenges. Situational awareness is all about actionable data delivered to the right people Often, the people who need to know about security risks or breaches are not physically present in the operation centers, so having the data and information locked up within the four walls of the SOC does not provide true situational awareness. hyper-scalable visual platforms Instead there is a need to be able to deliver the video stream, the dashboard of the data and information to any screen anywhere, at any time — including desktops, tablets phones — for the right people to see, whether that is an executive in a different office or working from home, or security guards walking the halls or streets. New technologies are continuing to extend the reach and the benefits of security operation centers. However, interoperability plays a key role in bringing together AI, machine learning and computer vision technologies, in order to ensure data is turned into actionable data, which is delivered to the right people to provide ‘true’ situational awareness. Software-defined, AV-over-IP platforms are the perfect medium to facilitate this for any organizations with physical and cyber security needs.

What New Technologies And Trends Will Shape Video Analytics?
What New Technologies And Trends Will Shape Video Analytics?

The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.