A frequent target for terrorism, airports faces considerable challenges in securing the flow of traffic. Concerns over security can ground flights, grinding operations to a halt. Whether one needs to inspect all vehicles entering the airport grounds or just those entering higher-security areas like the apron and the container space, there is no room for long waits during inspections.

Passengers are counting on their flights leaving on time, and security delays could lead to flight delays. However, one can’t afford to compromise the security standards either.

Propane gas cylinders

While security is usually heavy in the terminal buildings themselves, in some international and local airports, there are not enough measures in place in the external road and parking areas leading to the departure and arrival zones.

The attack resulted in ‘only’ five people injured and heavy damage to the terminal building

For example, on June 30, 2007, a Jeep Cherokee laden with propane gas cylinders and gasoline cans was driven at a high speed into the doors of the Glasgow Airport departure area on one of the busiest days of the year. The attack resulted in ‘only’ five people injured and heavy damage to the terminal building. Incidents like this one really emphasized the need for an automatic and efficient method for inspecting vehicles entering the different areas in and around the airport.

Heavy traffic control

The airport apron, flight line or ramp is the area of an airport where aircraft are parked, unloaded or loaded, refilled, or boarded. In most airports, the security regulations in this area are heavy, and only authorized, trained personnel are allowed to drive in and out while withholding heavy traffic control rules.

One can only imagine the danger of terrorists or other hostile people entering in an authorized vehicle. There needs to be a method to make sure these types of people cannot use fake license plates if the recurring vehicle list does get into the wrong hands. While clearly the number of civilian passengers who use airports has risen dramatically as time has gone by, the risks associated with airports and airline travel have also increased.

Identifying vehicle passengers

The device is available in both a mobile and a stationary, fixed version and works in extreme conditions

The threat of bombs or cargo-related explosives is significant, but security measures have not necessarily risen at the same rate as threats and number of flights and passengers. The financial and physical risks of illicit and dangerous materials entering sensitive areas in and around an airport are clear, and a new generation of screening is required to tackle these challenges. UVeye scans, analyses, and records all passing vehicles, ensuring security while also keeping flights on schedule.

Helios by UVeye is the perfect option to protect both the access roads and parking facilities around the airport and important areas like the apron. Helios improves security while keeping security personnel safe. The device is available in both a mobile and a stationary, fixed version and works in extreme conditions. Their technology can even identify vehicle passengers with high body temperatures to help prevent the spread of COVID-19.

High-Resolution cameras

Helios UVIS uses machine learning and artificial intelligence to inspect the undercarriage of any vehicle that drives over its multiple high-resolution cameras. It alerts security personnel about any irregularities or foreign objects hidden in the undercarriage, whether its weapons intended to be used in a terrorist attack, improvised explosive devices, or illegal cargo to be loaded onto a plane in the apron of the airport.

Inspecting the undercarriages of vehicles is very difficult for security personnel and is sometimes neglected due to the number of vehicles entering an airport. Before Helios, there was never an effective solution for under-vehicle inspection, and even if security officers inspected the undercarriage, they probably didn’t know what to look for.

Reducing inspection times

UVeye is here to solve this problem by providing drive-through solutions in selected access points

UVeye has built its products as drive-through solutions that reduce inspection times to as little as a few seconds, supporting a quick flow of vehicles entering or leaving the premises. With Helios, the security guard can inspect the vehicle from a safe distance by simply looking at the high-resolution images on a tablet or computer screen, checking for anything suspicious or unusual in the undercarriage, automatically marked by the system.

Many airports do not have enough staff or the capacity to inspect every vehicle entering or leaving secure areas. UVeye is here to solve this problem by providing drive-through solutions in selected access points, alerting security personnel of any irregularities or potential threats attached to a vehicle. Helios is the only product on the market able to detect issues in the undercarriage of a vehicle passing through the system for the first time.

Fingerprint ID feature

The apron of the airport is the most sensitive area of the facility, and with UVeye’s technology and unique fingerprint ID feature, every vehicle entering or exiting the apron will be marked using artificial intelligence and receive a unique ID that will be saved in the database. This way, security personnel will not need to rely on license plates alone when inspecting vehicles on the authorized vehicle list.

If someone attempts to enter using a fraudulent license plate, the system will recognize that it is not the same vehicle, and the attempted trespassers will be stopped in their tracks. Helios can withstand up to 20 tons per axle, meaning that it will survive being run over by even massive vehicles like trucks and buses. It is fully operational at temperatures between -20 and 40 degrees Celsius and is IP 68/54 compliant, meaning it offers full protection against sand, dust, or rain.

Airport access roads

UVeye’s thermal sensor can also detect the body temperatures of vehicle passengers entering the external airport access roads, which can help identify visitors with potential fevers, improving the safety of everyone in and around the airport.

Airports around the world can enhance their security efforts with automatic vehicle inspection systems

Integrating to the centralized server provides the capability of connecting multiple systems or lanes across different sites while enabling central management and control via one screen. The centralized management system enables the client to access the different systems deployed and manage the different users and historical data. Airports around the world can enhance their security efforts with automatic vehicle inspection systems, providing an extended layer of safety in and around the airport.

Access control systems

Uveye took into consideration heavy traffic entering the access and parking areas of an airport when it built its drive-through scanner, Helios, which can quickly find any threat attached to or hidden in the undercarriage without slowing down vehicle traffic.

Helios is the perfect solution to prevent any weapons, bombs, drugs, or other illegal or dangerous items from entering the apron of the airport and potentially accessing the airplanes about to take flight. Integrating Helios with other security and access control systems can provide a multi-layer approach that will tighten the entry and exit points to any sensitive site while keeping personnel and data safe. UVeye is ideal for airports and also can be implemented at border crossings, seaports, military bases, embassies, data centers, and other secure perimeters.

Download PDF version Download PDF version

In case you missed it

Cutting Through The Hype: AI And ML For The Security Space
Cutting Through The Hype: AI And ML For The Security Space

Today’s organizations face numerous diverse threats to their people, places and property, sometimes simultaneously. Security leaders now know all too well how a pandemic can cripple a company’s ability to produce goods and services, or force production facilities to shut down, disrupting business continuity. For example, a category three hurricane barreling towards the Gulf of Mexico could disable the supplier’s facilities, disrupt the supply chain and put unexpected pressure on an unprepared local power grid. Delivering timely critical information Tracking such risk is hard enough, but managing it is even more difficult. A swift response depends on delivering the right information to the right people, at the right time. And, it’s not as easy as it sounds. Indeed, 61 percent of large enterprises say critical information came too late for them, in order to mitigate the impact of a crisis, according to Aberdeen Research (Aberdeen Strategy & Research). These challenges are accelerating the hype around Artificial Intelligence (AI) These challenges are accelerating the hype around Artificial Intelligence (AI). The technology promises to help us discover new insights, predict the future and take over tasks that are now handled by humans. Maybe even cure cancer. Accelerating the hype around AI But is AI really living up to all this hype? Can it really help security professionals mitigate risk? After all, there’s a serious need for technology to provide fast answers to even faster-moving issues, given the proliferation of data and the speed at which chaos can impact operations. Risk managers face three major obstacles to ensuring business continuity and minimizing disruptions. These include: Data fatigue - Simply put, there’s too much data for human analysts to process in a timely manner. By 2025, the infosphere is expected to produce millions of words per day. At that pace, you’d need an army of analysts to monitor, summarize and correlate the information to your impacted locations, before you can communicate instructions. It’s a herculean task, made even more difficult, when we consider that 30 percent of this global datasphere is expected to be consumed in real time, according to IDC. Relevance and impact - Monitoring the flood of information is simply the first hurdle. Understanding its impact is the second. When a heat dome is predicted to cover the entire U.S. Pacific Northwest, risk managers must understand the specifics. Will it be more or less hot near their facilities? Do they know what steps local utilities are taking to protect the power grid? Such questions can’t be answered by a single system. Communication - Once you know which facilities are impacted and what actions to take, you need to let your employees know. If the event is urgent, an active shooter or an earthquake, do you have a fast, effective way to reach these employees? It’s not as simple as broadcasting a company-wide alert. The real question is, do you have the ability to pinpoint the location of your employees and not just those working on various floor in the office, but also those who are working from home? How AI and ML cut through the noise Although Artificial Intelligence can help us automate simple tasks, such as alert us to breaking news, it requires several Machine Learning systems to deliver actionable risk intelligence. Machine Learning is a branch of AI that uses algorithms to find hidden insights in data, without being programmed where to look or what to conclude. More than 90 percent of risk intelligence problems use supervised learning, a Machine Learning approach defined by its use of labeled datasets. The benefit of supervised learning is that it layers several pre-vetted datasets, in order to deliver context-driven AI The benefit of supervised learning is that it layers several pre-vetted datasets, in order to deliver context-driven AI. Reading the sources, it can determine the category, time and location, and cluster this information into a single event. As a result, it can correlate verified events to the location of the people and assets, and notify in real time. It’s faster, more customized and more accurate than simple Artificial Intelligence, based on a single source of data. Real-world actionable risk intelligence How does this work in the real world? One telecommunications company uses AI and ML to protect a mobile workforce, dispersed across several regions. An AI-powered risk intelligence solution provides their decision makers with real-time visibility into the security of facilities, logistics and personnel movements. Machine Learning filters out the noise of irrelevant critical event data, allowing their security teams to focus only on information specific to a defined area of interest. As a result, they’re able to make informed, proactive decisions and rapidly alert employees who are on the move. Four must-have AI capabilities To gain real actionable risk intelligence, an AI solution should support four key capabilities: A focus on sourcing quality over quantity. There are tens of thousands of sources that provide information about emerging threats - news coverage, weather services, social media, FBI intelligence and so much more. Select feeds that are trusted, relevant and pertinent to your operations. Swift delivery of relevant intelligence. To reduce the mean-time-to-recovery (MTTR), risk managers need an accurate understanding of what’s happening. Consider the different contextual meanings of the phrases ‘a flood of people in the park’ and ‘the park is at risk due to a flood’. Machine Learning continuously increases the speed of data analysis and improves interpretation. Ability to cross-reference external events with internal data. As it scans different data sources, an AI engine can help you fine-tune your understanding of what’s happening and where. It will pick up contextual clues and map them to your facilities automatically, so you know immediately what your response should be. Ready-to-go communications. Long before a threat emerges, you can create and store distribution, and message templates, as well as test your critical communications system. Handling these tasks well in advance means you can launch an alert at a moment’s notice. The ability to minimize disruptions and ensure business continuity depends on speed, relevance and usability. AI and ML aren’t simply hype. Instead, they’re vital tools that make it possible for security professionals to cut through the noise faster and protect their people, places and property.

What Career Opportunities Await The Next Generation In Security?
What Career Opportunities Await The Next Generation In Security?

A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labor pool will need to be able to meet the host of new challenges. We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?

Video Surveillance As A Service (VSaaS) From Integrator And User Perspective
Video Surveillance As A Service (VSaaS) From Integrator And User Perspective

Technology based on the cloud has become a popular trend. Most IT systems now operate within the cloud or offer cloud capabilities, and video surveillance is no exception: virtually every major hardware and software vendor offers cloud-based services. Users benefit from the cloud due to its numerous advantages, such as ease of implementation, scalability, low maintenance costs, etc. Video surveillance as a service (VSaaS) offers many choices, so there is an optimal solution for each user. However, what about integrators? For them, VSaaS is also a game-changer. Integrators are now incentivized to think about how they can maintain their markets and take advantage of the new business opportunities that the cloud model provides. Hosted video surveillance The cloud service model has drastically changed the role of an integrator. Traditionally, integrators provided a variety of services including system installation, support, and maintenance, as well as served as a bridge between vendors and end-users. In contrast, hosted video surveillance as a service requires a security system installer to simply install cameras and connect them to the network, while the provider is in direct contact with each end-user. The cloud service model has drastically changed the role of an integrator There is no end to on-premises systems. However, the percentage of systems where the integrator’s role is eliminated or considerably reduced will continue to increase. How can integrators sustain their markets and stay profitable? A prospective business model might be to become a provider of VSaaS (‘cloud integrator’) in partnership with software platform vendors. Cloud-Based surveillance Some VMS vendors offer software VSaaS platforms that form the basis for cloud-based surveillance systems. Using these solutions, a data center operator, integrator, or telecom service provider can design a public VSaaS or VSaaS in a private cloud to service a large customer. The infrastructure can be built on any generic cloud platform or data center, as well as resources owned by the provider or client. So, VSaaS providers have the choice between renting infrastructure from a public cloud service like Amazon Web Services, Microsoft Azure, or Google Cloud or using their own or clients’ computing infrastructure (virtual machines or physical servers). Gaining competitive advantage When integrators purchase commitment use contracts for several years, they can achieve significant savings As an example, a telecom carrier could deploy VSaaS on their own infrastructure to expand their service offering for clients, gaining a competitive advantage and enhancing profits per user. Using a public cloud, a smaller integrator can host the computing infrastructure immediately, without incurring up-front costs and with no need to maintain the system. These cloud services provide scalability, security, and reliability with zero initial investment. When integrators purchase commitment use contracts for several years, they can achieve significant savings. Next, let’s examine VSaaS options available in the market from an end-users point of view. With hosted (or cloud-first, or true-cloud) VSaaS solutions, all the video feeds are transmitted directly from cameras to the cloud. Optionally, video can be buffered to SD cards installed on cameras to prevent data losses in case of Internet connection failures. Dedicated hardware bridges Service providers may offer dedicated hardware bridges for buffering video footage There are many providers of such services that offer their own brand cameras. Connecting these devices to the cloud should only take a few clicks. Firmware updates are usually centralized, so users don’t have to worry about security breaches. Service providers may offer dedicated hardware bridges for buffering video footage and secure connections to the cloud for their branded and third-party cameras. Typical bridges are inexpensive, basic NVRs that receive video feeds from cameras, record on HDD, and send video streams to the cloud. The most feature-rich bridges include those with video analytics, data encryption, etc. Introducing a bridge or NVR makes the system hybrid, with videos stored both locally and in the cloud. At the other end of the spectrum relative to hosted VSaaS, there are cloud-managed systems. Video management software In this case, video is stored on-site on DVRs, NVRs, video management software servers, or even locally on cameras, with an option of storing short portions of footage (like alarm videos) in the cloud for quick access. A cloud service can be used for remote viewing live video feeds and recorded footage, as well as for system configuration and health monitoring. Cloud management services often come bundled with security cameras, NVRs, and video management software, whereas other VSaaS generally require subscriptions. Keep in mind that the system, in this case, remains on-premises, and the advantages of the cloud are limited to remote monitoring and configuring. It’s a good choice for businesses that are spread across several locations or branches, especially if they have systems in place at each site. On-Site infrastructure All that needs to be changed is the NVRs or VMS with a cloud-compatible model or version All locations and devices can be remotely monitored using the cloud while keeping most of the existing on-site infrastructure. All that needs to be changed is the NVRs or VMS with a cloud-compatible model or version. Other methods are more costly and/or require more resources to implement. Hosted VSaaS helps leverage the cloud for the highest number of benefits in terms of cost and technological advantages. In this case, the on-site infrastructure consists of only IP cameras and network equipment. This reduces maintenance costs substantially and also sets the foundation for another advantage of VSaaS: extreme and rapid scalability. At the same time, the outgoing connection at each site is critical for hosted VSaaS. Video quality and the number of cameras directly depend on bandwidth. Broadband-Connected locations Because the system does not work offline, a stable connection is required to stream videos. In addition, cloud storage can be expensive when many cameras are involved, or when video archives are retained for an extended period. The hosted VSaaS is a great choice for a small broadband-connected location The hosted VSaaS is a great choice for small broadband-connected locations and is also the most efficient way to centralize video surveillance for multiple sites of the same type, provided they do not have a legacy system. Since it is easy to implement and maintain, this cloud technology is especially popular in countries with high labor costs. Using different software and hardware platforms, integrators can implement various types of VSaaS solutions. Quick remote access For those who adhere to the classic on-premises approach, adding a cloud-based monitoring service can grow their value proposition for clients with out-of-the-box capabilities of quick remote access to multiple widely dispersed sites and devices. For small true-cloud setups, there is a possibility to rent a virtual machine and storage capacity in a public cloud (such as Amazon, Google, or Microsoft) and deploy the cloud-based VMS server that can handle dozens of cameras. In terms of features, such a system may include anything from plain video monitoring via a web interface to GPU-accelerated AI video analytics and smart search in recorded footage, depending on the particular software platform. Optimizing internet connection Hybrid VSaaS is the most flexible approach that enables tailoring the system to the users’ needs High-scale installations, such as VSaaS for public use or large private systems for major clients, involve multiple parts like a virtual VMS server cluster, web portal, report subsystem, etc. Such systems can also utilize either own or rented infrastructure. Some vendors offer software for complex installations of this kind, though there are not as many options as for cloud-managed systems. Finally, hybrid VSaaS is the most flexible approach that enables tailoring the system to the users’ unique needs while optimizing internet connection bandwidth, cloud storage costs, and infrastructure complexity. It’s high time for integrators to gain experience, choose the right hardware and software, and explore different ways of building systems that will suit evolving customer demands in the future.