SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Counter terror
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • White papers

Check Out Our Special Report On Casino Security

Get it now!

How Can Security Systems Be Used To Predict Bad Things?

How Can Security Systems Be Used To Predict Bad Things?
22 Nov 2017
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Security systems can predict events by analyzing patterns in real-time data.
  • Combining technologies like AI and video analytics enhances predictive security capabilities.
  • Predictive security systems help foresee workplace violence, theft, and terrorist threats.

Editor Introduction

It seems there are more “bad things” happening than ever before. We hear news every day of workplace shootings and terrorist attacks, of smash-and-grab thefts and child abductions. Beyond the possible human tragedy involved, such events pose a persistent question to anyone involved in the realm of security: Could we have prevented it? The first step toward prevention is to predict or foresee an event before it happens. Too often, technology enters the picture after the fact, most commonly the use of forensic video. Isn’t there more our industry can do before such events occur? We put the question to this week’s Expert Panel Roundtable: How can security systems be used to predict bad things before they happen?


Card image cap
Jennifer Hackenburg Dahua Technology USA Inc.

Video analytics continue to evolve as a powerful surveillance tool for enterprise security to detect and mitigate potential threats – often before events occur. Advanced analytics, such as deep learning, can collect and learn data over a period of time as a way to gauge how a scene typically functions on a day-to-day basis. As a result, when something out of the ordinary happens, such as a lingering person, traffic going the wrong way, or an extra-large object being carried, an alarm is triggered so that the proper responders can react. Analytics enable security cameras to operate more intelligently and efficiently, including analyzing video in real-time to detect abnormalities in behaviors and physical environments. Motion detection and intrusion detection can alert operators immediately to potential threats. Instead of using surveillance only for forensic purposes, systems can allow authorities to address the threat from its onset and implement proactive measures.

Card image cap
Todd Piett Rave Mobile Safety

Providing eyewitness accounts can alter the potential severity of a tragedy or stop it altogether. By enabling members of your community to be additional eyes and ears for security personnel, eyewitnesses can address security issues as they occur or even before. Tools like two-way anonymous tip applications can empower you staff and visitors to prevent crimes and instantly alert on-site security of strange and potentially dangerous situations. Whether an eyewitness notices a lone gunman or a co-worker acting suspiciously, anonymous tips allow security personnel to be notified more quickly than normal and to instantly respond and collect more information. Mere seconds can pass between a member of your community witnessing something out of the norm and a full-on emergency, so placing tools in employees’ hands can only help security personnel react faster and more accurately during a crisis.

Card image cap
John Davies TDSi

Video analytics and access control are two key tools in proactive security and prevention of incidents. Integrated CCTV technology, for instance, is perfect for setting up “virtual fences” that detect potential intruders even beyond the perimeter line. Video analytics can also detect if individuals or groups are making unusual movements, such as going the wrong way down a corridor or at an unusual time. Access control is also perfect for people counting, to assess whether a floor or zone is over-occupied (for safety), but also to assist with intruder detection. Biometrics also offer prevention capabilities. For instance, walking gait analysis can be used to detect suspicious behavior or to identify and track a potential suspect as they move around a facility. Automatic license plate recognition (ALPR) also offers useful preventative analysis to track suspect vehicles and to look for unusual behavior, which could warn of potential danger.

Card image cap
Joe Oliveri Johnson Controls, Inc.

While security professionals can’t see the future, there are solutions available that can help mitigate and respond to threats. For example, gunshot detection solutions can easily integrate into existing security systems. While many gunshot detection systems rely solely on acoustic feedback, advanced sensors also look for an infrared flash. This dual authentication improves accuracy and greatly reduces false alerts. With sensors installed throughout a customer’s facilities, critical information can be relayed to occupants — as well as emergency personnel outside — so that the proper steps can be taken to quickly control the situation. By automatically detecting shots, life-threatening delays in response can be avoided.

Card image cap
Jonathan Lewit Pelco, Inc

Security staff may be well trained, but they cannot be at all places, at all times. Watching security video feeds on monitors isn’t a good solution either, because of the proven fatigue factor that can quickly set in. Increasingly, advances in video analytics are giving enterprise security the tools to anticipate and mitigate security risks before they occur. Video analytics technology helps security systems learn what’s normal and what’s abnormal so they can proactively identify unusual and potentially harmful behavior that a security officer may miss. For example, motion detection analytics can identify when there are individuals present in areas where there should be no motion. Loitering detection can be deployed to alert authorities if there is a person standing near an entrance for an unusually long period of time. Advanced facial recognition technology could coordinate with watch lists to see if there is a match, potentially enabling an arrest.

Card image cap
Jana Rankin VuTeur

It is hard to know when or where tragedy will strike. I think a multi-layered approach to security is the key to early warning systems. There is a need to add additional layers of protection to all campuses and buildings, such as social media monitoring and real-time location system (RTLS) technology, to help to serve as an indicator of individuals who could pose a risk to others. Even though RTLS is critical for tracking and communication once an emergency has already begun, it can be used as a preventative measure as well. RTLS can help identify unknown individuals in the building and provide an alert to give people extra time to run, hide and fight. Today, systems can deliver notifications to individuals’ cell phones while an event is taking place. We may not be able to predict all events before they happen, but we should be prepared just in case.

Card image cap
Jumbi Edulbehram NVIDIA

Video surveillance cameras and analytics capabilities are essential components of a security system when it comes to predicting security incidents or breaches. Analytics like facial recognition and license plate recognition can be used to identify people and vehicles that may be known to be security risks from past incidents. Identification of certain objects, especially in contexts where they’re unusual, can also be predictive of security risks. Predictive analytic systems can learn what patterns in the movements of people and objects may be indicative of possible incidents. These systems can learn from past incidents or can be pre-programmed to alert on particular patterns. Predictive analytics can also be based on the integration of information from different systems, such as video and access control. Tailgating is an example of a behavior that may lead to security incidents. With access to total situation awareness, personnel can identify risk-indicating behavior through training and experience.

Card image cap
Michael Sherwood Milestone Systems

Predictive analysis, artificial intelligence, machine learning and deep learning are the current catch phrases. Interestingly, the application of these technologies to areas that are not typically security-related is where we stand the best chances of predicting crime before it occurs. Deep learning of social media is a key example of an element we should be combining with security system components to help predict the “when, where and who” elements of crime. Imagine an individual is posting inflammatory remarks on their Facebook feed that could be indicative as a precursor to crime. Face recognition could be used to proactively notify security personnel when the individual is on premise and to implore additional analysis regarding their location and behavior; i.e., is this a place they would typically visit and what motivations are represented by their behavior? Ultimately, human interaction will be required, but advanced technology must alert humans with the relevant data.

Card image cap
Melissa Stenger

Predicting things before they happen brings to mind the movie Minority Report. While we don’t have “Precogs” to give us the complete picture, technology is advancing quickly to provide tips and cues to allow us to be preemptive in our security. With the revolution of Big Data, the foresight into behavior is even more powerful; from surveillance cameras that learn patterns and report alerts based on learned behavior, to using data to predict a certain behavior that is out of the norm, we are making advancements. Now we can use analytics and human response to give context and create more accurate threat detection. With the number of threats in our society, the need for proactive security has a sense of urgency, and artificial intelligence (AI) and machine learning continue to grow in acceptance and importance. These advancements may even bring us closer to a futuristic level of crime prevention.

Card image cap
Ken LaMarca Active Intelligence

The focus on incident prevention versus detection is a trending change in physical security technology, and advanced video management system (VMS) solutions play a significant role in this new model. As the processing power and functionality of VMS solutions improve, and are supplemented by integrations with advanced software analytics, there are new crossroads in technology where detection and prevention intersect. These capabilities are seen in higher levels of video/data integration and analytics that can automatically detect abnormal behavioral patterns and correlate relationships between otherwise non-related events. And with VMS mobility, surveillance operations can be extended with high quality (30 fps) images using conventional smartphones from virtually anywhere. For example, security guards can take their situational awareness to the next level by using their smartphones to send live video from the field directly to the VMS platform. This also extends the role of the surveillance system to address other operational issues.

Card image cap
Charlie Erickson 3xLOGIC, Inc.

We stress to customers to use systems in a proactive way; that is, don’t just use systems to generate forensic evidence after something bad has happened. We have school administrators who perform a quick video review to see if people were in their buildings at odd hours over the weekend or during holidays. A simple glance at a search screen for all cameras over a weekend will show if someone was in the facility at odd hours. Some of our customers configure their systems to generate a small video clip every time a back door to the business is used during periods when company policy says it shouldn’t be used. Other customers export video at one image per minute and then review 10 hours of video easily in a one-minute video clip. The key is to actively use the system to prevent and solve issues before they become major problems.


Editor Summary

Predicting events before they happen is an important first step toward preventing tragedy. A variety of analytics capabilities, including video analytics and even the use of artificial intelligence techniques, are opening new opportunities for security systems to predict bad events. Our Expert Panel Roundtable shared several good examples that confirm a growing trend. The physical security industry increasingly can provide a new realm of value to customers: The ability to predict the future.

  • Related links
  • ISONAS Access control systems & kits
  • ISONAS Access control software
  • Johnson Controls Limited Access control systems & kits
  • Milestone Video Surveillance software
  • Oncam Surveillance cameras
  • Oncam Video Surveillance software
  • OnSSI Video Surveillance software
  • Pelco Surveillance cameras
  • Pelco Video Surveillance software
  • TDSi Intruder detectors
  • TDSi Access control software
  • TDSi Access control systems & kits
  • TDSi Video Surveillance software
  • TDSi Surveillance cameras
  • Seagate Storage
  • Related categories
  • Surveillance cameras
  • Video Surveillance software
  • Access control systems & kits
  • Access control software
  • Intruder detectors
  • Storage
  • Video motion detectors
Related white papers
Monitoring Traffic Flow: Everywhere, All The Time

Monitoring Traffic Flow: Everywhere, All The Time

Download
The Critical Importance of Trusted Execution Environment in Access Control

The Critical Importance of Trusted Execution Environment in Access Control

Download
How To Ramp Up Perimeter Security With License Plate Reader Technology

How To Ramp Up Perimeter Security With License Plate Reader Technology

Download
Related articles
Physical And Cyber Security Precautions When Traveling

Physical And Cyber Security Precautions When Traveling

Mass Security Screening Technology For Large Events

Mass Security Screening Technology For Large Events

2018 FIFA World Cup Russia Integrates Safety, Security And Service

2018 FIFA World Cup Russia Integrates Safety, Security And Service

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Counter terror
  4. News
  5. Round table discussions
About this page

Leverage advanced security systems to predict threats, enhance situational awareness, and ensure public safety with cutting-edge technology.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec