Remote Possibilities

Using remote video surveillance reshapes physical security

A security guard doing his nightly rounds on the perimeter of a power plant encounters a car left in a restricted area outside the security fence. The driver is nowhere to be found. Is this a threat?

The guard takes a snapshot of the license plate on his smartphone, places the image in a secure directory that initiates a search of the license plate recognition database. When the license plate is found, it also brings up an image of the driver license associated with that vehicle. The command center forwards this information to the guard’s smartphone while he continues his tour and eventually locates the owner of the vehicle. He compares the driver license image to the person standing in front of him. If the two match, the security guard politely escorts the individual back to his car and sends him on his way. If the photo and the individual don’t match, or the command center has issued detention instruction because the person is on a watch list, the guard detains the individual until law enforcement arrives.

This flow of information between a central command center and the front lines is a prime example of remote video surveillance in action. The command center observes the video streaming from multiple locations and directs the attention of on-location staff to a particular event. Headquarters may provide additional video content analysis to the field and assist in an ongoing investigation while security in the field provides up-to-date intelligence about the situation as it unfolds.

As remote surveillance technology becomes ever more prevalent in applications ranging from city center security to mass transit safety, we’re seeing more security resources shifting from the command center out to the field. With robust wireless technology and advanced mobile devices, it’s now possible to stream high-quality video in real time to staff on the front lines.

Top Remote Surveillance Configurations

There are a variety of deployment options when it comes to capturing video remotely, storing and cataloguing it, and then displaying it on mobile devices. The three most popular are the managed/ hosted/virtualized approach, the central station automation platform, and the video management system.

  • Managed/hosted/virtualized approach. In this configuration, the video servers are housed in a private or public cloud, where they can be shared and virtualized for more cost-effective use of resources. Instead of dedicating servers just for surveillance, these same servers can be repurposed for other applications on the fly as video storage demands peak and ebb. It’s an elastic cost model because you pay a monthly fee based on actual usage. The advantage of the hosted solution is that your service provider is contractually bound to provide service levels that you may not have the internal resources to guarantee yourself. The agreement not only addresses quality of service and uptime requirements, but also data security, disaster recovery and other critical issues to ensure business continuity.
  • Central station automation platform. This type of remote surveillance solution is primarily event based. It integrates video surveillance with other physical security systems such as intrusion detection and door access control to help you verify that an actual event is taking place. This approach helps avoid any municipal-driven fines for responses to false alarms, which can be a boon to the bottom line. If the central station receives an alert indicating that there’s been motion detected or a door contact opened or other anomaly, the video cameras that are closest to the detected event can stream live images back to the station. The operator can then relay that video to security guards on patrol so that they have the critical situational awareness necessary to safely investigate the event further. The central station operator can also stream the video to company managers who can decide whether to call local law enforcement or handle the situation internally with security staff already on the premises.
  • Video management system. This is the most common remote surveillance solution for medium to large-scale operations with 100 or more cameras. In this case, the complex cataloguing of video and detailed search functions would be handled by an in-house central command center. It might include smart-search technology such as object-left-behind and video analytics that would incorporate such things as license plate capture and recognition systems. Video clips could be sent to mobile devices via email or text messages, allowing the remote security staff to click on a link to view the video stream. Or they could initiate a search of the video database or view a live feed from a particular camera directly on their mobile devices.

Are They Secure?

Security is a justified concern when it comes to streaming highly sensitive video. So it’s important to employ strict security protocols on the network itself as well as on the network cameras and remote mobile devices. The network—whether wired or wireless— should incorporate encryption of the video stream. Every port also should employ authentication techniques such as 802.1x protocol to prevent unauthorized access to the network, hijacking of the video to an unauthorized device or denial of service attacks on the network.

Camera manufacturers are currently taking steps to tighten security even further. The industry is moving toward network cameras that support public key infrastructure similar to those used for physical access control. Certificates and credential verification will be used not only to determine who can remotely access and manipulate the network cameras but also who will be authorized to view that video on their mobile devices. Employing this kind of identity verification process will virtually eliminate the possibility of video hijacking.

Does Remote Streaming Hog Bandwidth?

Another concern that security professionals often raise is in regard to bandwidth consumption. Can the network really handle video traffic streaming to mobile devices without bringing other network activity to a standstill?

The answer is yes.

Because of their small-screen form factors, mobile devices don’t require much bandwidth to render a decent video image. With such a small display, you can actually stream video at a lower frame rate and still have the eye perceive the video as running in near real time. The other thing to consider is that your video management system—whether an in-house system or hosted by a service provider—is smart enough to control the transmission to minimize bandwidth consumption. When there’s limited bandwidth available for video traffic on the network, the video management system can throttle back the frame rate and image resolution on the fly and still provide an adequate stream to the mobile device.

Making a Difference Remotely

Remote surveillance has become a force multiplier for many security situations—from screening and apprehending criminals at venue checkpoints to validating alarms and verifying the identities of after-hours intruders at a retail store or warehouse. They can help track down stolen objects by streaming video to security guards of any activity occurring during the estimated window of opportunity to help focus the investigation. But there are also some amazing out-of-the-box applications where remote video surveillance has saved lives and livelihoods.

  • Medical emergency. Sirens blaring, EMTs rush to the aid of a man suspected of having a stroke. His life hangs in the balance as the ambulance speeds to the nearest hospital some 30 minutes away. As paramedics hook him up to life support, network cameras inside the ambulance are transmitting high-resolution video and vital signs to the emergency doctor on call at the hospital. He quickly triages the patient, confirms their initial diagnosis that the patient was experiencing a stroke, and directs EMTs to administer lifesaving medication. Because of the remote surveillance, first responders are able to avert irreparable brain damage and save the patient’s life in transit. Treatment continues once the man arrives at the emergency room, and he achieves a full recovery.
  • Troubleshooting production line. Manufacturing downtime can cost a company thousands of dollars a minute. So getting the production line back up and running as quickly as possible is paramount. For companies operating multiple remote manufacturing plants, it’s often more cost-effective to locate highly paid support specialists in the home office rather than fly them to a site or hire a full-time expert for each facility. With network cameras strategically deployed on the manufacturing floors, troubleshooters at headquarters can view live video, remotely diagnose a problem, and help in-factory staff resolve it themselves.

For instance, from the surveillance command center the support technician accesses the cameras with the best field of view of the situation, zooming in for a closer look at the warning lights flashing on a control panel. He sends the appropriate schematics and tutorial repair videos to the staff on the ground, talking them through the steps they need to take to fix the problem. Monitoring the live video streaming from the remote cameras, the technician can verify and correct local staff activity in real time to minimize delays in getting the machinery up and running again.

The Increasing Role of Mobile Devices

Mobile devices have become key components of remote surveillance— not only to provide enhanced situation awareness with real-time display and camera control but also to deliver safety and operations information about the resilience of your business. Multiple mobile industry reports predict a significant uptick in mobile device usage in the next five years. These reports forecast that by 2016:

  • Mobile broadband subscriptions will reach nearly 5 billion, mostly on HSPA, CDMA and LTE networks;
  • 75 percent of all physical security network video will be accessed via mobile devices;
  • Almost all smartphones will have touch screens;
  • Smartphone “digital wallets” will account for most in-store purchases made in the UK; the United States is expected to follow suit.

There is a caveat, however, when it comes to relying on the resilience of public and private networks for remote surveillance solutions. The Security Industry Association recently reported that “a surprise earthquake that hit the East Coast last summer not only interrupted cell phone service for millions of citizens, but an emergency cell phone service available only to select federal and municipal employees also failed.” So you should have a backup plan in place in case of catastrophic network disruption.

Shaping Security Remotely

Remote video surveillance balances the best of both worlds: the efficiencies of centralized storage and analysis with the immediacy of feet-on-the-ground investigation. While the command center can do a look-in on a particular location, it can also, more importantly, share information in real time with staff at local checkpoints while they’re in the field. The command center houses the processing power to expedite searches and perform data-intensive analysis. And operators can push those results to mobile devices in real time to provide critical insights to those onsite pursuing an investigation.

With today’s wired and wireless networks becoming ever more robust, capturing full-motion HDTV-quality video is quite doable. Intelligent video management technology helps to conserve bandwidth by streaming video to remote mobile devices at a reduced frame rate and lower resolution without compromising situational awareness.

Security protocols continue to evolve to protect video data on the network as it travels from network cameras to the command center to mobile devices. Implementing port authentication and soon-to-be-available certificate verification infrastructures will allow companies to credential users of their video surveillance system in much the same way they authorize employees to access other programs on their networks.

And finally, with heightened awareness of security threats, so many venues are promoting a campaign of “See something. Say something.” With strategic deployment of network cameras at a facility or event venue, when a bystander reports an incident, eyes on the target can help security verify the situation remotely and stream the evidence to staff on the ground so they can respond accordingly.

This article originally appeared in the February 2012 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3