The end of blind alarms

Issue 3 2020 Security Services & Risk Management, Perimeter Security, Alarms & Intruder Detection

When Hi-Tech Security Solutions was still a fledgling publication, alarms connected to a control room were all the rage in South Africa. Back in those days the only options were having a VHF signal to send alarm signals to the control room, and all the control room could do was radio its armed response (if they had one) to respond and make a landline call to the customer.

These days, the security industry has advanced substantially and our technology can’t be compared to what was available way back then. However, most alarms for households and even businesses still work on the same principle. While the communications mediums used may sometimes be different, the process is the same.

This state of affairs is changing. Today, the vast majority of alarms turn out to be false alarms. Depending on who you ask, up to 99% of alarms raised these days are false alarms caused by pets, wind, people who forget to switch off the alarm when they arrive, and so on.

As Cam Era’s Bill Sandham calls them, ‘blind alarms’ are soon to be a thing of the past. He says today an alarm should have additional technology to ensure that guards are not dispatched to false alarms. The technology Sandham refers to is visual (or video) verification, adding video surveillance to an alarm to allow the response company and/or user to see what caused the alarm and only dispatch a response knowing that something is actually happening.

Sandham launched Cam Era to broaden the reach of visual verification alarm solutions through a franchising operation (see https://www.securitysa.com/61103n for more on the franchising option).

Visual verification does more than prevent the dispatch of armed response units for no reason, it also aids guarding companies in discovering threats that would otherwise be ignored. For example, Sandham says that we are seeing more break-ins coming through the roof. Even when the criminals raise the alarm and an armed response unit is dispatched, the guard probably can’t get onto the property and won’t see any signs of a break-in, and therefore leave. With visual verification, a video clip of the intruders will be available to the company, letting them know there is a real threat, where, how many there are and even if they are armed.

The tools in the package

Cam Era’s offering can work with customers’ current guarding companies or as a standalone operation. The technology used for alarm detection and activation is Videofied, a battery operated motion sensor and camera built into one. Users can also use an app on their smartphone to view video clips and delete ones not required. Sandham also notes that the batteries can last for up to four years, depending of course on how often an alarm is triggered and how often the user views a live video feed.

When an alarm is detected by the motion sensor, an alarm is raised in the PSIRA-accredited control room run by Macado, along with a 10-second video clip from the camera. The operators are trained to handle any situations and can alert the customer, an armed response company or the police – or all three.

The three laws

Cam Era’s operating procedure is based on the three laws of surveillance: detection, recognition and identification (a short video on the three laws can be viewed at https://youtu.be/J_wLDKcB6Uo).

Detection, in which the potential intruder takes up only 10% of the screen, is important even though the image may not allow for identifying an individual. All the user and/or control room needs is an image that makes it possible to determine there is a person in the image and not a dog, for example. This is the core part of visual verification as it prevents any additional actions being initiated, saving time, money and the nerves of users.

Since the Videofied device allows voice communication, the operators can also speak to the intruders, which is often enough to persuade them to leave the premises. Alternatively, the operator can set off an alarm, activate lights or even deploy an industrial fogging system to fill the room with mist, effectively blinding the intruders. Pepper spray is also an option.

Higher resolution cameras are also available for companies looking to recognise or identify people in specific environments, such as retail stores, etc., as well as for those looking to protect perimeters or larger areas using the same technology.

Cam Era franchises are available and Sandham says the franchisees get a complete ‘business-in-a-box’ with everything they need to get their new operation up and running.

To find out more go to https://cam-era.co.za/




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Security Services & Risk Management
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...
Linking of security officers by security businesses
PSiRA (Private Security Ind. Regulatory Authority) News & Events Security Services & Risk Management
[Sponsored] By law, all security businesses are required to declare their employees to PSiRA so that they can be accounted for administratively. Failure to link employees by security businesses is a contravention of the Code of Conduct and a criminal offence.

Read more...
AI augmentation in security software
Security Services & Risk Management AI & Data Analytics
The integration of AI technology into security software has been met with resistance. In this, the second of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...