Surveillance technology that’s as blind as a bat

Residential Estate Security Handbook 2018 Perimeter Security, Alarms & Intruder Detection, Integrated Solutions, Residential Estate (Industry)

It’s actually a myth that bats have very poor eyesight. In fact, some species have very good eyesight. But what really allows a bat to be so highly attuned to its surroundings, able to safely navigate their way through forests, and be aware of other objects and animals in their immediate environment is highly sophisticated echolocation. This natural sonar allows bats to ‘see’ their environment even in complete darkness through the echoes returned from their high-pitched shouts. In radar technology, echolocation is used in a similar way to identify moving objects in low- or no-light situations.

Defining radar technology

Often associated with high-tech military equipment, radar systems have now been developed to strengthen commercial security systems or applications such as weather forecasts, road traffic monitoring, and collision prevention in aviation and shipping. Inspired by its uses in the automotive industry, namely in autonomous vehicles, security companies have been integrating radar into their offering for surveillance systems. This so-called ‘blind’ detection equipment provides accurate data with regards to speed, velocity and angle of travel of an object.

Called a ‘blind’ technology as it cannot visually define objects, but can detect them, a radar device transmits signals consisting of radio waves. When the radio waves hit an object, the signal is reflected back to the radar device, where it will be detected by a receiver. This enables the technology to provide information on an object’s position and determine its speed, size and direction.

At the same time, the information given by the radar enables PTZ cameras to automatically follow the object. This information can further help differentiate between humans, animals, vehicles and other objects.

Benefits of radar detection

Technologies that remove the need for manual human verification can help organisations cut costs. By being able to automatically detect something that has entered an area and distinguish whether or not it is a real threat without sending out security teams, costs and resources are saved.

Motion detection with radar differentiates itself from standard motion detection, as the former picks up on the changes in electromagnetic waves instead of pixels, which can help reduce the number of false alarms. One way to understand this is by looking at what doesn’t trigger a radar instead of what does. It will not be set off by a slight change in image pixels, like a visual camera does when lights, a spider web or a fallen branch come across its field of view. Instead, it’s about the radio waves bouncing off certain objects and back to the radar’s receiver.

By being able to set sensitivity levels on radar products to detect larger objects, an alarm will not, for example, be triggered by a rabbit, cat or other small animals that run through the perimeter and pose no threat. Similarly, it will not miss a real threat if the camera is pointed in another direction or a security guard is not paying attention. The technology works as an added layer of detection to complement and strengthen visual surveillance systems, resulting in a more accurate and reliable security system.

One typical scenario involves an initial video recording being triggered once an intruder has breached a perimeter. In doing so, all movements are captured, but an alert will only be sent if the trespasser goes through a pre-defined high-priority area.

Radar technology in action

Modern radar surveillance systems work well in wide open areas with moderate activity. Large stores that have big outdoor areas, such as warehouses, which often keep stock outside but are closed at night, can benefit from adding radar technology to their surveillance systems. Where light conditions are poor, the technology can still enable detection of objects passing through the area.

Again, in this scenario the radar’s information can be used to trigger a security sequence if the threat is authentic. Radar can automatically steer a PTZ camera so that it keeps track of the detected object. Floodlights can come on to scare the intruder and provide light for improved image quality, with an accompanying horn speaker telling the intruder they are being watched.

Blind technologies, such as radar, should be used in conjunction with other technologies, complementing visual and thermal video ­surveillance to support and optimise the ­security system. It will be interesting to follow how this technology can be further integrated and add value to the surveillance industry.

For more information contact Axis Communications, +27 11 548 6780, sasha.bonheim@axis.com, www.axis.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Intelligent access at the gate
Access Control & Identity Management Residential Estate (Industry)
LD Access provides a smart, streamlined approach to boom gate security, enhancing the verification of people and vehicles before entry. Through its Self-Service Scanning Kiosk and Mobile Scanning Unit, LD Access delivers secure, automated access control.

Read more...
Risks of open-source intelligence escalating in crime
Security Services & Risk Management Residential Estate (Industry) Smart Home Automation
CMS estimates that open-source intelligence has played a role in 20 - 30% of robberies over the past 12 months. In cybercrime, global research consistently shows that many offences rely on some form of open-source data exploitation.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Risks of fire safety in residential environments
Fire & Safety Residential Estate (Industry)
ASP Fire is highlighting the significant fire risks in residential environments and stressing the importance of proactive fire-safety management at the household level.

Read more...
Inaugural Command the Future event in Cape Town
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security Africa’s inaugural Command the Future 2025 event was a resounding success, reinforcing Gallagher’s commitment to innovation, collaboration, and long-term growth in Africa’s rapidly evolving security industry.

Read more...
VM2 vibration detection monitor
Stafix Security Centres Products & Solutions Perimeter Security, Alarms & Intruder Detection
The JVA VM2 is a perimeter intrusion detection system designed to monitor one or two zones of microphonic (acoustic) cable to detect a perimeter breach through the noise and vibrations created by unauthorised access or vandalism.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.