Lethal tech combo to fight crime

July 2016 Infrastructure, Surveillance, Integrated Solutions

With countries across the globe continuing to face difficult economic conditions, high crime rates are adding to the climate of risk and uncertainty. While CCTV systems are being installed to protect schools, banks and other public facilities, is the answer as simple as just adding more cameras?

Jean Turgeon.
Jean Turgeon.

How are CCTV systems making us more secure? Jean Turgeon, Avaya’s VP & chief technologist, software defined architecture, speaks about CCTV, crime and whether anyone has the lethal tech combination to fight crime.

Millions of CCTV systems are being deployed around the world to catch criminals. Why is it still not working?

Turgeon: Deploying more security cameras can only help in discouraging people from committing crimes – knowing they are more likely to be caught on camera – but what is really important is the quality of the video provided, the use of analytics to help prevent crimes, and ensuring that installed cameras eliminate blind spots.

CCTV has evolved tremendously from the old days of analogue, which for the most part didn’t provide the right level of required quality – so it was difficult to clearly identify individuals, but also hard, if not impossible, to perform real-time analytics. With the evolution of CCTV, cameras now offer extraordinary definition, for instance a licence plate can be read clearly from hundreds of metres away. Even in dark conditions, video surveillance can capture amazing quality images, allowing analytics to be performed in real time.

The transition from analogue to digital, combined with the IP enablement of deployments, provides many other key bene-fits. Centralised digital recording of high definition video, which can easily be time-stamped and indexed, not only allow whoever is committing the crime to be caught more easily, but also help authorities be much more pro-active by fully leveraging real-time analytics.

Now suspicious individuals can easily be detected and tracked, while security authorities can be notified to hopefully prevent crimes from happening. This is big data: as you combine the video surveillance data with other relevant databases such as criminal records, arrest records, or whatever, one can easily imagine how positively impactful this technology can be to our citizens. The more CCTV we deploy, the more capabilities the world has to fight and prevent crime.

Experts say that without a strong network to support all these CCTV deployments, we continue to be at risk. Can current legacy networks support more advanced CCTV applications or do we need to look at other solutions?

Turgeon: Legacy networks were built with a series of protocols running on top of each other to meet some of the security or virtualisation requirements. For the most part, the legacy networks used a concept of unicast to communicate – think of it as a one-to-one conversation. This is very efficient in a client/server-type environment, where the PC or device communicating is communicating with one specific server application. Now imagine this model in a CCTV implementation, where thousands of cameras need to be deployed, causing thousands of network unicast flows to be sent to the recorder and likely to a series of monitoring stations, even potentially to a police department. One unicast stream can quickly turn into three; hence it becomes very inefficient in this type of deployment.

If a camera is not used for monitoring or analytics, but only for recording – for audit purposes for instance – then unicast can likely meet the business needs. Where it gets more challenging is when your the business requirements demand not only recording, but multiple monitoring stations, and other agencies want to gain access to some of the video feeds too.

In such cases, multicast technology will come to the rescue. However, this unfortunately comes with more complexity as more protocols are required to run these IP flows in a multicast mode: protocols such as PIM-SM, OSPF, VLANs with IGMP snooping, and so on will be required to be designed and implemented on the network.

At this point there are two challenges: the recovery times when a failure occurs and the complexity associated with a network that requires 5 000 to 10 000 or more IP video surveillance cameras running multicast.

Recovery times due to the inter-dependency of all of these protocols can be as long as 35-40 seconds; potentially losing video recording for such a length of time makes audit capabilities pretty much impossible, and may make the video source invalid in a court of law.

Rather than deal with the complexity associated with all these protocols needed to support multicast configurations, many organisations will choose to stay away from multicast deployments and opt for smaller separate physical networks. This is less than ideal if you are attempting to reduce your TCO.

The good news, there is a solution available in the market, which is based on an IEEE (IEEE 802.1aq) and IETF (RFC 6329) standard that eliminates the needs for all of these protocols and allows a much simpler deployment with extremely fast recovery times in the range of 150 to 400 ms. Not just that, this solution brings scales to new levels where in excess of 14 500 multicast streams have been tested and validated running over a single physical network infrastructure. For customers that need multicast, they have to very seriously evaluate this technology.

Does CCTV + Network = lethal weapon against crime? Or do we need to go deeper and focus on early notification systems and communication-enabling processes if we are to find the right answer?

Turgeon: The combination of CCTV deployed over a highly scalable and reliable network is definitely beneficial and can largely contribute to reducing crime and potentially pro-actively preventing it. But, where the technology gets really impactful is when you also add real-time analytics integrated with business process automation. It is great to have analytics detect some abnormal behaviour, but when this becomes incredibly powerful is when an automated workflow can be triggered based on the situation analysis.

Imagine that somebody is attempting to steal something from a store – this could be detected by real-time monitoring and real-time analytics, triggering a workflow that could address the incident without human intervention. For instance, the workflow could automatically order other cameras to track all movements of the suspect, while integrating the video stream to a mobile video conferencing system that could provide full visualisation to security guards or police officers on a smart device. The system could also trigger a store lockdown through SIP-enabled door locks, sound an alarm, enable a strobe light, trigger an alert through paging systems – whatever is required.

In simple terms, the lethal weapon is when you combine a highly scalable, reliable network infrastructure optimised for multicast to support thousands of IP video cameras, with a business process automation system allowing you to customise the desired business outcome.

This is all possible today from Avaya. It is the combination of our SDN Fx architecture and Breeze, the latest iteration of our Engagement Development Platform (EDP). Business process automation and customisation over an automated network optimised for CCTV leveraging multicast makes a very powerful combination today. Now, that is lethal to crime.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
ONVIF to end support for Profile S
News & Events Surveillance
ONVIF has announced that it will end support for ONVIF Profile S and recommends using its successor, Profile T. Profile S is the first-ever profile introduced by ONVIF in 2011.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
New Edge AI Plus PTZ cameras with analytics
Products & Solutions Surveillance
IDIS has unveiled two new PTZ cameras that are NDAA-compliant, delivering AI auto-tracking, rapid 40x zoom, EIS image stabilisation, and advanced automated AI functionality.

Read more...
Understanding shared responsibility
Infrastructure
Data management is increasingly coming under the governance spotlight, yet a significant vulnerability often goes unnoticed. Many businesses operating on Microsoft 365 assume their data is comprehensively backed up.

Read more...
Direct-to-cloud surveillance platform
Surveillance Infrastructure
Oncam has announced a forthcoming end-to-end, direct-to-cloud video platform that combines AI-enabled cameras, intelligent IoT devices, and cloud-integrated video management software to deliver smarter performance with reduced complexity.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.