Intelligent Video Solutions for Campuses

The promise of AI enabled video in academic settings centers around finding solutions to the social issue of school gun violence. 2018 was in fact the worst year for gun violence by number of incidents in our nation’s history, and this reality is driving demand for innovative campus security solutions. Intelligent video technology facilitates school safety through integrating already existing systems such as security cameras, fire alarms and sprinklers, and automatic door locks. By integrating data from multiple sources and sensors, cloud security platforms can discover new insights and make predictions. Basically, intelligent video has the potential to bring campus security from reactive to proactive.

These intelligent video platforms combine cloud and AI to bring data in closer relationship with each other. Video and sensor data are aggregated to perform analytics functions, allowing a type of machine learning to occur which has the effect of improving efficiency and overall security. While conventional school security measures were designed to function as forensic evidence after the fact of an incident (video to be used by the police and the court systems), these newer “smart” systems aim to go after problems before they make themselves manifest. Using video and IoT sensor data in the cloud, data is analyzed in real time and in aggregate, something human operators simply can not do fast enough to be effective. This allows the campus to identify patterns to help the platform better point out salient insights as it learns over time.

Using a cloud based solution for campus security also makes sense with regard to maintenance and upkeep. On-premise security architecture requires manual updating of software on each server, whereas a cloud system takes its updates automatically from the cloud. The updates are simply scheduled during closed hours as automatic, which reduces the amount of IT manpower needed and allows IT staff to remotely work on the system.

Another benefit of cloud based security is how scalable these systems are. As a campus expands and adds more doors, entry points and etc., the cloud is more than capable of expanding along with any new hardware that is added.

These systems also reduce the need for staffing in large campus security operations. Due to the integration of data from multiple types of sensors, less humans are needed in the response chain to initiate lockdown procedures, active shooter response, and other incident protocols. When integrated with an automated door locking system for instance, the platform can communicate a proactive response in an active shooter situation faster than any human team and lockdown to prevent entry as it alerts the human security element or the police.

——————————————————————————————————————————————

Security Technology of South Texas has the direct experience and skilled team to integrate a cloud based security solution into your school or campus. We meet with relevant staff to design custom, turn-key solutions from the ground up and offer the reliable and reachable service you need for these critical systems.

——————————————————————————————————————————————

Contact us at admin@gostst.com on our website or via phone at 210-446-4863 24/7

Security Drones Out in Force with NYPD

29 officers have been trained and licensed to operate 14 drones for the NYPD in a unit known as the Technical Assistance Response Unit. These drones will perform a wide variety of tasks such as monitoring both vehicle and pedestrian traffic, surveilling large events, search and rescue, and assisting in other miscellaneous emergencies. It has been a little while since we looked at the emerging market for security drones. It is still true that security drones require human pilots to be effective in a police force, and it is worth clarifying that these UAVs are not autonomous.

The idea is for the drones to act as an advanced party to a crime or emergency scene. Drones having eyes on the situation first gives incident commanders the chance to see what they are getting into before they jump into danger. Unlike in China, where drones disguised as doves watch every living thing in Beijing, these 19 drones will not be used to perform warrantless surveillance, though many still suspect misuse to occur anyway.

Two of the drones are quadcopters with zoom-in cameras and thermal imaging capabilities. The remaining drones are smaller, with one being relegated to training purposes. NYPD has said that these drones are for special situations and not for routine patrol or for use in traffic enforcement. They also claim they will never attach weapons to these machines or use the drones themselves as weapons. Whether or not that is a promise that sticks remains to be seen.

Drone use by police is certainly not new and not just for big city departments anymore. The Center for the Study of the Drone at Bard College has shown over 900 law enforcement agencies with deployed drones at the time of their study. However, that scale of drone surveillance still pales in comparison to what China is executing, and for that we should probably be grateful.

 

Security Technology of South is proud to offer integration of security services and custom solutions for any and all security needs.

Please contact us through email at admin@gostst.com on our website or via phone at 210-446-4863 24/7

How Facial Recognition Will Affect Our Daily Lives

 

Although Apple faced a major PR incident when it revealed its Face ID unlocking feature for the iPhone X, industry experts remain confident that the technology behind the feature will change the game and be here to stay. The system, infrared powered facial recognition, unlocks the phone and performs several other functions as well.

Facial recognition is increasingly popular, especially in China. Megvii Inc. is a Chinese facial recognition startup that through the Chinese and Russian governments and investors raised over $460 million to develop enhanced facial recognition for government use. In an inversion of usual trends, the technology is really still just emerging in the West even as it explodes in Asia. In the East these systems are already quite well established and are used by everything from state security forces in India and China to commercial banks, restaurants, and stores. In some stores in China, you simply take what items you want out of the store and a facial recognition system automatically debits your account for your items. The technology sees extensive use by the police, who have AR glasses which perform facial recognition and project information onto what the user sees in the physical world.

 

Security

Here in the West we still hold on to the idea that to some extent privacy is a natural right, and therefore are more sensitive to infringements of that privacy. In China, face scanning has become the norm for things like accessing buildings, buying tickets, travel and more. Situations where we are still using RFID or other forms of identification are now primarily handled in this way. In fact, “a recent article in the South China Morning Post [said], the Chinese government has been working on a system since 2015 which it claims can use CCTV surveillance cameras to identify any one of China’s 1.3 billion people within three seconds — and with at least 88 percent accuracy.” (securitytoday.com)

 

Before this, during the 2013 Youth Games at Nanjing, police monitored 13 stadiums and their surroundings using an IoT network powered by Chinese company Huawei. This was linked to CCTV systems, drones, and cameras mounted on vehicles. Now with the added factor of AI face recognition software, experts believe that with improvement this could create a collective or collaborative security.

 

At home

“As IoT connected ‘smart homes’ become more and more common, we are likely to see a number of facial recognition applications emerge. One of the most obvious will be in the field of home security. People are more concerned about security than ever before, and home security systems account for an estimated $47 billion in global sales annually.” (securitytoday.com)

As in the previous case we looked at in China, collaborative security networks can be developed throughout interconnected neighborhoods. Facial recognition can ID strangers to an area or home, alert neighbors, and signal security or law enforcement. This technology can also notify during emergencies of other types and even provide some monitoring for children and the elderly.

In a commercial setting

Like we already looked at, facial recognition is becoming the standard in the East in places such as China and India for things as commonplace as setting up bank accounts or even entering public restrooms. We are already seeing this spread West. As many as 25 percent of stores in the UK were using this kind of software as far back as 2015.

These systems were originally to catch shoplifters, but is now used increasingly to verify identity in high end stores and banks. “In Hangzhou [China], Alibaba has launched a ‘smile to pay’ function in KFC restaurants, designed to attract younger, tech-savvy customers and reduce waiting time and staff demands through automation.” (securitytoday.com) These are the kinds of things we should expect to see in the coming years in the U.S. as far as this technology goes. What’s more, this data will be amassed and used as “big data”, processed and used in algorithms to predict customer behavior based on things like body language, facial expressions, and time spent in different parts of a store. Soon we will have no real way of knowing what information is being gathered about us and what is being done with it.

Please contact us through email at admin@gostst.com  on our website or via phone at 210-446-4863  24/7 to schedule a consultation.

Source: securitytoday.com

Security in the Age of the IoT

 

It is certainly no secret that cybersecurity is ever increasingly a focal point for security professionals. It is now no longer on the periphery and is of serious concern in the video surveillance market. Because of this blurring of the lines between hardware and the digital realm (cloud), a competent security integrator needs to have a team that understands the interplay between the two and can make the best design decisions possible.

Hackers have known for quite some time that video surveillance cameras are some of the easiest to breach pieces of internet connected tech out there. Indeed, there are entire websites devoted to indexing the IPs of unsecured cameras and access control systems around the world. People are going online, without any technical skill, and doing things like turning the lights on and off in stadiums and spying on people though the camera they have placed in their living room.

But many security integrators and dealers lag behind in this area. Although manufactures can be relied on to a point, having at least one member of the team with the know-how to encrypt drives and understand authentication applications is a must. For example, two-factor authentication, now coming standard on some servers, uses “two PIN codes added to [a] Windows Server login — one as a primary password, the other a randomized PIN generated by [a] paired smartphone app, giving integrators an added layer of security”. ( www.sdmmag.com )

Being able to link a system to a two-step authentication through a specific cell number is a pretty strong defense against hackers, who traditionally access these systems through manufacturer back doors, “zero-day” exploits, or simply by using “packet sniffing” programs to watch your traffic and pull the IP and MAC address on your devices.

The prevailing opinion online seems to be that those dealers/integrators who do not keep up with this virtual counterpart to the physical systems they install will risk putting in systems that could be compromised and even lost to hackers. As the IoT expands and proliferates there will be many more individual possible weak points to conduct a security breach against in a network. STST makes use of a wide array of IoT-like devices already, as do many other companies and industries. Mobile connections can be used as backups for hard-wired connections in security solutions but are more critical when a system needs to include 24/7 personal video and control access to a user or users wherever they are. The security industry in general is likely to become increasingly centered around the usefulness and convenience of mobile communication tech, as many of us certainly seem to be already with our personal and social lives.

Security Technology of South Texas is happy to offer custom access control and surveillance solutions with video analytics to the greater South Texas area, designed either turn-key and from the ground up, or integrated into an already existing series of cameras.

Please contact us through email at admin@gostst.com on our website or via phone at 210-446-4863  24/7 to schedule a consultation.