securitylinkindia

Securing Outdoor Assets with Trusted Alerts

Safeguarding outdoor assets in a reliable and cost-effective manner often comes down to a single requirement – accurate intruder alerts and timely information about the unfolding event. While there are many technologies available for outdoor security, smart cameras with video analytics have emerged as the solution of choice for detecting intruders in real time outdoors. Yet the best technology will be handicapped if the alerts generated cannot be trusted. Repeated false alarms can eventually condition security operators to ignore real intrusions, undermining trust in the perimeter security system. In most cases the shortsighted response is to single out the security force as scapegoats, which ignores the real problem – alert fatigue. After responding to hundreds of perimeter breach alarms that turn out to be nothing more than small animals or windblown branches, even the most conscientious security guards lose confidence in the system and start to ignore its warnings. There is no longer any reason for this situation to exist. This design guide relates how smart video security technology, when properly deployed according to best practices, can cost-effectively protect outdoor assets with high accuracy and low nuisance alerts to help security forces stop intruders before they act. Start with the best detection: Use smart thermal cameras Viable outdoor security must start with a sensing system that is accurate, 24-hours per day. For this reason, conventional wisdom asserts that smart thermal cameras are the best system for detecting intruders outdoors. This is because thermal cameras see heat rather than light, so they are a perfect ‘human detector,’ and will ignore headlights, reflections off water, and other light-based activity, expanding their usefulness from their traditional role as night vision cameras to 24-hour intrusion detection solutions. Smart thermal cameras with built-in video analytic software offers several advantages: They detect in the dark with no need for costly artificial lighting. They work 24 hours/ day. They ignore reflections, shadows, moving headlights, direct sunlight, and other light-based phenomena that can trigger alarms in a visible camera detection system. Because humans give off heat, thermal sensors are far more effective in spotting a person than visible cameras. They detect body heat as far away as 600 meters – a third of a mile. A single thermal camera can protect an area the size of a football field. Proper physical design makes them immune to the effects of weather and other environmental factors. In the past, the higher price for thermal technology limited their use in commercial applications, but as costs continue to fall, many organizations are now able to choose thermal cameras as the foundation for their outdoor detection applications. Geo-registration and detection accuracy Smart thermal cameras are designed to detect movement, but outdoors, everything moves. A smart camera must be able to tell the difference between small objects such as leaves or debris and a person entering a secured area. One of the best ways for a camera to make this determination is through ‘geo-registration’ which provides the actual location and true size of all pixels in the camera’s field of view. Consider how human vision works: Our eyes give us depth perception – we can tell which object is close and which is far. But a ‘one-eyed’ camera can’t, unless it’s geo-registered. For example, a small animal near the camera will look much larger than a man at 300 meters away. (Figure 1) A smart camera needs to ignore the animal at right while alerting on the distant person, even though the animal will cover more of the camera’s field of view. The same approach applies to blowing trash, clouds, and other moving things which are always present outdoors. With a camera that is geo-registered, such non-security related movement will be ignored and will not send alarms. Essentially, geo-registration enables a three-dimensional capability for a smart thermal camera. From this information, geospatial analytic rules can be used to eliminate movement based on size while still detecting human-sized intruders under all conditions. Geo-registered analytics in action: From-to Zones Motion zones are often used by video analytic systems to detect the movement of objects and to send an alert to notify security that an intruder has been detected. By default, any object moving within a motion zone triggers an alarm. However, when used for outdoor applications, motion zones can lead to an abundance of nuisance alerts because they lack the discriminating intelligence to recognize the difference between ‘unimportant’ movement caused by the natural environment and ‘relevant’ movement that represents a security threat. Cameras that are geo-registered can create more intelligent rules called From-To Zones, an important tool for reducing nuisance alerts while maintaining a high probability of detection. Targets detected in a From-To Zone will only trigger an alarm when a specifically sized object – such as a person – moves from one zone into another defined area of the camera’s field of view. Correspondingly, objects that are not detected coming from one zone into the other are ignored. From-To Zones are a very powerful method for reducing unwarranted alarms. Importantly, they can be configured to detect zones that are geo-registered to the ground. This means From-To Zones will only alarm when a person’s feet have been in the ‘From’ and then enter the ‘To’ area, while ignoring detections that only show a part of a person such as their head. This is particularly useful when the security area includes a fence, and you only want to detect pedestrians who have crossed over the perimeter into the security zone. To see how From-To Zones work in the real world, consider an application where you need to detect pedestrians approaching the perimeter, but are not concerned about people leaving the building. With From-To Zones, the camera will only trigger an alert when intruders move towards the facility – ignoring everyone else, and greatly reducing unnecessary alarms. For another example, consider a windy perimeter around an active construction site where trash blows around the scene. Inevitably, the trash will collect along the fence and grow in size…

Read More

Reasons to Upgrade Access Control Technology

The security landscape continues to evolve in new and complex ways. This evolution brings change on many levels, which offers an opportunity for improvement rather than an interruption or a distraction. This concept has never been more important as you face today’s combination of new technologies, escalating security threats and the need to derive greater value from the access control infrastructure while solving increasingly complex system integration challenges. Upgrading from older, legacy technology to a new access control standard is a significant initiative. However, recent advancements have made this transition easier. Organizations can now move from solutions to more dynamic access control technologies that provide greater value. Adopting a new technology standard allows organizations to take advantage of enhanced functionality and a higher level of security. Access control is moving to more integrated systems with multi-layered security that can include multiple facilities. Today’s more dynamic solutions allow organizations to embrace new levels of convenience and utility. Organizations need not only support the requirements of today, but must also look ahead to the needs of tomorrow. The initial motivation to adopt a new standard of access control may be to improve security or to consolidate multiple locations under a single standard. Now is the time to use advances in access control to build a foundation for addressing unanticipated change and evolving security threats. Strong organizations will take full advantage of the opportunities that upgrading to a more modern solution affords. Reasons to upgrade Data privacy As a result of new legislation or regulatory requirements, an organization may be required to increase its security. Similarly, if a company acquires a new client needing a high level of safety, there may be requirements to improve access control. New building tenants may also trigger the need for greater building or campus security, either to protect the parent organization or to comply with the tenant’s requirements. Implementing new, more dynamic access control technologies provides many benefits over maintaining older, more static ones. Organizations are facing an environment of evolving threats, and the challenges of maintaining the security and privacy of identity data are ever greater. Growing demand for a higher level of security and the convenience of using mobile devices for access control is driving change and spurring innovation. The unfortunate reality is that sometimes it takes an unexpected event or security breach to prompt an organization to upgrade their access control system. By making the right steps in moving toward a more reliable, upgraded access control standard, organizations can meet the need for security and privacy with confidence, leveraging investment well into the future. User convenience The freedom to move access control to phones, tablets, wristbands, watches and other wearables offers choice and convenience to end users, along with new and more convenient ways to open doors and gates. Today, smart devices are always on hand. Users do not have to maintain and carry multiple cards or keys. In parking garages or at driveway gates, for example, the longer reach of the Bluetooth smart communications standard makes it possible to drive up to the gate without having to roll down the car window and reach out to activate a reader. Some smart device sensors, most notably the gyroscope and accelerometer, enable gesture detection. This offers an additional benefit for access control – the ability to open doors from a distance by performing intuitive gestures. This provides an extra layer of authentication for added security. It is predicted that there will be nearly 155 million smart wearable devices in use by 2019. These truly ‘always-on’ devices are even more natural candidates for access control applications because of the ready-to-use convenience of a wearable device. Flexibility Organizations need a platform that is flexible enough to support multiple applications for managing not only physical access (e.g., buildings) but for managing logical access (e.g., computer/ software login, time and attendance, etc.) as well. Organizations that want to add new applications such as time and attendance, secure print management, biometrics, cashless vending and more, will need to issue an associated card to users. This requirement can be used as an opportunity to migrate to a contactless wearable or smartphone that combines access control with these or other functions, enabling employees to carry a single device for many purposes. Administration of these functions should be centralized into one efficient and cost-effective system to enable organizations to create a fully interoperable, multi-layered security solution across company networks, systems and facilities. In the future, they can migrate to the convenience, editability, and security of carrying digital keys and credentials on smartphones and other mobile devices. Data privacy, user convenience and flexibility go hand in hand Organizations have been tasked with keeping up with a variety of technology changes that impact the physical access control (PACS) infrastructure. These changes include accommodating two-year PC refresh cycles, 18 month average mobile device lifespans and policy changes surrounding the move to ‘Bring Your Own Device’ (BYOD). Additionally, there is increased network access via mobile devices due to the rapid growth of tablets, laptops and smartphones. Legacy security solutions often use proprietary technology that is static, providing little or no possibility for functional enhancement, or the ability to offer higher levels of data privacy. This inability to adapt makes them easy targets for attack. Often, legacy technologies are anchored to obsolete software, devices, protocols and products, making it difficult for the access control infrastructure to facilitate change. Built on breakthrough technologies, the latest high frequency access control systems ensure security is independent of hardware and media. This makes it much easier for organizations to support new functionality and higher levels of data privacy. They also enable the provisioning of secure identity credentials to smart devices, offering organizations the choice to use smart cards, mobile devices or both. Additionally, they offer functionality for access control beyond the door, which may include secure print release, network access, time and attendance or cashless vending. Upgrading your access control technology: A solid investment If you continue to invest in outdated…

Read More

CVEs Abound But Not Enough for Enterprises

A recent article by Taylor Armerding of CSO Online explores the current state of the Common Vulnerabilities and Exposures (CVE) program managed by MITRE. He expands on the creeping belief that the CVE, the old-guard vulnerability ‘dictionary,’ is falling behind and leaving security teams and technologies that rely on it open to risk. And although MITRE is taking measures to close the gap – including dedicating more resources to vetting and assigning CVE identifiers to vulnerabilities – the response among some experts is that these will not be enough to rectify the outdated model. MITRE has certainly made strides to bolster the system, logging 6,592 new vulnerabilities with CVE IDs in the first half of 2017 alone – compare that to 6,431 CVE IDs logged in all of 2016. From January to June of this year, MITRE has published on average 1,133 new CVE IDs each month. That’s a 210 percent increase over the 536 new CVE IDs per month average of 2016. While increasing the number of vulnerabilities catalogued by the CVE system is generally good (many technologies use CVE IDs and some baseline vulnerability management programs rely on them almost entirely), it still doesn’t solve the issue of prioritization. Enterprises already have hundreds of thousands – even millions – of vulnerabilities in their organization. Assigning more CVE-IDs doesn’t directly lead to better security or even signify that more vulnerabilities exist today than in the past – it means more efforts are being dedicated to discovering, analyzing and cataloging vulnerabilities. Combined with a technology environment in a state of constant proliferation, this inevitably means more CVEs and vulnerabilities in general. Currently, organizations are overwhelmed with too many vulnerability alerts to manage proficiently, so many of them are looking to advanced vulnerability management programs to help them better prioritize. In a recent report on vulnerability prioritization, Gartner analyst Craig Lawson points out that the lofty goal of ‘patch everything, all the time, everywhere’ is not only rarely fulfilled, it’s causing friction between IT security and IT operations. Focusing on the right vulnerabilities Vulnerability teams, however, don’t need to patch everything all the time. The same report states, “Only a small number of vulnerabilities go on to be exploited in real-world attacks.” This means vulnerability management programs should be structured to help teams zero in on the vulnerabilities most likely to be used in an attack – a smaller portion than all CVEs. Exploited vulnerabilities only make up a single digit of CVE-ID vulnerabilities published each month. (The spike in March 2017 in the chart below represents the vulnerabilities leveraged in the Eternal Blue exploit, famously used in WannaCry and NotPetya.) Vulnerabilities with a published proof-of-concept exploit (but inactive) represent a slightly larger portion, but still total less than 100 vulnerabilities published per month. With this information, security teams can: Focus resources on the vulnerabilities that are actually exploited in the wild first, as those are the ones that pose imminent threat to the organization. Employ mitigating controls (e.g., intrusion prevention systems, network segmentation, application controls, privileges management) to prevent lower priority vulnerabilities from being exploited when those vulnerabilities can’t be patched in a reasonable period of time, or when there is no patch available. To help classify vulnerability risks even further, the Common Vulnerability Scoring System (CVSS) was developed over ten years ago to help organizations prioritize vulnerability remediation. It is a reasonable approach to vulnerability remediation in theory; however, implementation was never fully realized because of the lack of vendor resources. So, only base CVSS scores have been used and have proved insufficient for prioritizing vulnerability remediation. Unfortunately, this is the method many vulnerability management programs rely on. For all of its shortcomings, CVSS scores don’t consider the organization’s unique environment, the current threat landscape and other situational factors. For example, a vulnerability with a ‘high’ CVSS score may not be exploitable in a particular network if the surrounding architecture and security policies provide sufficient defense. Similarly, a CVSS high-severity vulnerability on a low value asset is less of a priority to fix than a CVSS medium severity vulnerability on a business critical asset. Cyberattackers frequently leverage vulnerabilities carrying a medium severity CVSS score, perhaps because they know many vulnerability management programs are only capable of fixing CVSS critical vulnerabilities, never making it to the lower ranking items on their to do list. The 2016 Verizon Data Breach Investigations Report also points out that successful exploits from the previous year targeted a large number of vulnerabilities with CVEs assigned more than five years ago – presumably, that organizations never got around to fixing. How Skybox is improving vulnerability prioritization At the Skybox Research Lab, our team of analysts daily scour more than 30 security data sources and investigates more than 700,000 sites, including in the dark web. With this research, the Lab provides insight to active and available exploits, vulnerabilities being packaged in ransomware, exploit kits and other tools in use by various attackers. The Research Lab has its own vulnerability catalog, which includes CVE vulnerabilities. But roughly 10 percent of this catalog also covers vulnerabilities with no CVE ID, including many on technologies in the IoT domain. This gives Skybox users a more complete scope of the vulnerabilities that could threaten their security. With the added intelligence of how vulnerabilities are being targeted in the wild, the Research Lab provides much needed context to improve prioritization in terms that put vulnerabilities posing an imminent threat at the top of your to do list. By focusing on vulnerabilities with active or known exploits as well as vulnerabilities that are exposed in your network (no mitigating controls in place), organizations can more effectively use existing resources to minimize the risk of a breach. However, this should be augmented with gradual risk reduction over time of the other vulnerabilities in the network i.e., through mitigation or patching, which could turn into threats over time. While both CVE and CVSS provide relevant information to vulnerability management programs and technology, they fall…

Read More

Industry’s Views

Road Safety & Transportation Security in India Road accidents have emerged as a major public health hazard globally, and more so in India that is one of the worst affected with about 5 lakhs accidents killing nearly 1.5 lakh people and leaving thrice the number injured per year for the last few years. India marks one of the highest growth rates of motorisation in the world, thanks to rapid urbanisation and economic growth of middle class, which gravely impact the road safety level of the country. Though the road safety standards and pertinent laws in India are reasonably high rated but their poor enforcement owing to various reasons has created the concerns. Road safety has also emerged as the central theme of almost the entire range of the activities of the Ministry of Road Transport and Highways. As a signatory to Brasilia Declaration, India is committed to reducing the number of road accidents and fatalities by 50% by 2020, and the Ministry is taking steps towards fulfilling this commitment. These steps include overhauling the institutional and statutory framework, employing engineering solutions to build safer roads, laying down standards for safer vehicles, building an environment for better enforcement of traffic regulations and improving emergency care. Technology plays the most significant role in Road Safety and Transportation Security. An intelligent transportation system may provide innovative services relating to different modes of transport and traffic management and enable various users to be better informed and make safer, more coordinated, and ‘smarter’ use of transport networks. SecurityLink India has recently interacted with the industry stalwarts on the comprehensive state of the Road Safety and Transportation Security in India, and collected their views on the available technologies, and the pertinent encouraging and discouraging dynamics that come their way in the course of implementations.   Milind Borkar Vice President India, Middle East and Africa, Infinova SecurityLink India: Kindly share the latest developments in transport security in India? What challenges do you face in the implementation of the solution? Milind Borkar: The road, air and metro infrastructure have progressed a long way ahead since the last 5-6 years, and one can see large scale developments across the country in terms of flyover bridges, metros, rails and airports. As infrastructure improves, so is the technology improvement in all these transportations sectors. Security risk assessment has been a major factor in these sectors, particularly due to the rise of unwanted potential threats that disrupt any growing economy. There is a rampant increase in the use of megapixel technology, latest compression technology, and enterprise level video management software and storage solutions. Unfortunately however, all these technologies are not wisely used across all the sectors in India. Transport security, though makes one of the most important critical infrastructure projects, often see projects compromising on quality, performance and network security. The criterion for the selection of an OEM in such projects is only the price, and that is unfortunate. We hope this practice improves in the near future as otherwise our transport security will keep on becoming more vulnerable to potential threats. SecurityLink India: What are the latest trends in terms of technology and solutions, and how do you compete? Milind Borkar: Transport security such as airports, metros etc., are demanding security solutions with latest standards and technology. Use of megapixel technology, H.265 compression, thermal solutions, 360-degree camera solutions, true WDR cameras is becoming a common requirement in most of the projects. Infinova’s solutions are competent enough and that have been catering to this sector since several years. SecurityLink India: What are your offerings towards transport security especially road safety and surveillance? Milind Borkar: Infinova’s latest technology offering comprises the thermal solutions, edge enabled cameras, long range IR cameras, H.265 cameras, 4MP, 5MP and 8MP solutions etc. Infinova VMS has had several new technological advances in recent years. It has been integrated to several new world class technology companies such as companies offering FR technology, ACS, fire alarm, perimeter detection, intrusion detection etc. Infinova VMS can be customized to several national and international languages and also offers a very robust video analytics module. SecurityLink India: How do you justify the PPP model for the sector? Milind Borkar: PPP model carries its own advantages and disadvantages. Some of the advantages for this type of model in transport sector include effective and efficient public resource management, ensuring higher quality and timely provision of public services, expertise sharing, check on the expenditures, check on timely completion of project schedule, higher chances of inclusion of the latest technologies, and trends into public services and proper risk management is ensured. This model also carries some disadvantages such as service and procurement cost may increase, and disputes and inflexibility can also withhold any project progress. However, the pros are positive enough for growing economies like India and is thus helping the transport sector as well where many private public partnership are bringing infrastructural growth in the country. Infinova has several installations in many public as well as PPP operated segments. SecurityLink India: Kindly share some of your current projects in the sector. Milind Borkar: Infinova is the most preferred CCTV OEM by Airport Authorities of India to combat terrorism and increase security measures at Airports across India. Over 6,000 Infinova video surveillance cameras are deployed across 62 Airports in India. About 38 Airports are deployed with Infinova video management software V2217 and rest with third party video management software. Some of the airport locations are also deployed with Infinova DVRs and switches. Infinova has been recently awarded an upgradation project for 30 airports replacing third party cameras and software. Infinova has an installation base at AAI headquarters in Rajiv Gandhi Bhawan, Delhi where more than 60 cameras are deployed. Ashish P. Dhakan MD & CEO, HIKVISION, INDIA SecurityLink India: What is the status and scope of transport security in India – especially road safety and surveillance? Ashish P. Dhakan: According to BMI Research forecast, India’s transport infrastructure sector will grow by 6.1% in real terms in 2017, and…

Read More

The Chairman, IRF Speaks

Road Safety & Transportation Security in India   Potholes and large ditches, failure of traffic signals, rash driving and incidences of road rage, and alike are the usual phenomena on roads – both city roads and national highways – causing severe life hazards for the commuters. The news of road accidents, and accidental deaths and injuries and corresponding damages are the common sights on the pages of newspapers and TV screens today. Recent security lapse of horse racing on the Noida Expressway and incidences of high speed vehicles hitting pedestrians which most often result in deaths are not uncommon today. The Ministry of Road Transport and Highways has also taken the issue seriously. As a signatory to Brasilia Declaration, India is committed to reducing the number of road accidents and fatalities by 50% by 2020, and it appears that the Ministry is taking steps towards fulfilling this commitment. But the question arises whether the commitment is achievable; and if yes, how? SecurityLink India has recently interacted with Kiran Kumar Kapila, the Global Chairman of the International Road Federation (IRF) for the third time in a row. IRF, headquartered in Geneva, is a global body which works in the field of advising and encouraging promotion of safer and more sustainable roads around the globe. Mr. Kapila is also the Chairman and Managing Director of Intercontinental Consultants and Technocrats Pvt Ltd. (ICT), a multi-disciplinary firm of consultants having an international presence, providing comprehensive professional consultancy services, for all facets of infrastructure projects. SecurityLink India (SLI): Kindly give a brief about the evolution of International Road Federation (IRF). K. Kapila (KKK): The International Road Federation (IRF) is a nongovernmental, not-for-profit organisation with the mission to encourage and promote development and maintenance of better, safer and more sustainable roads, road networks and mobility. Set up in 1964, the IRF Geneva works together with its members and associates. The federation promotes the social and economic benefits that flow from well-planned and environmentally sound road transport networks. It helps put in place technological solutions and management practices that provide maximum economic and social returns from national road investments. The IRF has a major role to play in all aspects of road policy and development worldwide. For governments and financial institutions, the IRF provides a wide base of expertise for planning road development strategy and policy. For its members, the IRF is a business network, a link to external institutions and agencies such as the United Nations and the European Union, and a business card of introduction to government officials and decision makers. For the community of road professionals like national road associations, advocacy groups, companies and institutions dedicated to the development of road infrastructure etc., the IRF is a source of support, guide and information. With a wide network across over 90 countries on six continents, the IRF believes that with the global pool of knowledge it can make a difference by providing best practices and expert advice in today’s multi-faceted world of transport. About 5 years ago, the IRF Geneva has expanded the horizon to include safe and smart mobility. After the ITS Vienna Manifesto launched in 2012, IRF is intensively focusing on ITS and its solutions. SLI: Kindly share a brief about its India operations. KKK: The IRF Geneva debuted in India during 2005, by consolidating various road safety activities in the country in a major way. They formalised their India Chapter in February 2009. There are about 70 members of IRF India which includes all major players in road segment spreading across both government and private sectors. The Ministry of Road Transport and Highways, Government of India, is our life member. Other government sector life members are the Central Public Works Department (CPWD), Public Works Department, Delhi, Rajasthan State Government, and NHIDCL; besides, Public Works Departments of Haryana, Karnataka and Maharashtra are the members. In private sector, players like L&T, ILFS, IRB, Shell, Mahindra Motors, besides, equipment manufacturers, material suppliers and consultants are members of IRF India Chapter. We work relentlessly to address the serious concern of road safety in India, which has the highest number of road fatalities in the world. SLI: What is your role towards the decision making of the Indian Government in road designing and construction? KKK: IRF has regularly been holding conferences and seminars on road safety and they have been influencing the decision making of the government to a great extent. Our roles are certainly advisory but our recommendations are considered so valuable that they are most often incorporated in their circulars and guidelines, and made part of the policy. For instance, a policy circular of the government of India in April 2010 had lucidly brought out the IRF conferences and deliberations therein, that was issued as a sequel to the recommendations of an IRF Conference. We keep in close interactions and involvement with the stakeholders in the road transport departments such as the Ministry of Road Transport and Highways, National Highways Authorities of India, and also with the NHIDCL which is now a life member of IRF. We also undertake road safety audits, and train the people on how to audit. We have in the last few years carried out a number of 5 day training programms in association with the Australian Research Board and the Central Road Research Institute (CRRI) and have trained about 300 people on road safety audit. Last year we held a 6 week training programme in three modules of 2 weeks each, along with Indian Academy of Highway Engineers, and ARRB. A similar programme is now on-going. SLI: What are the international road safety standards? KKK: Internationally, the vision and perception of the road safety standards vary in terms of design, products and technology, gradients, curves, and other necessary implements. There is a wide variance between developed world and developing countries. Developed ones distinctly maintain very high standards. Sweden holds zero fatality vision for road accidents. Western world and even the Australian standards are very high. They comply very lucidly…

Read More

Autonomy & Safety Technology for Vehicles

New research on consumer preferences for full autonomy in new vehicles finds the technology is not yet popular among a broad audience, according to analysts at IHS Markit. Ironically, the same audience ranked it among the very features they would be willing to pay the most for in their next new vehicle purchase. The IHS research findings demonstrate a wide variety of viewpoints from consumers across leading global markets. Blind spot detection ranked highest as the most desired features among all audiences, young and old, and propensity to pay for it varied by region, with the U.S. respondents reporting they would be willing to pay significantly more for the technology than consumers in other regions. Responses from more than 5,000 vehicle owners intending to purchase a new vehicle within the next 36 months were reviewed in the 2017 Autonomous Driving and Urban Mobility Consumer Analysis , representing five key automotive markets – the U.S., Canada, China, Germany and the United Kingdom. This is the fifth annual survey of its kind from IHS Markit and identified key attributes for consumers, providing insight into preferences, desires and future interest as new vehicle intenders return to market. A number of subjects were covered. “In terms of ADAS safety features like automatic emergency braking and blind spot detection, consumers wanted to see these features standard across the board,” said Colin Bird, Senior Automotive Technology Analyst for IHS Markit and Co-author of the report, “There is a large subset of consumers who are willing to pay for full autonomy features demonstrating that consumers see this more as a value-add rather than a necessary safety component, at least for now.” Just 44 percent of all respondents indicated that full autonomy would be a desirable feature on their next car, the lowest rank of all of the technologies included in this subsection of the survey. Interestingly, however, it also ranked as the technology that consumers would be most willing to pay for, according to IHS Markit. Price points varied by country, with US consumers indicating they would pay the highest price to have the feature in their next new vehicle. German consumers surveyed about the cost of the technology added to a new vehicle purchase, German respondents indicated they would be willing to pay $1016 for it, nearly 20 percent more than the US audience. Among consumers surveyed in China, more than 72 percent of respondents reported desire for full autonomy as a feature in their next new vehicle, the highest of all the regions surveyed. They also expressed a willingness to pay for it at the highest cost among other technologies, noting a price point of $557. Many also were interested in related technologies, according to IHS Markit. These included blind spot detection (89 percent), automatic emergency braking (92 percent), lane departure warning (88 percent), highway autopilot (83 percent), autonomous co-pilot (81 percent). In comparison, just over half of U.S. consumers surveyed indicated full autonomy is a desired feature in their next new vehicle, though they too seem willing to pay the most for it over other technologies; noting an average willingness to spend $780 to have the technology on their next new vehicle. In addition, U.S. consumers are interested in blind spot detection, navigation systems, automatic emergency braking and steering wheel mounted controls. From a global perspective, highway autopilot also was mentioned as a top technology among consumers surveyed from all regions, but also at a variety of costs. US consumers indicated a willingness to pay $107 more than their nearest counterparts to have their next new vehicle equipped with the technology. Younger drivers more comfortable with full autonomy than older drivers The survey also researched comfort level with vehicle technology by age of the respondent groups. Across all geographies, younger drivers, including Millennials and Generation Z respondents, were more interested in full autonomy than other generational groups, with 61 percent suggesting it as a feature of interest in their next new vehicle. Generation X, baby boomers and the swing generation all trail in level of interest significantly, even though these new and evolving technologies will present the greatest opportunity to make transportation and mobility easier for older generations. In addition, respondents widely reported that driving alone was their leading form of transportation, seconded by walking and public transit. In addition, respondents in China indicated a very strong response to ride hailing and car-sharing services, with 42 percent indicating use of ride-hailing and 16 percent having engaged in car sharing in the last 12 months. US respondents were less likely; while respondents from Germany and the UK reported some use. If vehicle insurance rates were based on how often consumers used self-driving features, consumers felt slightly different about it. In China, 70 percent of respondents indicated they would be more open to self-driving features. Respondents in Germany were least likely, with just 32 percent reporting it would have an impact for them. “Among new car intenders, ride-hailing services aren’t used as often as a daily commuting option. Instead, the research found that ride-hailing is used more often for weekend trips, errands, and vacations,” Bird said, “Interestingly, new car intenders are more likely to be drivers for hailing service companies like Uber and DiDi than they are to be passengers. This is particularly the case in the UK, Germany and Canada, which suggests there could be a lucrative sales model in these markets for automakers.”

Read More

Smart City Solution

Ever expanding, cities today must pay more attention to protect their people and properties. It is evident to anyone with access to global news that now even the most developed cities are faced with huge safety threats, ranging from terrorists’ attacks aiming at well-populated areas and historically significant places to road accidents that keep increasing with the number of automobiles. A smart and integrated system for urban security is an urgent need, which Dahua is competent to provide. Time to do it smartly Boasting its AI technologies and highly integrated platform, Dahua smart city solution aims to address safety issues of mega-cities without dramatically expanding police forces. To be more specific, the deep-learning empowered video surveillance performs timely and effective risk detection. The unified platform allows faster emergency response, and the powerful data mining helps get more insights from the data front-end systems collected. Combined together, Dahua smart city solution gives unprecedented advantages. For example, the deep-learning redefines the capabilities of video analysis. Dahua achieved 99.78% facial recognition accuracy in LFW (Labeled Faces in the Wild, a well-known facial recognition benchmark for academic purpose) in October, 2016. Moreover, deep-leaning even allows instant classification of human and vehicle appearing in video, capturing extract detailed features such as clothe color, gender, headwear, bag for human and license plate number, vehicle color, size, mark, model, cellphone usage, seat belt usage for vehicle etc.  Four working stages of Dahua smart city solution The overall working process of Dahua smart city solution can be viewed in four stages that are prevention, detection, response and investigation. By improving each, it can improve the city running in general. The Stage of Prevention means picking out and focusing on potentially dangerous persons and factors before they really do harm to public safety. This requires the ability of collecting and analyzing big data. Dahua’s smart city solution provides advanced forecasting models that give a better chance of predicting events. For example, with comprehensive analysis of violation data collected by traffic enforcement cameras, the system can generate a watch list for the vehicles with numerous violation records. The Stage of Detection involves real time surveillance in various forms, including deployment of 360-degree panoramic camera and ultra-long range, all weather monitoring thermal camera etc. In addition to multifunctional cameras, Dahua’s deep-learning empowered smart video surveillance can automatically detect risky individuals and activities from massive data collected. In fact, Dahua traffic enforcement system helped Hangzhou city automatically detect 29,823 vehicles’ illegal behavior during G20 Summit, which greatly reduced the burden on policemen who thus could put more focus on protecting key summit area. The Stage of Response enables key organizations in the city to react to security threats in real time. Dahua improves the communication efficiency through its integrated platform, allowing unified command and centralized data storage as well as cross-department information sharing. if a natural disaster takes place in the city, Dahua smart city solution can report it on a single e-map with available emergency response resources to all relevant departments and agencies, while providing seamless monitoring of the site to all units approaching. The Stage of Investigation analyzes all data collected by different systems and provide insights to facilitate the recovery of crucial incident like crime after it happened. In this stage, technologies such as video synopsis provide a short summary including all moving objects of a long video and supports query moving object according to different characteristics like size, color, direction and speed. Besides, there’re a rich set of data mining methods like active area analysis, active target analysis and trajectory analysis. So if a criminal tries to escape with different clothes or cars he is highly unlikely to make it in a city equipped with Dahua smart city solution. Multidimensional benefits Smart City Solution delivers on Dahua’s promise of ‘Safer society, smart living’ in 4 key metrics. Government investment measures the level of continued commitment by governments to maintain good function and development of systems in place. After deploying smart city solution, London’s police investment declined by 10% yet the criminal activity prevention score actually improved by 0.5% since 2015. Safety result measures changes in the levels of crime and risk to citizens. It also assesses the public’s perception of how well the city’s authorities can respond to incidents. This is improved by the efficiency savings that Dahua’s surveillance systems provide. Social benefits assess the ability of the public to enjoy entertainment and leisure activities safely and how their affinity for the government changes. Economic benefit accounts for personal wealth, spending on tourism and retail along with employment rates and the city’s protection against short-term economic fluctuations. Smart city solutions benefit everyone in all four aspects above. Governments can decrease spending and crime rates at the same time whilst increasing citizen safety, survival rates and citizen approval rating. Citizens will be safer and enjoy better living standards without the burden of increased public spending. In short, they will be happier with both the government and their lives. Summary By remaining ahead of the market with expertise in intelligent visual processing technologies and emphasizing its core value propositions of innovation, quality and service, Dahua Technology will continuously contribute to a safer society and smarter living, benefiting city dwellers worldwide.   By Balasubramanian Jayam Head of Marketing (India & SAARC) Dahua Technology Co., Ltd.  

Read More

Taking the Pulse of City Traffic

Smart sensors provide insight in city traffic dynamics and provide the basics for informed decisions and traffic improvements The problem of traffic congestion in cities is not likely to go away in the next decades. In order to get a grip on the problem, city authorities around the world are increasingly making use of smart technologies to get real-time insight into their traffic situation. By collecting traffic data, they are hoping to make informed decisions to improve the quality of life of anyone living, working and travelling in the city. Economic development and quality of life has always been a difficult marriage for city authorities and urban planners. Traffic congestion is considered to be a necessary by-product of economic growth. But at the same time, idling times and traffic jams are very costly to the economy and thus pose a serious threat to further economic growth. In an estimate made by the U.S. Environmental Protection Agency (U.S. EPA) long duration idling is said to consume over one billion gallons of diesel fuel annually, at a cost of over $5 billion. In addition, congestion creates frustration with traffic users, and it results in more emissions, more pollution and increased health risks. Enabling smart cities Next to promoting public transportation use, carpooling and ride sharing, city authorities increasingly turn to smart technologies to make the city traffic run smoother and more efficiently. One measure that has already proven to be very efficient in many cities is the installation of traffic sensors to control the operation of traffic signals. By monitoring traffic at intersections, traffic signal scheme scan be adapted according to the amount of traffic, which as a result can reduce vehicle idling times and relieve city traffic. As an example, the UK’s national Automobile Association stated that cutting queuing time by just one minute per day on three major roads leading into a city could save more CO2 than switching off 2,000 streetlights. The use of road sensors and software systems fits into the broader idea of smart cities, a vision which aims at better managing the city’s assets including transportation, law enforcement, power plants, hospitals, and many more, and as a result improving the quality of life in the city. By integrating smart technologies into the city infrastructure, real-time traffic data can be collected to provide a basis for smarter decisions on traffic management, parking management, urban planning, energy management and many more. Smart city sensors FLIR Systems has been providing smart sensors to traffic authorities for many years, in order to collect real-time data at intersections and arterial roads, which are typical traffic bottlenecks. Smart sensors from FLIR are based on visual CCTV and thermal imaging technology and can be used to measure a variety of parameters and provide valuable insight into traffic flows. FLIR video detection sensors are a highly reliable and accurate alternative to loops and other detection technologies for signalized intersection control and management. FLIR’s integrated visual sensors provide information on the presence of vehicles approaching or waiting at an intersection, information that can be used to control the traffic lights more efficiently. Pedestrian presence detectors are able to give pedestrians the appropriate green-time and visibility, so mobility and safety of both motorists and vulnerable road users are guaranteed. Thermal imaging sensors use heat energy emitted from vehicles and bicyclists to make a distinction between both and make it possible to adapt green times according to the specific road user type (bike or other vehicle). Traffic sensors can also be used to collect a variety of relevant traffic data, like volume, average speed and occupancy. Better insight, better decisions The collection of various types of traffic data ultimately allows traffic authorities and urban planners to make more informed decisions, on a wide variety of topics. Intersection traffic control Traffic data can be used to better manage traffic lights and to provide dedicated signal schemes according to traffic volume. Traffic authorities can use real-time data to keep traffic moving and impose variable speed limits or dynamic green waves. Small adaptations of signal times at intersections based on historical data can already have a large impact on vehicle idling times. City authorities could for example, choose to adapt signal times according to the time of day, giving more green time for vehicles in one particular direction during rush hour. Real-time traffic data can be communicated on electronic message signs or traveller apps and help the traffic user make informed decisions about his travel options. Signal schemes could also be adapted in favour of pedestrians, for example near schools or sports arenas. Thermal imaging sensors can even make a distinction between the detection of vehicles and bicyclists, allowing traffic authorities to provide a dedicated signal scheme for bicyclists, which allows them to cross the intersection safely. Priority for public transportation or emergency vehicles Measures to improve the quality of life in the city often coincide with the promotion of public transportation. Smart technology can further support this vision by giving public transportation vehicles more priority rights in traffic and enabling them to make movements that the general traffic is not allowed to make. This could include priority bus lanes or dedicated signal schemes for buses. Priority can also be given to reduce delays for emergency vehicles in operation. When activated, an emergency vehicle priority scheme can adapt traffic signals ahead of an emergency vehicle’s arrival to provide a green wave allowing the emergency crew to arrive at the destination in the shortest possible time while also reducing the need to cross intersections against a red light. Energy management 19% of energy use in the world is used for lighting, and 6% of greenhouse emissions in the world derive from this energy used for lighting. Light pollution is a global problem caused by inefficient, intrusive and unnecessary use of artificial light. Smart lighting is an efficient way to save energy and reduce the amount of light along our roads. By using smart occupancy sensors, public street lighting can be…

Read More

Deepening the Value of Surveillance

Deep Learning has swept through the IT industry, bringing benefits and better classifications to a number of applications. Inspired by the way the human brain works, the technology uses a layered learning process to enable the computer to classify, store and access data, which it can then refer to for learning. This means it can use a whole image to recognise, rather than relying on separate elements of that image. This is a cumulative process – the more elements it has to draw on, the better the classification – thus, the better the ‘learning.’ The benefits of this technology for face recognition and image classification make it hugely valuable in the field of security. It touches on every aspect of the security industry – from facial and vehicle detection to behaviour analysis. This, in turn, starts to change the focus of security from being reactive to being able to predict problems before they happen. Hikvision has taken this technology and innovated a family of products to maximise its use. The DeepInview IP camera range and the DeepInmind NVR range work together to provide all the power and benefits of Deep Learning. While the cameras provide the smart ‘eyes’ of the system, the NVR represents the analytic and storage capabilities of the brain. The products help to tackle security on two fronts – recognition, monitoring and counting of people, and recognition and detection of vehicles. This uses Deep Learning technology at its most effective – for its ability to classify and recognise thousands of ‘features.’ Obviously, this multi-layered approach uses a lot of memory and performance, which is one of the reasons why the technology has become much more widespread in the past few years. To put this into perspective, in the first stages of the technology, it took 1,000 devices with 16,000 CPUs to simulate a neural network; now, just a few GPUs are needed. Hikvision is partnering with the largest of the chipset brands – Intel and nVidia – to explore the possibilities of Deep Learning for the surveillance industry. Hikvision’s innovation also facilitates and improves on this. The H.265+ codec radically reduces transmission bandwidth and data storage capacity requirements. This means there’s no loss of quality even though the data being shared and stored is exponentially higher. Applications are numerous. The technology could enable the system to provide a black list/ white list alarm, which could come in very handy in access control scenarios. It could also be used to recognise unusual behaviour – possibly allowing security staff to prevent an issue if people are found loitering nearby, for example. The new premium range of products will further extend the quality and capabilities of security systems. They will also allow security professionals to start planning to avoid issues, rather than reacting to them. This could be the next evolution of the whole industry – using AI to change the world, one Hikvision solution at a time.     By Ashish P. Dhakan – MD & CEO, Prama Hikvision  

Read More

‘POWERS’ The Lighting Standard For Video Surveillance

The security industry has long suffered from a lack of accepted standards for the measurement of illumination distances. Published illuminator distances have been left to the subjective interpretation of individual manufacturers – resulting in varying claims. This has always made it virtually impossible for consultants, installers and end-users to specify surveillance lighting with confidence to reliably compare products and achieve a consistent level of performance. After facing this challenge for last 25 years, Raytec have tackled this problem head on by publishing the industry’s first open and transparent standard for surveillance lighting – POWERS. The need for a lighting standard In conjunction with your choice of camera and lens, the right lighting is the most powerful tool in helping you to achieve outstanding night-time performance from any professional video surveillance system. But with many different lighting solutions available in the market today, it can be difficult to accurately compare the performance of one illuminator to the next. At one level, this may seem fairly straightforward – just look at the claimed distance performance from the manufacturer. However, until now there has been no standardized way to evaluate different illuminators and their performance claims – particularly infra-red lighting, and crucially, there have been no standardized testing methods for manufacturers to adhere to. Traditional lighting industries i.e., street/ urban/ commercial lighting etc., have long established and standardized testing methods allowing all illuminators to be accurately compared. Sadly, this is simply not the case with lighting for surveillance and security. Why is it so difficult to compare illuminators? Manufacturers currently publish very limited technical information on the performance of their surveillance lighting – most only quoting a maximum distance. Without standardization, methods for calculating performance, especially distance, have always been left open to interpretation – leading to varying claims. It is not uncommon to have two illuminators with a similar light output, that are quoted with wildly different maximum distances, because each manufacturer has a different opinion on what is classed as an acceptable image quality. One manufacturer may take a realistic view and quote 150m (492 ft) but the other may take an overly optimistic view and rate this same product for 250m (820ft). Since both products actually deliver exactly the same light output, it is obvious that the illuminator from the realistic manufacturer is going to provide a much better picture at its quoted distance. But where does the agreed and acceptable performance benchmark lie? Let’s look at this another way… same light output, different distance…which is correct? 1st Problem: Most manufacturers don’t provide calculation data to support their distance claims. Consider these images produced with two different infra-red illuminators (subject at 70m). Both could claim to deliver 70m+. Clearly one significantly outperforms the other with more clarity and detail – ultimately leading to better subject identification and analytics. But it’s all subjective – without calculation data, we don’t know how much light each illuminator is actually delivering at its maximum distance. 2nd Problem: Most manufacturers don’t state the camera specification used. This is especially important if you are comparing one illuminator against another that promises almost identical image quality at a similar distance. How do you know that both illuminators are truly equal? In reality, one illuminator may have actually been tested with a much higher performance camera – which in effect boosts its capability. Beware – this is often how a lower performance/ smaller illuminator can ‘appear’ to outperform a higher performance illuminator on paper. To claim better distances a lighting manufacturer may have used or accepted a much more expensive and sensitive camera, a much more expensive and higher performing lens, a more highly reflective surface and a low quality picture, to quantify the published distance. Illuminator performance – the important information Distance is only one area of lighting performance to consider. Other criteria to consider include, angle, flexibility and adaptability, integration capability, consumption, environmental impact, reliability, lifetime, warranty, customer support, and lighting partner credentials. In short, when looking at an illuminator for video surveillance, people want to know: How far does the illuminator shine? How wide does it shine? Is it efficient and reliable? What features does it have? Will the manufacturer support me with warranty/ certification/ technical support? And  so the POWERS standard was born – to answer all of these questions and more. Introducing the POWERS standard As the world leader in LED lighting, Raytec has taken the lead and published the industry’s first lighting standard for video surveillance – ‘POWERS.’ The standard is based on decades of practical industry experience and sets a lighting performance benchmark backed up by consistent scientific testing methods. It highlights the relevant criteria to consider, enabling security professionals to more easily specify and reliably compare the performance of different illuminators. It also helps them gain an understanding as to how their chosen lighting product will perform. ‘P’ for Peak power The first ‘P’ of POWERS stands for Peak Power. It is the measurement that should be used by all manufacturers to scientifically calculate their quoted performance distances and is therefore one of the most important areas of the standard. The Peak Power of an illuminator is measured at the centre point of the beam using an appropriate light or power meter. At Raytec, we measure all our units at 3 metres from the light source. Why Peak Power? The peak power of your illuminator and the lighting power you wish to achieve on scene, together with the principles of inverse square law (a law at the heart of scientific lighting calculations), are used to calculate the true usable distance of your illuminator. Calculating maximum distances should be based on adhering to a consistent level of lighting power on scene at your required distance – a vitally important part of the POWERS standard. This is to ensure that you achieve the same quality of image from your illuminator, every time. But what lighting levels should you adhere to? Raytec recommend a minimum lighting power on scene of 0.35 μW/cm2…

Read More