Integrated CCTV
ist measures from governments and port security exists – it does not. But, “
...an observer viewing
businesses worldwide demonstrates by adopting an integrated approach,
the effect that security breaches have airport operators can better protect all two monitors with
wrought – an estimated 600 percent operating and value chain processes,
increase from 2000 to 2006, with secu- without gaps. In terms of security this automatic image
rity spend expected to almost double will typically include access control,
between 2006 and 2010. In terms of video surveillance, intrusion detection, switchover will miss up
the aviation sector, 9/11 is the highest alarm management and evacuation.
profile and most significant attack in avi- When connected with passenger relat- to 45% of all activity
ation history, but many other incidents ed data, such as information about the
have served to highlight that airports flight, checked baggage and current in scenes after only
and airlines need to constantly review location inside the airport, intelligent
and update their security measures recognition systems and behaviour pat- 12 minutes. After 22
and procedures. In March 2008 armed tern recognition, the picture of integrat-
police responded to a major security ed security becomes even more com- minutes, this increases
alert at London Heathrow when a man plete. As already stated, while many of
broke through the perimeter fence and these functions are being increasingly to up to 95%...”
ran on to the runway clutching a bag. integrated, so too is fire protection,
He was seized by police and a con- energy management and automation It is a challenge to find ways to
trolled explosion was carried out on the systems for the control of heating, overcome these large “video walls” of
bag. At the nearby Stansted Airport, ventilating and air conditioning. This monitors showing live video streams
only a few months later protestors from trend will continue, particularly in light and hoping that an operator will be
the “Plane Stupid” environmental cam- of airports needing to be economically able to spot something. As digital
paign group cut through fences and sustainable, irrespective of their size, systems are replacing the older
staged a five hour protest on the run- by 2030 which will require improved analogue systems, this opens up
way. Many flights had to be cancelled, operational processes and intelligent significant opportunities for automating
passengers had to make alternative energy management systems. some of the identification processes.
arrangements and the airport is facing By adopting intelligent software
the possibility of substantial fines, with Video Surveillance algorithms, companies supplying video
the British Civil Aviation Authority plan- Returning to video surveillance, this is surveillance solutions can continuously
ning to introduce a new penalty system undoubtedly one of the growth areas examine camera signals and provide
to try and prevent similar occurrences in security. The increased use of sur- an alert only when required. Airports,
in the future. veillance in retail and public security along with other applications requiring
Those working in airport security applications has generated more of the security provision over large, extensive
could certainly add to such examples, media headlines but its use in all areas sites, are increasingly adopting wide-
ones which are not only disruptive but of airport applications has certainly area surveillance systems. These use
put the lives of passengers and airport grown, particularly with the introduction networks to transmit over wide areas,
staff in jeopardy: the IRA mortar attacks of more intelligent, powerful algorithm- utilising the most powerful software,
of the early 1990’s, the failed missile based technology. One of the problems allowing systems to classify more than
attacks on a passenger plane in Kenya with conventional video surveillance is 50 simultaneous, independent objects
in 2002, and the vehicle-borne IED the limitations of the human part of per camera: for example identifying
driven into the terminal of Glasgow the process. Research has shown that a plane, a person, a car, a truck etc.
Airport in 2007. All highlight the need an observer viewing two monitors with Such systems evaluate and monitor all
for security to be at the heart of almost automatic image switchover will miss sensor and camera signals, using just
every area of modern air transport. up to 45 percent of all activity in scenes one large screen to display only the
after only 12 minutes. After 22 minutes, live images in the case of an alarm or
From Perimeter to the Air this increases to up to 95 percent. suspicious event. The operator can
A key factor in effective security is to When you realise that these results are then investigate further to validate the
adopt an approach which seeks to rec- for only two monitors and that an airport event using the camera’s pan, tilt and
ognise all the threats throughout the will inevitably have a large number of zoom controls, or playback the image
process, from the perimeter protection video signals, the need to recognise this to see what caused the alarm. This
of the airport through to preventing problem becomes clear. Information allows security personnel to focus on
thefts from the car parks, efficient and overload is often seen as a particular potential threats and stops attempted
transparent passenger processing, lug- problem of modern times and in terms security breaches before they occur. It
gage and cargo screening procedures of monitoring the output from video sur- is a case of using analytics to do the
and on to general airport operation veillance cameras, it has certainly lead to monitoring and to highlight potential
and air transport management. That is extensive research into how its effects threats, thereby removing much of the
not to say that a single solution to air- can be minimised. boredom factor which can seriously
December 2009 Aviationsecurityinternational
www.asi-mag.com 35
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52