Using traditional methods and practices for security inspection has been observed to be cumbersome and error prone often defeating the whole purpose. Security threats can be addressed more effectively by adoption advances technologies and standard industry practices.
In today’s world, Security has become a major concern for everybody. Places of importance/mass gatherings like airports, stations, parks, offices, societies etc. are prime targets for attacks. Securing premises involves thorough checking of individuals and vehicles entering the premise. Traditionally, under vehicle inspection has been done using old age methods like search mirrors and video based scanning systems. Using traditional methods and practices for security inspection has been observed to be cumbersome and error prone often defeating the whole purpose, like search mirrors and video based scanners which fail to cover large portion of area and also take time to perform. Video-based systems are prone to operator distraction and fatigue while trying to interpret simultaneous video playback of multiple partial vehicle portions. Despite broad awareness among security professionals about the significant drawbacks and ineffectiveness of such scanners, many institutions continue to use them.
“Apart from ensuring seamless operation and enhanced security, integrated security also provides new functionalities including centralized entry-exit reports and common command centre for monitoring all the equipments in synchronous fashion.”
Chief Information Officer
Overseas Infrastructure Alliance
Emerging Technologies Setting New Trends: There are areas where the trend to modernize is visible: Use of 3D in inspection systems and comprehensive Entry-Exit control by integration of various security systems and accessories like boom-barriers, bollards, ANPR, X-ray bag scanner, under vehicle scanner, access control system. More recently, composite image based UVSS has been widely deployed in overcoming the drawbacks. These systems produce single view high resolution composite imagery which is easy to investigate for foreign objects. Early editions based on Line-scan camera technology had limitations of near constant speed vehicle motion and could not deal with vehicle stoppage due to queue formation. These were rapidly made obsolete by better systems based on Area scan mosaic technology, which address practical operating problems faced by earlier systems. In addition, intelligent software modules like ANPR (Automatic Number Plate Reading) address object detection features and operational problems faced by earlier systems. Technology has taken giant strides over the last few years, paving way for new innovations in every field. 3D & AI are some of the new technologies which are rapidly driving changes in many security domains like healthcare, architecture, entertainment, manufacturing etc. The field of security is still in the nascent phases of adopting these new technologies. In this domain, a few players have tried to exploit the 3D technology for building next generation products, X-ray scanners have shown promising advances for enhancing inspection by providing extra visibility using this technology. Similarly, UVSS industry is also moving in the direction of 3D technology. Powered by dual view 3D system which provide enhance visibility and security and also started to replace previous generation composition image systems.
Integrated Premise Security Solutions: Many premises have more than one security system like access control, UVSS, ANPR, boom-barriers, and/or bollards, X-Ray baggage scanner etc. Earlier, most premises used to have independent systems working in isolation, requiring significant co-ordination and overhead on the security personnel for seamless operations. Integration of these systems has become a de-facto standard for large and prestigious premises. Apart from ensuring seamless operation and enhanced security, the integration also provides multiple new functionalities, including centralized entry-exit reports, common command centre for monitoring all the equipments in synchronous fashion. Additionally, registered owners/authorized personnel can also be tagged with the vehicle, so at the time of entry or exit, security personnel can cross-validate the driver with the images stored in database.
Conclusion: In conclusion, Security threats can be addressed more effectively by adoption advances technologies and standard industry practices. Nevertheless, security operators many times face maintenance issues post installation thereby rendering ineffective many such new technologies. It is also important therefore, to consider the credentials and track record of the equipment manufacturer- the installed base of the equipment can be a good benchmark for the same. Service network of the OEM should also be considered as one of the crucial deciding factors while choosing any kind of security equipment, an aspect which is often neglected at the time of procurement.