Home Technology and Products Archive by category Intrusion Detection

Intrusion Detection

Infrared Imaging Market to Hit $11.6B by 2030 as AI Fuels New Applications

The global infrared imaging market is expected to grow from USD 8.61 billion in 2025 to USD 11.65 billion by 2030, representing a CAGR of 6.2%, according to a new MarketsandMarkets report. Analysts highlight that AI-powered thermal analytics, drone-based surveillance, and autonomous inspection systems are among the most promising growth areas. Rising demand from predictive maintenance, smart manufacturing, and energy-efficient infrastructure is also accelerating adoption.

The thermal imaging segment is projected to lead the market thanks to its versatility, cost efficiency, and ability to detect heat signatures without visible light—enabling use in complete darkness, smoke, or fog. This makes it indispensable in defense, surveillance, industrial inspection, and fire detection. Advances in uncooled thermal sensors have reduced costs, opening the door to wider use in automotive driver-assistance systems, HVAC inspections, and energy audits.

Infrared cameras are expected to see particularly strong growth, driven by applications in defense, industrial automation, automotive, and healthcare. Their integration into handheld devices, fixed surveillance systems, and drones, along with higher resolution and compact designs, is expanding their role in real-time diagnostics and predictive maintenance. AI-enhanced thermal imaging is further enabling automation and faster decision-making.

The Asia Pacific region is forecast to record the highest growth rate, spurred by rapid industrialization, infrastructure expansion, and rising defense spending in countries like China, Japan, and India. Major industry players include Teledyne FLIR, Fluke Corporation, Leonardo, Axis Communications, L3Harris Technologies, RTX, Exosens, Opgal Optronic Industries, Lynred, Allied Vision Technologies, BAE Systems, and Testo.

Aziguard Object Detector 2.0

Azitrend released a second version of AziGuard software’s module used in perimeter protection.

The AziGuard neural detector recognizes the objects on video images as a person, vehicle, or person on a bicycle/motorcycle. The video analytics is done in the centralised GPU servers, so any camera brand is supported on the platform.

Usually, AziGuard Object Detector is used in perimeter protection through the company’s partnership with manned guarding companies. Companies use it as a very profitable instrument for protecting perimeters. AziGuard’s recent studies and evaluations, in terms of budgeting and business plan, reveal that a company with approximately 140 locations, each one with 1.5 manned guard posts (1 for 24 h/day and one for night and weekend), will switch the service in video analytics, will benefit from 52% of profit margin increase. At the same time, they can expect a minimum 39% decrease in the perimeter protection security budget.

Optimized system

The goal of the partnership with manned guarding companies and clients is to provide an accurate system that should be optimised for more than 1000 cameras managed with one dispatcher position. In this manner, financial costs are optimized.

With the help of VMS software and video analysis AZiGuard, Azitrend meets security companies with the concept of electronic guarding, based on the recognition of people/cars/bicycles in video images. These events, managed by a powerful video management system, the basis of the entire AZiGuard ecosystem, constitute an innovative security concept, consisting of recognition, alerting and intervention in case of an event.

Wanting to optimise the system, in terms of having the best module of detection, Azitrend developed the next generation of object detection. Now with a new module, there will tend to be zero false alerts in the system. During our testing in a real environment at locations with 16-32 cameras we had 0-2 false alerts. Aziguard object detector 2.0 is one of the best video analytics perimeter protection modules. And we invite companies to test it. There are several ways Aziguard object recognition fits into the alarm-treating operations.

Acknowledging the event

Video cameras are located on the perimeter or protected area. The AZiGuard video analysis software recognizes in the video images, through the AZiGuard Neuro Detector module, people, cars or bicycles trying to penetrate the protected perimeter.

Confirmation

The advantage of instant access to video images translates directly into the confirmation of any event in the dispatch and the deployment of the crew only for real events. We all know the degree of false alarms generated by a classic perimeter system and the need to deploy crews to any event produced. We are now considering a reduction of up to 99% in false alarms and dispatching emergency crews only to real events.

Intervention

Once the event is confirmed, the response crew moves to the location to resolve the case. Other tools are available to the dispatcher to manage the event until the crew arrives at the location, such as direct communication through external speakers placed in the objective with deterrent messages, easy tracking of the intruder by checking the objective map with colored video camera icons where there is movement so that the crews receive the most accurate coordinates.

With the help of VMS software and video analysis AZiGuard, Azitrend meets security companies with the concept of electronic guarding, based on the recognition of people/cars/bicycles in video images. These events, managed by a powerful video management system, the basis of the entire AZiGuard ecosystem, constitute a whole innovative security concept, consisting of recognition, alerting and intervention in case of an event.

New EchoPoint DAS Sensors: Distributed Acoustic Sensors for Advanced Intrusion Detection

Fiber Sensys, part of the OPTEX Group, a leading sensor manufacturers for more than 40 years, has launched EchoPoint Distributed Acoustic Sensors (DAS) for advanced intrusion detection across the highest security sites

By: Marketing Dept., OPTEX Security; E-mail: optex@optex.com.pl

The latest evolution in fiber optic sensing technology, the new EchoPoint series utilizes intelligent detection algorithms to provide point detection of +/- 6m in a range of up to 100km. This highly accurate and reliable detection makes the sensors ideal for large perimeters and high-security sites, such as airports, logistic centers, railways, and critical infrastructure, and to protect data conduits and pipelines, where being able to locate and identify the precise point of intrusion is critical.

Advanced Algorithms

Thanks to its highly advanced pattern-recognition classification algorithm, the sensors are able to distinguish between common causes of false and nuisance alarms, such as wildlife and environmental conditions, and genuine intrusion attempts. The system is also immune to electromagnetic interference (EMI), radio frequency interference (RFI), and lightning providing a reliable and safe solution.

The flexibility and versatility of the EchoPoint series are such that they can be operated across multiple applications – installed on fences, buried, or in a hybrid layout. When mounted on a fence, the sensors can identify someone cutting the fence or attempting to climb it. When buried, the system can differentiate between footsteps, manual and machine digging, and vehicle movements.

To meet the individual needs of every site, the EchoPoint series features intelligent software zoning. This means different detection zones can be configured, with the ability to independently adjust the sensitivity and output within each zone, helping to provide maximum capture rates and minimize nuisance alarms.

Protection of Large Sites

Masaya Kida, Managing Director of OPTEX EMEA, says the new EchoPoint series has been developed to provide extremely advanced intrusion detection: “By utilizing the latest fibre optic sensing technology and highly intelligent classification algorithms, the new EchoPoint series is ideally suited to protect large sites where pinpoint intrusion location and detection is required to protect people, assets and infrastructure, and maintain business operations.”

When installed in a loop configuration, the sensors provide cut tolerance, so even if a sensor is cut or disconnected, the system will continue to operate. It can also feature dual redundancy so that in the unlikely event of a processor failure, the second processor will automatically take over to ensure the wider security system is maintained and remains operational. With an average lifespan of 20 years, EchoPoint DAS provides a cost-effective and future-proof sensing solution.

All EchoPoint DAS series is now available across EMEA. Visit https://www.optex-europe.com/products/intrusion-detection/echopoint-series for more information.

Improve footfall flow with Checkpoint’s new One Way Surveillance Sensor

Helping retailers to improve store planning and the flow of footfall, Checkpoint Systems – a global leader in source-to-shopper solutions – has launched an innovative solution: the One Way Surveillance Sensor.

Store layouts are critical, designed to influence customer behaviour and improve store flow while highlighting key promotions and merchandise. Developed to monitor directional changes of customer movements in-store, Checkpoint’s One Way Surveillance Sensor enables retailers to monitor the effectiveness of their store planning and ensure that shoppers are navigating the shop floor as intended.

Often the measures put in place by retailers, such as gates or one-way doors, can be circumvented by shoppers or shoplifters. And, with shrinkage in Europe costing €49 billion every single year, retailers are increasingly investing in measures to help manage and improve loss prevention.

Mounted at store entrances, the One Way Surveillance radar sensor can be used not only to track customer flow, but to detect suspicious behaviour. For example, when a customer moves through the entrance in the wrong direction, it identifies the direction of traffic, signaling an alarm that alerts store personnel to investigate. This can be a standalone alarm or integrated within a wider EAS system.

Xxxx at Checkpoint Systems, commented: “Maintaining the flow of traffic should enhance the experience and not negatively impact the retail environment – its an essential part of store planning. By monitoring the flow of traffic, our new One Way Surveillance Sensor can also identify conspicuous changes that may indicate a possible theft.”

One Way Surveillance Sensor is available immediately. It is available as wired as standard, while wireless installation is also available on request.

About Checkpoint Systems

A division of CCL Industries, Checkpoint Systems is the only vertically integrated RF/RFID solution provider for retail. With consumer demands accelerating at an extraordinary rate driven by technology, Checkpoint delivers intelligent solutions – bringing clarity and efficiency into the retail environment anytime, anywhere. Through a unique offering of software, hardware, labels, tags, and connected cloud-based solutions, Checkpoint optimizes retail operations and efficiencies with real-time intuitive data delivered throughout the supply chain and in-store resulting in improved profitability and an enriched consumer experience. Checkpoint’s intelligent retail solutions are built upon 50 years of radio frequency technology expertise, innovative high-theft and loss prevention solutions, market-leading software, RFID hardware, and comprehensive labeling capabilities to brand, secure and track merchandise from source to shelf.

www.checkpointsystems.com

About CCL Industries

CCL Industries, a world leader in specialty label and packaging solutions for global corporations, small businesses, and consumers, employs approximately 19,000 people and operates 150 facilities in 25 countries on six continents with corporate offices in Toronto, Canada, and Framingham, Massachusetts. For more information, visit www.cclind.com.

Dynamic event filtering

OPTEX’s ONVIF-compliant LiDAR REDSCAN Pro series allows the ability to create alerts based on specific detection criteria or logic. Alarms can be raised based on the sequence of zone detection or based on detection in multiple zones. One zone would be considered a ‘judgment zone’ and the second as an ‘alert zone’. With this REDSCAN Pro can generate smart alerts dynamically by processing both the ‘judgment zone’ and ‘alarm zone’ status. There are many dynamic event-filtering applications, each requiring a certain configuration. Some of the most common applications are explained here:

Directional tracking protection

If there is a requirement to only allow movement in one direction, REDSCAN Pro can generate alarms for movement in the unwanted direction and no alarm when a person goes in the desired direction. One example of this application would be an exit-only walkway. For this application, REDSCAN Pro is installed on the horizontal mount and the alarm and judgment zones are allocated to suit the site requirement.

 Alerts for un-audited entry when a security guard is absent

In this example, there is a requirement for an alert when a person enters a zone and the security guard is not on location; there is no alert when the security guard is present.

REDSCAN Pro is mounted horizontally and we set the security guard standing area as a judgment zone and the entry area as an alert zone.

Minimum height limit requirements at the loading bay

An intelligent logic can be created in a logistics or warehouse environment based on the height of vehicles positioned by the loading bays. Delivery lorries or trucks entering the detection zones would not trigger any alarms, but smaller vehicles such as vans or cars would trigger the system. In this application, an alert is raised if a small car or van approaches a truck loading bay and there would be no alert for big trucks.

The REDSCAN Pro is installed in a vertical mount generating a virtual wall parallel to the loading bays. The area above the minimum required height is set as the ‘judgment zone’ and the area below the minimum height as the ‘alert zone’.

 Tunnel protection

The REDSCAN Pro dynamic filtering feature can be used for rail tunnel entry protection to ensure there is an alert if a person walks into the tunnel but no alerts for trains. The REDSCAN Pro can be installed in a vertical mount to generate a virtual door in the tunnel entrance.

Parked car protection

In this application, there is a requirement for an alert when a person approaches an area while a car is parked, but no alert when there is no car. The REDSCAN Pro is installed in a horizontal mount. We set the location where the car is normally parked as the ‘judgment zone’ and all the areas around the parked car as the ‘alert zone’.

If you would like more information about the REDSCAN Pro series and its possible applications,

please contact: optex@optex.com.pl, www.optex-europe.com.

Gain more control over all your security installations with Honeywell MAXPRO® INTRUSION

The Honeywell MAXPRO® Intrusion control panel delivers a fully integrated, cloud-hosted intrusion and access control system solution, part of the MAXPRO® Cloud portfolio. Ideal for small to medium businesses, MAXPRO® Cloud makes single or multi-site building security simple and scalable. The Honeywell MAXPRO® Cloud is a cloud-based security solution designed for multi-site small-to-medium-sized businesses, that provides effective and efficient security and safety, while minimizing IT costs and future-proofing investments. The solution integrates access control, video and intrusion into an integrated and easy-to-use platform. Users can manage their security system from anywhere at any time via any standard web browser or via the solution’s award-winning app.

The solution offers remote configuration and management of sites, devices, schedules and users thus reducing operational costs and streamlining efficiencies in multi-site installations. The plug-and-play connectivity of the control panel makes installation easy. It also allows for the auto addressing of devices and cloud-based configuration, reducing creation costs and installation time.

Key features include:

  • Removes the need for servers or software with its cloud-hosted, scalable, expandable, efficient platform
  • Features secure, HTTPS login and 256-bit encryption
  • Integrates intrusion, access control and video with plug-and-play device connection
  • Saves installation time at site with pre-configuring of accounts, sites, schedules and people
  • Allows users to configure and manage sites, devices, schedules, permission groups, and users across multiple sites from the cloud
  • Enables both panel firmware and peripheral updates from the cloud to always have an up to date and secured system
  • Grows and scales with your customer’s needs.

It is necessary to register for an account with MAXPRO® Cloud before using the MPI control panels.

Visit www.maxprocloud.com/ee for details.

V-Plex® – the industry’s leading addressable technology

Honeywell MAXPRO® Intrusion uses V-Plex® addressable technology. V-Plex® is a patented polling loop technology that defines price and performance on a simple pair of wires. Using only two wires instead of four, V-Plex® offers significant advantages over home run wiring or the conventional four-wire multiplex—providing economical expansion of peripheral devices such as motion sensors, alarm contacts or glass break detectors and point identification to your central monitoring station. There are important benefits of this solution:

By using V-Plex® technology, the user can benefit from cost savings coming from reduced wiring, lower power consumption as well as labour and time-saving maintenance features. Each V-Plex® sensor can be installed using two wires for power and data, including existing wiring.

V-Plex® devices use minimal amounts of current, reducing the need for auxiliary power supplies. It also features fast, accurate identification and response point ID to allow users to quickly pinpoint the source of alarm from the keypad and communicates the information to the proper authorities—and bypass protection at any specific point. It also improves the ability to diagnose and pinpoint defects. This means installation and service professionals can arrive at the site already knowing the exact location of the problem, making service calls more efficient.

The benefits of a cloud-based platform

The system is easy to install, use and manage. It provides:

  • Reduced costs – Removes the need for server or software installation with its cloud-based platform. Users just need an Internet browser and/or the mobile app. Installation – even across multiple sites – takes hours rather than days.
  • Higher security – Helps reduce false alarms and can cut shrinkage incidents. With integration across access, video and intrusion, incidents can be identified and managed more quickly. The system’s continuous health check monitors devices for any potential failures or lost communications, helping to reduce downtime.
  • Increased versatility – Provides a scalable and future-proofed solution. It also provides improved visibility through features such as the intuitive user interface and the powerful mobile app, along with a customizable dashboard with multi-site viewing capabilities. Permissions and access can be managed easily across multiple sites.

In summary, a cloud-based, next-generation security platform like MAXPRO® Intrusion can help make your life easier and your premises more secure, underpinned by the financial stability and enviable reputation of Honeywell. This is a winning combination for businesses who want to streamline their security system whilst also enhancing its cost-effectiveness.

OPTEX launches new REDSCAN PRO LIDAR Sensor for high accuracy detection near and far

OPTEX is rolling out the launch of its new REDSCAN PRO laser detection sensor, featuring its longest range yet, making it the best solution for the highest security sites.

The latest evolution in its award-winning REDSCAN LiDAR series, REDSCAN PRO can very accurately detect intruders to a range of 50mx100m, without any ‘gaps’ or the detection reliability ‘fading’ with range. By creating rectangular as opposed to circular (fan-shaped) detection patterns, there are no unnecessary overlaps, providing great coverage for virtual wall applications such as façade and fence protection, and for virtual planes to cover open areas, ceilings and roofs.

To meet the individual needs of every site, REDSCAN PRO features intelligent multiple zones logic. This means that for each detection zone, the sensitivity, target size and output can be configured independently, allowing the zone’s risk and location to be adapted and provide maximum capture rate with minimum nuisance alarms.

The sensor’s camera module brings visual assistance for configuration and post-alarm analysis. When an alarm is created, a file is saved with alarm log and video image. It helps security teams reviewing the alarms and checks if any action needs to be taken or if the settings need to be adjusted.

Mac Kokobo, Officer & Senior General Manager at OPTEX , says the new REDSCAN PRO series provides the ultimate detection solution: “For a decade we’ve been gathering feedback from our customers on what applications they want to use our LiDAR for. Featuring our longest detection range yet without any deterioration on performance, in combination with the ability to operate in harsh outdoor environments and to customise precisely the detection area and target size, our new REDSCAN PRO series is the ideal solution for major infrastructure, critical facilities, high-end residential properties and other high security sites.

“With enhanced configuration flexibility and functionality, REDSCAN PRO allows you to do more with less, one device that can deliver and achieve what used to be done by multiple devices.”

REDSCAN PRO features a sleek, new design, with flexible mounting option (+5 to -95-degree tilt), simple set up and easy to use web configuration. The sensors are also ONVIF (Open Network Video Interface Forum) Profile S compliant. ONVIF is a global standard for physical IP-based security products, which aims to standardise how IP products within the video surveillance industry communicate with each other.

The REDSCAN Pro series includes two models – the RLS-3060V with a range up to 30x60m and the RLS-50100V up to 50x100m. For more information please contact: optex@optex.com.pl; www.optex-europe.com.

OPTEX ADDS VIDEO TO EUROPE’S MOST POPULAR EXTERNAL INTRUSION DETECTOR

VXI-CMOD takes outdoor detection to another level.

OPTEX, the leading sensor manufacturer, has announced the launch of the VXI-CMOD – a new Wi-Fi camera module that can be easily integrated with its best-selling VX Infinity (VXI) sensor, adding visual verification to outdoor intrusion detection.

The VXI provides highly reliable outdoor detection with a range of up to 12m and a 90° field of view. It is used for both residential and commercial applications detecting intrusions in courtyards, gardens, driveways and secured car parks. The VXI-CMOD Wi-Fi connected camera module can be retro-fitted onto any existing wired VXI models (VXI-ST, AM, DAM), fitting snugly on top, creating a single unit visual verification system.

When the sensor detects an intruder, the integrated camera module is activated: it records the event and sends a notification to the owners’ paired mobile phone(s) (iOS or Android). The notification is made through an app called ‘OPTEX Vision’ and can be received by multiple users simultaneously. By opening the app, the recipients can access the VXI-CMOD’s live view* and the stored recording (two-second pre-alarm and 28-second post-alarm) of the event for verification.

The VXI-CMOD is enabled with Real Time Streaming Protocol (RTSP), which allows the live camera view to be streamed and recorded on a third party security system, such as NVR and VMS platforms. This provides an additional option to visually verify the event and centrally record it for identification of the intruder and reporting to the security authority.

The VXI-CMOD features a 180° panoramic view at 1080P HD, with built-in infrared LEDs for enhanced vision at night. VXI-CMOD is also equipped with a microphone. Via the app, the owners can access the camera’s live view and audio at any time.

The new camera module adds visual verification to the market-leading sensing technology of the VXI series. The ‘traditional’ VXI is one the most popular OPTEX detectors in Europe and many thousands are already installed. Now installers have the opportunity to add a new module – the VXI-CMOD – to go a step further, and deliver an all-in-one video and intruder security system for business and homeowners alike. The VXI-CMOD is available through Optex’s distributors.

*Up to three concurrent viewings. Viewing performance is subject to Wi-Fi and internet connection speed.

For more information please contact: optex@optex.com.pl; www.optex-europe.com

Critical Infrastructure Protecting Critical Infrastructure with the Latest Counter-Drone Technology

The commercialization of drones, also called unmanned aerial vehicles (UAV), in recent years has not only made them more accessible to the general public, but also more readily available to those looking to wreak havoc and cause harm to critical infrastructure. This is one of the reasons counter-drone technology, also called anti-drone technology and counter unmanned aerial systems (C-UAS), is seeing significant growth.

Izvor: a&s International; E-mail: redakcija@asadria.com

Despite there being strict regulations governing drone usage (e.g., where they can and cannot be flown, how high they can be flown, etc.), the widespread availability of drone technology has made it difficult to control. To combat this problem, companies specializing in C-UAS are continuously developing more advanced technologies to ensure the safety and security of all critical infrastructure.

Critical Infrastructure Threats Boost Need for Counter-Drone Technology

The popularization of drone technology is driving the need for counter-drone or anti-drone technology to protect critical infrastructure.

Drone technology has rapidly advanced in recent years with adoption coming from a range of users including individuals, industrial and military. Unfortunately, the use of drones, also called unmanned aerial vehicles (UAV) and unmanned aerial systems (UAS), is not always respon- sible, even being used as weapons. As such, there is a strong growing need for counter-drone technology, also referred to as anti-drone or counter unmanned aerial systems (C-UAS). 

“There is increasing concern about the intended or unintended misuse of drones, ranging from invasion of privacy over covert delivery of drugs and weapons, to the endangerment of public figures and terrorist attacks,” said Götz Mayser, Director of C-UAS at Rohde & Schwarz. “With the prolif- eration of small rotary-wing UAS that are easily available, the age of the  UAS-threat has become a reality and defending against it will require considerable effort and resources from both industry and the military. C-UAS technologies are becoming the go-to technology for homeland security, law enforcement agencies, private security and other government entities.”  

Furthermore, the adoption of drone technology is expected to continue growing especially as use cases and capabilities of drones are further developed. “Looking forward governments must focus on technology that can assist in regulation as opposed to simply counter- or anti-drone technology.  It is important to first differentiate between the potential threats from the technology and the various types of drones that need to be monitored,” said Thorsten Chmielus, CEO of Aaronia. He added that it is also essential that end users consider the value of the drones that present threats when considering the value of the equipment used to monitor drones. 

According to Mayser, governments are currently looking to develop new defensive capabilities that draw upon autonomous decision-making mechanisms as well as networked sensing systems that are capable of detecting, tracking, identifying and defeating hostile drones over complex and varied environments. “Homeland security, law enforcement agencies, private security and other government entities will put their trust into more multi-effector solutions and countermeasure that include control  link jamming, GPS jamming, sensor blinding or disruption of electronics,” Mayser explained. 

In terms of overall growth, the global anti-drone market is expected to reach nearly US$2.3 billion by 2024, up from $499 million in 2018, at a CAGR of 28.8 percent, according to a report by MarketsandMarkets. Growth is mainly attributed to increasing terrorism and illicit activities across the world, as well as rising incidences of security breaches by unidentified drones. Furthermore, the number of C-UAS technologies being developed is an indication of the increased threat UAVs are posing to various sectors and regions around the world. 

Counter-Drone Technology Demand by Region 

From a regional perspective, Dave Preece, Chief Data Officer and VP of Marketing at Fortem Technologies noted that his company has customers in the Middle East, Europe and Asia Pacific that are all in desperate need of counter-drone technology. 

“Saudi Arabia, Japan and the U.K. are also good examples. There have been well-publicized drone events where billions of dollars have been lost due to inadequate C-UAS,” Preece added. Research from Frost & Sullivan reported North America, led by the US Department of Defense, is expected to spend substantially more than any other region on C-UAS. It added that the Middle East has shown a lot of interest in C-UAS but due to uncertainty about the technologies, is hesitant to make purchases. On the other hand, Europe has the additional ability to use systems at airports as a result of private ownership and better funding, according to the report.  

Latest in Counter-Drone Technology Helps Protect Critical Infrastructure

The latest developments in counter-drone technology are helping critical infrastructure operators fight against the threat of UAVs.

As drone technology gets more advanced, so too must counter-drone — also called anti-drone or counter unmanned aerial system (C-UAS) — technology. From the most basic level, there are a few things that every counter-drone solution must be able to do effectively. According to Dave Preece, Chief Data Officer and VP of Marketing at Fortem Technolgies, a counter-drone solution must be able to see/detect, track, classify, identify and assess all drones in the protected airspace. It must also be able to integrate with existing security systems and sensors, as well as be able to ingest third-party data sets, such as those provided by unmanned traffic management (UTM), automatic dependent surveillance — broadcast (ADS-B) and Remote ID. 

“A viable counter-drone system must be able to protect the existing security above and beyond its fence lines and map to rules of engagement and escalation of force protocols that are in place,” Preece said. On the market today there are three basic sensors available for drone detection: radar, radio frequency (RF) monitoring and optical sensors, each of which have their own set of limitations. Thorsten Chmielus, CEO of Aaronia opined that radar technology is ineffi- cient when considering drone detection due to the size of drones and limitations in the radars, such as coverage, opening angles and range. 

“The solution further becomes expensive when we consider the need for visual verification due to potential false alarms from birds, leaves falling from trees, sandstorms and more. Because of these problems radar can’t be used as a so-called main sensor,” Chmielus said. On the other hand, RF monitoring presents several benefits including greater range of detection and simulta- neous detection, verification and classification. However, for the most part these systems only offer simple direction finding, or even worse only RF monitoring of common frequency bands, which is of no use since today’s latest generation of drones can operate at any frequency band, Chmielus explained. Preece pointed out that the large majority of anti-drone technology today relies on radio frequency. 

“RF solutions are OK for clueless and careless drone operators who are using a drone’s remote control device to fly the drone. In these cases RF solutions can locate a rogue drone and then interrupt the signal by taking it over or jamming it. They can also locate the drone operator,” he said. Unfortunately, now that criminal and terrorist drone operators know they can be detected, they do not employ a remote control. 

In fact, according to Preece, criminal operators can fly most drones without detectable RF (RF-silent drones) by using easy-to-use free downloadable software. A report by Frost & Sullivan pointed to “disruptive transformations in the [C-UAS] market” in the form of artificial intelligence (AI) algorithms that can automate the detection, identi- fication, locating and tracking of drones with minimal false alarms, and directed energy weapons that can mitigate multiple drones quickly and/or simultaneously. 

To capitalize on the future of the C-UAS market, Frost & Sullivan recommends that companies develop as-a-service revenue streams with effective systems that are easily transportable; build C-UAS that can detect, locate and track drones no matter what their configuration or mission; and integrate advanced AI into C-UAS to automate as much of the process as possible.

Overcoming Obstacles for More Effective Counter-Drone Technology 

Deploying counter-drone technology at critical infrastructure doesn’t come without its obstacles; however, the latest solutions are ready meet these challenges.

Critical infrastructure requires robust counter- drone technology — also called anti-drone or counter unmanned aerial system (C-UAS) — for protection against drone threats. Although there are many challenges when deploying these technologies, counter-drone companies have developed solutions to overcome these obstacles. First, though, it is important to understand that drone technology presents a number of different challenges for traditional surveillance equipment, including, but not limited to, the size of the drone, the angle/ altitude of attack, velocity, multiple drones (swarms), the location of operator and the mode of communi- cation between the drone and the operator, according to Thorsten Chmielus, CEO of Aaronia. While end users are quick to focus on the soft or hard kill measures available for drones, Chmielus warns that these are not effective without efficient and accurate detection since these measures impact existing systems at critical infrastructure. “The focus should be on more than drones, as today most of our infrastructure is dependent on RF systems, these must be efficiently regulated and monitored,” he said. One step critical infrastructure sites can take is to digitize their airspace so they can see everything in it, offered Dave Preece, Chief Data Officer and VP of Marketing at Fortem Technologies. He also recommends working with local authorities to establish no-fly zones for drone enthusiasts.  

Companies Offer Solutions to Beat Challenges

Before counter-drone technology can be deployed effectively, it is important to define the potential threats and the value of the critical infrastructure, according to Chmielus. Aaronia offers completely modular systems, which allows the company to provide greater protection in areas deemed as critical and offer a hierarchy of sensors to ensure a fully integrated solution that is efficient and consid- erate of end-user requirements. They aim to bridge the gap between radar and RF-monitoring by offering a 3D RF solution, which can monitor the complete spectrum of RF (20 MHz to 20 GHz) in 3D and real-time. 

Chmielus pointed out that although the focus today is on “silent” drones, just because you cannot hear something does not mean it is not making some noise. By providing complete spectrum monitoring, Aaronia offers the opportunity to detect any device emitting any frequency. 

“You must consider the value of the threat and in most cases, these are homemade devices that definitely emit some frequency. Satellite communi- cation is heavily regulated and expensive, as such it is unlikely that most threats are operating completely silent. Technology has become easily accessible; it is possible to procure transmitters that can be set at any frequency for a few hundred dollars with no regulation,” Chmielus explained. 

Additionally, Aaronia’s patented 3D DF antenna provides the altitude of the drone, or any flying RF emitter (e.g., 4G phones), together with the coordi- nates of the drone at 1-degree accuracy. “This is essential as we are speaking about flying targets — without altitude it is impossible to move and focus a high zoom PTZ camera to the target,” Chmielus said. False alarms are also a big challenge for counter-drone technology. Fortem SkyDome’s ThreatAware with TrueView radar RCS and doppler, impact assessment AI, Pattern of Life algorithms and real-time EO/IR cueing help bring the false alarm issue under control. 

Another challenge for many counter- drone technologies is not being able to see all the objects in 3D space. Fortem Technologies touts a proprietary, AI-based radar on which its C-UAS solutions are built. “Fortem SkyDome uses our TrueView radar and sees all the drones in the airspace regardless if they are emitting RF or not. Every drone is detected, tracked, classified and identified as a threat or not using Fortem SkyDome’s ThreatAware engine,” Preece explained. 

Fortem’s solution conducts threat assessment of drones in the protected airspace multiple times per second. “SkyDome has deep integration with several EO/IR cameras that are cued multiple times per second to provide streaming video of the drone in question. Drones that are assessed as a high enough threat can be mitigated by the Fortem DroneHunter. DroneHunter can be launched to conduct surveillance and to provide another visual angle of the drone in question. SkyDome also integrates with existing security systems, drone remote ID, UTM and ADS-B to provide seamless and complete situational awareness and drone disambiguation.”

Hikvision: Reducing false alarms with Deep Learning

The Deep Learning phenomenon continues to excite the IT world, with computing power now at the level where it can be properly used in practical applications. Hikvision has been at the forefront of applying the technology in the surveillance industry and beyond, and has already released its first set of products that harness the power of Artificial Intelligence (AI).

The concept of Deep Learning takes inspiration from the way the human brain works. Our brains can be seen as a very complex deep learning model. Brain neural networks are comprised of billions of interconnected neurons; deep learning simulates this structure. These multi-layer networks can collect information and perform corresponding actions according to analysis of that information.

In the past two years, the technology has excelled in speech recognition, computer vision, voice translation, and much more. It has even surpassed human capabilities in the areas of facial verification and image classification; hence, it has been highly regarded in the field of video surveillance for the security industry.

Its ability to enhance the recognition of human beings – distinguishing them from animals, for example – makes the technology a great addition to the security arsenal. This is especially relevant in a world where false alarms account for 94%-99% of all alarms, according to police and fire service statistics!

How deep learning works

Deep learning is intrinsically different from other algorithms. The way it solves the insufficiencies of traditional algorithms is encompassed in the following aspects.

The algorithmic model for deep learning has a much deeper structure than the traditional algorithms. Sometimes, the number of layers can reach over a hundred, enabling it to process large amounts of data in complex classifications. Deep learning is very similar to the human learning process, and has a layer-by-layer feature-abstraction process. Each layer will have different “weighting,” and this weighting reflects on what was learnt about the images’ “components.” The higher the layer level, the more specific the components. Just like the human brain, an original signal in deep learning passes through layers of processing; next, it takes a partial understanding (shallow) to an overall abstraction (deep) where it can perceive the object.

Deep learning does not require manual intervention but relies on a computer to extract features by itself. This way, it is able to extract as many features from the target as possible, including abstract features that are difficult or impossible to describe. The more features there are, the more accurate the recognition and classification will be. Some of the most direct benefits that deep learning algorithms can bring include achieving comparable or even better-than-human pattern recognition accuracy, strong anti-interference capabilities, and the ability to classify and recognise thousands of features.

Challenges of existing systems

Conventional surveillance systems mostly detect moving targets, without further analysis. Even smart IP cameras can only map individual points on a shape one by one, making it difficult to calibrate some features (eg forehead or cheek), thus decreasing accuracy.

For perimeter security, for example, other technologies can be (and are) used to provide more comprehensive security. But they all have their downsides. Infrared emission detectors can be ‘jumped over’ but are also prone to false alarms caused by animals. Electronic fences can be a safety hazard, and are limited in certain areas. Some of these solutions can also be expensive and complicated to install.

Object such as animals, leaves, or even light can cause false alarms, so being able to identify the presence of a human shape really improves the accuracy of perimeter VCA functions. Frequent false alarms are always an issue for end-users, who need to spend time to investigate each one, potentially delaying any necessary response and generally affecting efficiency.

Imagine, for example, a scenario where it’s relatively quiet – a location at night where there are few cars and people around. Even here, there could be 50 false alarms in a night. Assuming it takes 2-3 minutes to check out a false alarm, and that just 3 out of the 50 warrant more attention – say 15 minutes each. A guard either needs to check the system and look back at the alert, or someone needs to be dispatched to the location and look around, checking if anyone has indeed ‘entered without permission’. In most organisations, these would need to be reported/recorded too, adding to the overall time spent on this ‘false alarm’. So, those 50 false alarms could cost more than two hours each night of wasted time in that scenario.

Deep Learning, however, makes a big difference. With a large amount of good quality data from the cameras and other sources, like the Hikvision Research Institute, and over a hundred data cleaning team members to label the video images, sample data with millions of categories within the industry have been accumulated. With this large amount of quality training data, human, vehicle, and object pattern recognition models become more and more accurate for video surveillance use.

Based on a series of experiments, the recognition accuracy of solutions using the Deep Learning algorithm increased accuracy by 38% – applying this to the previous example, that’s a saving of nearly one hour each night. This makes Deep Learning technology a great advantage in a perimeter security solution, with much more accurate line crossing, intrusion, entrance and exit detection.

Other uses

The value of Deep Learning technology stretches further than traditional security. For example, tracking movement patterns of individuals can see if they are ‘loitering’ and a potential threat in the future. A threshold could be set to five metres radius of movement, or ten seconds of staying in the same place. If the person passes either threshold, an alarm could be triggered. The solution tracks the individual and compares this behaviour to a database to see if it recognises a pattern.

Another application would be in a scenario where ‘falling down’ could be a threat, like an elderly care home. If a height threshold was set at 0.5m and duration time 10 seconds, for example, the solution would be able to see a person falling down (as they go below 0.5m) and might be in trouble (if they ‘stay down’ for longer than 10 seconds). The solution uses the parameters set to compare with its database and raise an alarm.

With features and benefits like these, it’s easy to see how many smart applications could be catered for by Deep Learning technology.

To sum up 10,000-strong R&D Centre is pushing the boundaries of surveillance solutions and bringing even more benefits to them. Artificial Intelligence has massive potential, and Hikvision is always exploring new ways to apply this exciting technology throughout the security industry and beyond.