Wide-area surveillance on estates, farms and other large properties

April 2019 Access Control & Identity Management, Integrated Solutions, Agriculture (Industry)

When protecting large open areas, security camera systems face significant limitations. In order to detect intrusions at large distances, the cameras require narrow beams (telephoto lenses), but this comes at a price. Moreover, telephoto lenses can only cover small areas, which might be good for perimeter detection down a straight fence line, but it doesn’t help with area surveillance. As these cameras are relatively expensive, it is also not a viable option to simply install large numbers of them. In addition to the narrow view and price, such areas cannot easily be illuminated, limiting visibility during hours of darkness.

Fortunately technology has changed a number of things.

• Very high resolution cameras allow one to have enough pixels on the target even with wider viewing angles.

• Very low-light cameras allow some visibility even in fairly dark situations.

• Thermal cameras’ cost has dramatically reduced over the years.

• Short range radar has also become a viable option for intruder detection, and depending on the environment and available resources, might be a good option.

There are also a number of practical problems, not easily solved with pure technology.

In South Africa such open areas are generally also populated with wild animals. In addition, when looking at wide areas, light conditions change over the expanse of the area throughout the day and indeed change over seasons, quite dramatically so. In order to create a solution for wide-area surveillance, one has a few alternatives.

Firstly, one can cover the whole area with cameras, daylight and thermal. Such a brute-force approach will work, but it is not only unnecessarily expensive, it also destroys the atmosphere of a place and will have huge aesthetic and possibly ecological impact.

A second approach would be to protect only the perimeter. This will be less costly and more technologies are available. However, this is not without problems. Because of the very long perimeters it often takes time to reach a point where the perimeter was breached. Once a response team reach the breached point, intruders could quite easily have disappeared into the protected property making it very difficult to find them again, especially at night.

A third solution would be to use scanning technologies like radar or optical scanning. Radar works on the principle of detecting motion which would be very successful in detecting intruders. However, radar is very expensive and also limited by line-of-sight, limiting coverage due to high costs. As stated previously, radar cannot easily identify targets and may not be able to distinguish between animals and humans. This limitation will generally result in the radar being enhanced with a high focal length camera to zoom into a target for identification, which further increases the cost.

Long range optical solutions

A newer approach is the use of long focal length thermal cameras in a scanning action. This solution is significantly less costly than radar, resulting in the possibility of placing more sensors on the ground, especially in undulating terrain. However, because the whole terrain isn’t covered with sensors and only one or a few sensors need to be placed, the system can benefit from using high quality products.

Like radar, this system can geo-locate targets resulting in precise location of a target and also the ability to track the target as it moves along the terrain. While radar can only identify the existence of a moving object, thermal cameras can detect stationary objects as well. In addition to detection, the system can identify to some extent, even the thermal object, but using the high-resolution camera the targets can themselves be accurately identified. Such a system can be operated automatically to a large extent, allowing operators to only observe and react to alarms.

This system is typically equipped with a bore-sighted daylight camera which can be used for identification. Typical ranges for this solution is a 2 km radius from the camera. While better thermal sensors can increase this to 8 km or 10 km, this is very expensive and undulation in terrain also minimises the benefit to be gained. An addition to this would be a long-range spotlight, also bore-sighted to the cameras which can be used to illuminate a target at ranges of 2 km to 3 km. This allows the much higher resolution daylight camera to zoom in and offer detailed identification.

This has the added benefit of being a deterrent as intruders know that they have been spotted. If anonymity of detection is required, the illuminator could operate in the near Infrared band. By using smart positioning, the system can furthermore be configured to cover sensitive areas more regularly and avoid areas where intrusion is impossible altogether. Naturally, alarms can be detected in predefined areas only so as to limit possible nuisance alarms.

Environmental issues to consider

A system like this which is deployed in a harsh, remote environment should be designed with reliability in mind. Varying sun positions, motion on the mast, exposure to moisture and high temperatures should all be taken into account. The cost of maintaining such a product can be directly impacted by choosing high quality components to use in the system.

Accurate geo-location

When attempting to geo-locate objects at long ranges it is important that systems are able to be steered and measured accurately. In addition, wherever feasible, the terrain contours should be taken into account. The ability to geo-locate accurately brings a number of exciting possibilities. Weather permitting, a drone could be sent, automatically, to the target location (even at night) for a direct view of the target. If nothing else, a response team (helicopter where available) can be directed straight to the

target as its movement will also have been observed. This can, in the case of poaching, be used to intercept a threat proactively, instead of having to track the poachers from the carcass.

In conclusion, technology has improved to the point where large area surveillance is a viable option for any large property. The costs have significantly reduced over the last few years, while the technology has steadily improved. By using a smart scanning system, wide area surveillance can be achieved at a fifth of the cost of covering an entire area with traditional security systems.

Dr Coetzer can be contacted at Protoclea Advanced Image Engineering ( [email protected], www.protoclea.com), a company specialising in the development of products such as those described in this article.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Palm-vein biometric kiosks secure SAP at Transnet Engineering
Access Control & Identity Management Transport (Industry) Videos
Securing access to SAP is essential to avoid fraud or corruption. Ensuring that users can access the software quickly, easily, and conveniently to do their jobs is also essential.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
Towards a global digital passport?
Access Control & Identity Management
In a world where borders are more connected and closely monitored, the idea of a universal digital passport could revolutionise how we travel, work, and even perceive citizenship.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
A platform for access and identity at Securex 2025
Securex South Africa Access Control & Identity Management Facilities & Building Management
South African companies involved in supplying access control technology, security services, and data management are well-positioned to tap into the expanding access control market at Securex 2025.

Read more...
Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...