Speak up with audio

CCTV Handbook 2019 Editor's Choice, Surveillance

Video surveillance systems are traditionally used as forensic tools to investigate and provide proof after incidents, but what if you can use your surveillance system to proactively deter incidents before they happen?

Network audio is an invaluable tool for security solutions; it can be used both with pre-recorded messages triggered by analytics in a camera or with live messaging to a monitored scene. Deterring incidents and theft not only creates a safer environment, it can also provide a lot of savings. These additional benefits include reducing damages and loss of goods, cutting back on the administration associated with incidents, reducing insurance premiums and lowering legal costs.

Here are just a few incidents where network audio has been used to help with deterring incidents at the forefront.

Deterring intruders at a car dealer

A major auto dealer with several active locations has made good use of its speakers to protect and deter intruders at its dealerships after hours, where valuable cars are often stored outside, potentially exposed to theft and vandalism.

The solution was to add horn speakers together with motion detection analytics in their cameras. If there is any intrusion to their premises outside operating opening hours an audio clip would be deployed saying “you are under video surveillance, please leave our premises”. If the offender fails to leave the scene, another announcement would have the ability to speak directly to the site from their monitoring station.

Thanks to a combination of video triggered audio warning and remote access to the speakers, this dealer managed to deter approximately 90% of intruders without having to dispatch law enforcement.

Keeping your prescriptions secure

From expensive beauty products to prescription drugs, there are many items on the shelves of pharmacies that can be attractive for thieves.

A large pharmacy chain in Europe addressed this issue using horn speakers on the exterior of their buildings. The speakers are used in conjunction with cameras for perimeter defence so, when a potential threat is detected after hours, the alarms are transmitted back to a central control room. Once alerted, the operators can then assess the threat level and respond with live audio challenge where necessary.

When employees are present on-site and feel threatened, they can contact the same central control room using a panic button connected to an audio bridge, which allows them to talk directly to an operator and receive immediate assistance.

Deterring shouldering at ATMs

ATM attacks are problematic globally with the average number of attacks rising each year. How do you protect yourself from these attacks and other events where criminals have insight to your personal information?

A bank that operates over 1000 ATMs was seeking an effective method to deter ‘shouldering’, a practise where someone looks over the shoulder of the person taking out money to see their PIN code.

The solution was to install cameras equipped with video motion detection software, to detect when someone was standing too close to the customer using the ATM. The analytic would trigger an audio clip to the speaker which would deploy a message: “Please keep your distance from the line”.

In addition, the camera would record the event and send a notification to the bank’s control room. If the person did not adhere to the played message then the control room would have access to use a live microphone to convey their message in real time. Since the solution was installed crime has been reduced by roughly 30%.

Protecting the perimeter of a rhino sanctuary

According to data from the International Union for Conservation of Nature (IUCN), incidents of rhino poaching in Africa have increased year-on-year for the last six years. Poachers are embracing sophisticated technology to increase the efficacy of their illegal operations.

To protect its residents, the Rhino Pride Foundation Sanctuary in South Africa has installed a network of thermal cameras, a very effective tool for perimeter protection that utilises thermal imaging to detect people, objects and incidents 24 hours a day, seven days a week, from pitch dark areas to a sunlit parking lot. This makes it possible to discover suspect activity before the intrusion even occurs.

Additionally, network horn speakers are used in conjunction with the cameras to remotely address people and deter unwanted activity. The loudspeaker can also play a pre-recorded audio file, when it is manually or automatically triggered in response to an alarm event deterring of intruders.

It’s a critical security asset to be able to record a crime; it makes it easier to detect it and signal it to law enforcement, easier to find the culprits and bring them to justice. However, being able to deter the crime can be even more valuable and data shows that audio, both live and recorded, can have a positive impact on deterring criminals.

Of course, adding network audio to your solution can help deter incidents at the forefront of your defence. Here are just a few examples of many we have highlighted here but the capabilities are endless.

As security solutions become more sophisticated, adding tools such as video analytics and audio, while protecting your perimeter becomes simpler and more efficient. Find more information at https://www.axis.com/newsroom/article/easy-migration-network-audio


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Six key security technology trends in 2025
Axis Communications SA Surveillance
Axis Communications examines some new trends for the security sector in 2025, as well as some new, old trends that are once again highlighted because of their benefit to the end user in the race to obtain optimal value from technology installations.

Read more...
Cyber top business risk as climate change hits record high
Editor's Choice
Globally, companies identify cyberattacks, particularly data breaches, as their primary business concern for the coming year, with business interruption ranked second. In Africa and the Middle East, cyber incidents, shifts in legislation and regulation, and macroeconomic developments are the three foremost business risks.

Read more...
As technology converges, so does cybercrime
Editor's Choice
Cybercrime is no longer siloed: it involves complex collaborations and coordination between different malicious entities, including state actors, organised crime and even drug and human trafficking networks.

Read more...
The need for integrated control room displays
Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
The bane of burnout
Editor's Choice Security Services & Risk Management
The World Economic Forum has recently formally acknowledged burnout as an occupational syndrome, giving it a status that is even more worthy of being taken seriously and resolved as quickly as possible.

Read more...
Federated identity orchestration
Technews Publishing SMART Security Solutions Editor's Choice Access Control & Identity Management Security Services & Risk Management AI & Data Analytics
Understanding exactly who resides at the end of a digital device is key, and simple identity number verification by the Department of Home Affairs is no longer a viable solution on its own.

Read more...
Scammers take advantage of desperate need for cash
Editor's Choice News & Events Security Services & Risk Management
Revitalised from their end-of-year holiday, South Africans typically tackle the new year with gusto and renewed vigour, but so do the criminals as they prepare for the rush back to school or university

Read more...
How smart video is transforming storage at the edge
Infrastructure Surveillance
As these technologies come together, they are impacting the architecture of the edge and what we require from data storage. More specifically, they are driving a demand for specialised storage.

Read more...