Log in


  • December 04, 2018 1:06 PM | Office IFCPP (Administrator)

    Reposted from The Art Newspaper

    The process of art attribution has recently come under attack from all sides. Forgery scandals seem to be rampant. Just months after a German court convicted Wolfgang Beltracchi for faking the work of such artists as Heinrich Campendonk, Max Ernst and Max Pechstein, one of America’s oldest galleries, Knoedler, ceased operations due to allegations that it had sold paintings falsely attributed to some of the leading Abstract Expressionists. This past January, a Modigliani exhibition at the Palazzo Ducale in Genoa was forced to close early when it was revealed that nearly all the works were fakes. At the same time, fear of litigation has caused foundations representing Jean-Michel Basquiat, Alexander Calder, Keith Haring, Lee Krasner, Roy Lichtenstein, Jackson Pollock and Andy Warhol to dissolve their authentication boards. Just when we need them most, art experts find themselves increasingly on the defensive.

    However, the apparent authentication crisis is not nearly so widespread as the aforementioned widely publicized cases might lead one to believe. Most forgeries enter the market at the bottom of the food chain: through flea markets, thrift shops and internet sites like eBay. These low-cost fakes are usually identified before they can enter the high-end art market. Very few forgers have the talent to create original compositions similar enough in style to a famous artist that they fool even moderately informed people, let alone experts.

    However, as the Beltrachi and Knoedler cases demonstrate, the stakes can be enormous when a forger manages to breach the art world’s established defenses. The conservation scientist James Martin, who unmasked the Knoedler fakes by proving the paintings were created with anachronistic, atypical materials, likes to compare the authentication process to a three-legged stool of connoisseurship, technical analysis and provenance. As works are systematically examined and cataloged, the stylistic nuances of individual artists become clear, and patterns of ownership also make themselves known.

    While helpful in addition to the physical evidence presented by a work of art, provenance alone is not sufficient to authenticate a work as histories are readily fabricated, and many prominent collectors have owned fakes. Similarly, the identification of pigments unknown during an artist’s lifetime may be used to expose a forgery but the presence of historically appropriate materials does not necessarily prove authenticity. While scientific testing and provenance are important, connoisseurship is the glue that binds everything together.

    Art authentication is not, and probably never will be, an exact science. This does not mean that the experts who make such judgments are incompetent or capricious. Nevertheless, we live in a world of “alternative facts”, in which everyone’s opinion is deemed equally valid, and anyone can find an “authority” to say whatever he or she wants. The current authentication crisis arises from a confluence of populist anger at the very notion of expertise, the inherent subjectivity of the authentication process, and dizzying art prices.

    See Original Post

  • December 04, 2018 12:57 PM | Office IFCPP (Administrator)

    Reposted from the Natural History Museum 

    In times of war, the Museum defiantly stayed open for as long as it could, its grounds were converted to community allotments and resident scientists put their minds to keeping troops and allies alive on foreign soil.

    During the Second World War a number of the Museum's galleries were commandeered to provide tools and training for British secret spy networks. 

    Home front

    The Museum remained open to the public throughout the First World War, sharing knowledge to help the home front. Displays were created covering gardening, pest control and foraging.

    As food shortages took their toll, carrier pigeons relaying military communications and life-saving messages from downed pilots sometimes ended up shot for pigeon pie.  

    A display of types of pigeons was created to help those at home tell the difference between ordinary wood pigeons, rock doves, stock doves and their carrier pigeon cousins

    In 1910 the Museum received a request from the War Office. A batch of army biscuits - a staple of the military diet - which had been sent to troops in South Africa and Mauritius had been infested with moths and become inedible despite being transported in hermetically sealed jars.

    John Hartley Durrant of the Zoology department was asked to investigate. He concluded that eggs must have been laid at some point between baking and packing the biscuits, with larvae developing later inside the sealed tins

    War horses

    During the First World War, British forces used over one million horses and mules to pull heavy machinery, carry supplies and provide transport.

    This proved essential for the war effort. In 1914, Lieutenant Colonel E Lloyd Williams of the 2nd London Division applied for permission for his men to visit the Museum and study the anatomy of horse specimens on display. Today, visitors can still see one of these specimens in the Mammals gallery.

    Spies in the Museum

    A British spy network called the Special Operations Executive (SOE) was formed in 1940 as a secret service under the aegis of the Minister of Economic Warfare.

    Under the cover name Inter-Services Research Bureau, its mission was 'to aid and encourage all resistance to the enemy in occupied territories'.

    Unbeknown to the public, the SOE sealed off several galleries to create a workshop and top secret demonstration room. Plasterers and carpenters prepared materials for agents in the field in a workshop at the north end of what is now the Jerwood Gallery.

    James Bond-style hardware created in the SEO workshop included innocuous-looking carvings cast in high explosive, coloured to look like wood, sandstone and porcelain and designed to be detonated by time delay. The War Office created catalogues of such devices explaining that local agents on the Eastern Front would pose as quayside hawkers and sell carvings to embarking Japanese troops. 

    One of the most curious weapons offered to agents in the catalogue of special devices and supplies was an exploding rat - literally, a rat skin filled with explosives.

    War damage

    Between September 1940 and April 1941 the Museum was hit by a number of bad air raids as the Luftwaffe targeted London, which then resumed in 1944 with the deployment of 'Doodlebugs' (V-1 flying bombs). These raids resulted in major damage to many parts of the Museum.

    See Original Post and see fantastic photographs!

  • November 20, 2018 4:54 PM | Office IFCPP (Administrator)

    IFCPP held its 19th Annual Conference, Seminar, & Exhibits October 13-17th in beautiful San Simeon, California. Rob and Steve Layne and their extraordinary staff provided fun activities outside of the conference schedule, including wine tasting at the Heart Ranch Winery and Paso Robles vineyards, networking meals, a paint party at the Cambria Pine Lodge, and tours of the Hearst Castle in San Simeon.   The pre-conference program focused on library security and included discussions of how best to protect libraries from theft and vandalism, creating marks of ownership for special collections materials, effects of fire extinguishing agents on library and archive collections, state laws regarding ejecting disruptive patrons, and balancing access and security in library special collections. The conference program was equally rich in content: drones as an emerging threat vector, fine art insurance, Detroit Institute of Art case study in emergency planning, fire suppression systems for cultural properties, security system monitoring and evaluation, customer service, conflict resolution, collaborative collection protection, role of security in slip and fall accidents, and special event security considerations.

    The highlight of the conference was the vulnerability assessment exercise performed at the Hearst Castle. District Superintendent for the California State Parks San Luis Obispo District James Grennan, our conference host, assigned attendees to four groups that would explore four of the site’s essential functions: security, fire safety, collections, and IT. Each group spent about 20 minutes with senior Hearst Castle staff who walked each group through the grounds, castle, and houses, as well as some behind-the-scenes such as the Security Command Center, the fire station, and the collections preparation and storage area. Each staff member also discussed their daily routines, concerns, and visions for improving all operational aspects. Attendees met the next day to perform a “hot wash,” led by Mr. Grennan, who discussed the feasibility of several suggestions that were offered. Such exercises are a boon to both conference attendees as well as the host because, a) they are a great way to explore how different cultural properties deploy security, fire, and emergency management best practices, b) they provide a forum to discuss how to improve existing security programs, and c) the host gets to have a fresh set of eyes review its security program.

    The IFCPP is currently planning where to celebrate its 20th conference. This excellent program is unique because it focuses solely on cultural property protection and attendees all work for or with cultural properties, which makes for engaging conversation and networking.

    Robert Carotenuto, CIPM, CPP, PCI, PSP,
    AVP, Security
    The New York Botanical Garden

  • November 20, 2018 4:46 PM | Office IFCPP (Administrator)

    Reposted from Workplace Insight

    Workers are increasingly introducing technology devices, software and other tools into the workplace without their employer’s approval, claims a new report from NextPlane that examines the extent of this growing rift and its impact on collaboration and productivity. Nearly half of professionals (46 percent) said they or their team have introduced new technology into their workplace, and despite IT attempts to remain in control, workers are not standing down, as 53 percent said they or another team have pushed back on IT or management when they tried to dictate the technology they use.

    The report also shows that 73 percent of workers say they’ve been successful in implementing their choice of tech tools. The result is growing tension between IT departments who want to remain in control of security and systems, and employees who want the freedom to choose the technologies they use to do their jobs, and are willing to go around IT to do it.

    This growing tech loyalty is leading to business professionals seeking out new tools and technology to not just do their own jobs better, but to help their teams collaborate more effectively. The majority of respondents (63 percent) expressed loyalty to the technology products they use for their job. And it doesn’t stop on an individual level — 42 percent of teams have loyalty to technology products, leading to pushback or straying from policy if the IT-mandated tools don’t mesh with established workflows.

    “IT and business professionals are struggling to find common ground when it comes to the technology used at work,” said Farzin Shahidi, CEO of NextPlane. “Legions of teams and workers are introducing their preferred tools, such as team collaboration tools like Slack and Workplace, despite corporate IT policy. This increasing lack of compliance threatens not only the productivity of employees that may be working across different platforms, but the control that IT requires to manage all of a company’s technology securely and efficiently.”

    More than one-third (38 percent) of respondents said they would be resistant to IT or management dictating which software or tools they use to do their jobs. This reflects the notion that individuals and teams believe they know how to do their jobs best and should have a say in the tools they use to do their work. In many cases, teams prevail in pushing back on IT to allow their group to use technology of their choice, with 46 percent saying IT made an exception for their team.

    Continued Shahidi: “While there are no one-size-fits-all options for all types of technology employees might bring into the workplace, federation is one possible solution that can allow companies to deploy a comprehensive and open collaboration strategy that allows multiple collaboration tools to be used within the same organization,” Shahidi said.

    See Original Post

  • November 20, 2018 4:42 PM | Office IFCPP (Administrator)

    Reposted from Xinhuanet

    A formal indictment by state prosecutors has provided the first details of one of the biggest gold heists in German history, the newspaper BILD reported on Thursday.

    BILD cited a 68-page-long document listing charges against four individuals who are believed to have stolen the "Big Maple Leaf" gold coin from the Bode-Museum in Berlin in March 2017.

    The coin weighs 100 kilograms and is valued at 3.75 million euros, a circumstance which has previously fueled wild media speculation as to how the suspected robbers managed remove it successfully from the exhibition space.

    According to the indictment, the heist was a collusion between three members of the notorious Remmo organized crime family in Berlin and Denis W., a security officer working at the museum who acted as their accomplice. Prosecutors believe that the burglars obtained crucial information about the layout of the museum in this fashion, as well as weaknesses in its security infrastructure.

    On March 27, 2017, the three Remmo family members placed a ladder against a window of the museum at 3:20 am which had been tampered with beforehand by the accomplice to enable them to break it open easily. From there, the burglars climbed into a changing room located just a few meters away from the cabinet displaying the "Big Maple Leaf". The entry was timed to coincide with a round of the duty security officer in the museum at the time, meaning that the automatic alarm system was on standby.

    Having arrived at the display of the massive gold coin with a 53-cm diameter, the three men shattered the glass and lifted the "Big Maple Leaf" back into the changing room where it was hurled out of the museum window onto the tracks of a nearby railway line. They then exited the building and crossed the Spree river flowing outside the Bode-Museum on a railway bridge before escaping with their valuable bounty in a getaway vehicle.

    Initially, investigators had few clues as to the identity of the robbers aside from video footage of three hooded individuals from a surveillance camera. However, three undercover policemen independently responded to a call for related information that the heist could be linked to the Remmo clan, a finding which was later confirmed by a DNA analysis of the ladder, ropes, adhesives and parts of an axe left at the scene of the crime.

    After the tip-off, police began to surveil the three Remmo men and their accomplice on a running basis. They soon discovered that Denis W. had undergone a remarkable transformation in his standard of living, attempting to purchase a luxury vehicle and spending 11,000 euros for a gold chain in cash amongst others.

    The four suspects were arrested by specialized police forces on July 12 last year who discovered gold traces with a purity of 99.999 percent, the same level as that of the "Big Maple Leaf" on their clothing and a Mercedes-Benz vehicle. The coin itself has never been found and is believed to have been broken up into little pieces and sold on.

    The four suspects, all of which are registered as unemployed, are currently not in police custody after being released again on bail. There is still no official date for the start of a court trial of the alleged thieves who face up to ten years in prison for their involvement in the heist. 

    See Original Post

  • November 20, 2018 4:38 PM | Office IFCPP (Administrator)

    Reposted from FleetOwner

    We’ve all seen the headlines about instances of workplace violence perpetrated by a disgruntled current or former employee.

    Speaking at a recent NationaLease meeting, Sona Ramirez, a board-certified employment lawyer at Clark Hill Strasburger, provided some detail on the size and scope of the issue:

    • The World Health Organization said that approximately six million workers worldwide were subject to physical violence while at work.
    • In the U.S., according to the Bureau of Labor Statistics, there are approximately 500,000 incidents of workplace violence each year.
    • Over the past 14 years, on average more than 425 workers a year are killed in the U.S.
    • There were 500 workplace homicides in 2016 and shootings accounted for 79% of those homicides.

    Faced with those statistics and information on incidents in Florida, Maryland, Texas, Kansas and Virginia to name a few, business owners and managers should start paying attention to some of the behavioral characteristics associated with perpetrators of workplace violence.

    • On the job problems including inability to accept criticism and blaming others for their poor performance
    • Unexplained increase in absenteeism
    • Increased severe mood swings
    • Frequently loses temper and holds grudges
    • Talks about problems at home more frequently
    • Increase in unsolicited comments about violence, firearms and other weapons
    • Increased use of alcohol or drugs
    • Exhibits signs of depression or withdrawal

    Often times there is a precipitating event such as a traumatic event in their personal life, extreme stress, career dilemma or loss of job that triggers the act of violence.

    You need to have a crisis management plan in place to try to help prevent instances of workplace violence. This should include background checks, anti-harassment, anti-bullying and anti-retaliation policies in addition to a procedure for filing complaints.

    Ramirez told meeting attendees to be proactive in their attempt to curtail workplace violence.

    • Develop a plan in advance to respond to an observed or reported event.
    • Pay attention to threatening or inappropriate behavior.
    • Increase physical security.
    • Limit access to workplace. For example, require the use of key cards for admittance.
    • Prohibit employees from bringing weapons to work.

    It’s also important to train supervisors and workers to be alert for the warning signs, and to report incidents of threats or unusual behavior. A tip line is one way to do this.

    You also should train your employees about the way to respond to an active shooter. Ramirez suggests treating active shooting training the way you would fire or flood training. Training videos by subject matter experts are a good way to impart information and remember to keep training brief, non-alarmist and with the clear message that the goal is to keep employees safe.

    The Department of Homeland Security offers active shooter advice that includes run, hide, fight and calling 911 when it is safe to do so. You can engage the services of a security consultant who can provide site-specific training. They typically offer in person training and role-playing drills on how to respond to an active shooter. Online training is also available.

    See Original Post

  • November 20, 2018 4:27 PM | Office IFCPP (Administrator)

    Reposted from Royal Pharmaceutical Society

    The president of the Royal Pharmaceutical Society (RPS) has expressed his shock following the “disgraceful” theft of the president’s chain of office from the society’s headquarters in London.

    The chain, which is engraved with the names of all past RPS presidents from between 1841 and 1968, was stolen by a lone intruder from a museum cabinet at the RPS’s London headquarters on 11 November 2018. Usually known as the ‘first president’s chain’, there is a second chain that is worn by the current president.

    The emergency services were alerted to the theft after the intruder alarm was sounded at 7am.

    Amber Butcher, facilities manager at the RPS, said the facilities team attended the site as soon as possible after the alarm to find that two doors leading into the office’s main reception area had been smashed.

    “When the police entered they saw that a museum case had been damaged and then when they looked a bit further they saw that the item was missing.”

    She added that nothing else from the RPS museum’s collection had been taken.

    The chain, which dates from 1901, is comprised of 58 18-carat gold panels.

    Ash Soni, president of the RPS, said that although the chain was insured, “things like that are irreplaceable”.

    He added: “It’s such a disgrace that it’s the [necklace that was stolen] and [it is] very odd in some ways.

    “Of all the things to take from all the various display cabinets, it’s the one thing that’s probably the most recognizable from the RPS perspective because it’s got names of [all past presidents] on it and it’s clearly something which represents the profession. It just seems peculiar.”

    Michael Bonne, head of information and facilities at the RPS, added that the police investigation is ongoing with “the primary objective” to recover the chain.

    He said: “As with any item in our museum, it is unique and special to the Society and so any loss of this kind is unfortunate and rare.”

    See Original Post

  • November 20, 2018 4:24 PM | Office IFCPP (Administrator)

    Reposted from the Colorado Springs Independent

    On July 20, 2012, a former med 
student, James Holmes, shot and killed 12 people and injured 70 at the Century 16 movie theater in Aurora. 

    On June 12, 2016, Omar Mateen sprayed the Pulse nightclub in Orlando with bullets, killing 49 and wounding 53. 

    On May 22, 2017, Salman Ramadan Abedi set off a bomb in the foyer of London’s Manchester Arena during pop singer Ariana Grande’s concert, killing 23 and wounding 139.

    All were carried out in enclosed entertainment venues where people seek enjoyment and a respite from the confusion of an often violent and unpredictable world. 

    Increasingly, local entertainment venues, mirroring a nationwide trend, are adding new security measures they hope will prevent attacks — such as banning standard purses and bags, and only allowing “clear bags.” But it’s far from certain that having such measures at security checkpoints at venue entrances deters the bad guys. Holmes, for example, entered an exit door, and the bomber in Manchester waited for the concert to end and set off a bomb in the foyer as guests were leaving.

    Consider the record of the Transportation Safety Administration. When tested in 2015, the TSA, which guards the nation’s airports, failed to detect contraband, including weapons, 95 percent of the time. The TSA has since beefed up training, including sending all TSA agents through a training academy. But to this day, some argue the agency gears its policies to past terrorist plots (shoe-bomber, anyone?), rather than anticipating a new ruse.

    Some security experts say it’s anyone’s guess whether some measures truly protect the public. One of those is Bruce Schneier, an international security expert, author and chief technology officer with IBM Resilient who’s also a fellow at Harvard University. He says the $7 billion spent on the TSA should be reallocated to intelligence, investigations and emergency response.

    He also calls the new bag policies at venues “security theater,” adding, “Any search that doesn’t physically embarrass you is not very effective. When you get arrested and get searched by the police, it is invasive. It is embarrassing. That doesn’t happen when you walk into a football stadium.”

    But others say the mere presence of a screening program deters would-be attackers. That’s the idea behind so-called “clear bag policies” and similar bans, representatives at local venues that have enacted the rules say. One of those is Colorado College, which has barred large bags from events unless they’re physically checked by security personnel. But director of campus safety Maggie Santos acknowledges the ban isn’t foolproof.

    “If we wanted to be absolutely secure, we would put a box on campus and make it secure, but is it a place you want to be?” she asks.

    The Broadmoor World Arena allows only see-through bags and hand-sized purses (clutches), a policy that’s evolved as more entertainers and acts ask that bags be forbidden, says Dot Lischick, general manager. She couldn’t point to a specific incident that triggered the ban, but noted several artists who perform at the 8,100-seat center, as well as the Colorado College hockey team, asked the arena to ban large bags.

    “NO large bags, backpacks, or purses will be permitted into the venue,” the arena’s website says, noting exceptions include small clutch bags the size of a hand; clear plastic bags and medically necessary items that have been inspected by security.

    “The climate of what’s happening in the world, it’s something that’s on everyone’s mind, and it’s becoming more and more of the norm,” Lischick says.

    She also says the World Arena uses a metal detector more frequently than it used to, in keeping with advice from experts who consult with venues across the country. Pikes Peak Center, also overseen by Lischick, is moving toward more screenings, although at present, security ramps up only when an artist or event requests it, she says.

    The Pepsi Center in Denver bans all oversized bags and backpacks but allows personal-size bags and containers no larger than 14 inches by 14 inches by 6 inches, though they’re subject to search, the center’s website says. It also notes those without bags can use the “No Bag Line,” which moves quicker. The center also boasts it was the first professional venue in Colorado to install “Walk-Through Metal Detectors” as a permanent security practice.

    Similarly, Madison Square Gardens “strongly discourages” guests from bringing bags and backpacks, its website says, noting that all bags are subject to screening.

    Movie theaters, too, have adopted no-bag policies. As of February 2018, Cinemark, which owns Century 16 theaters, prohibits bags or packages larger than 12 inches by 12 inches by 6 inches, according to its corporate website. But while any bag can be inspected before entry, there’s no methodical checkpoint procedure to screen everyone.

    At CC, Santos reports that guests at events at campus venues — such as the Cornerstone, Armstrong and Celeste theaters — can bring in larger bags, but they must be cleared by security before entry.

    “As events happen at these large venues, everybody becomes a little more wary,” Santos says.

    She admits the strategy wouldn’t intercept every threatening item.

    “There is a certain level of security we can provide,” she says. “We can’t stop everything. We’re providing a level of security, not 100 percent security. I’m not going to do strip searches or cavity searches. I’m not going to do that to provide 100 percent security.”

    Bucking the trend, except for specific high-profile events, the University of Colorado at Colorado Springs doesn’t have a standard security policy. That means it allows purses and bags at events, says spokesperson Jared Verner. “We have officers from UCCS Police present at most events where we expect crowds, like at the Ent Center and athletic events,” he says via email, “but we’re not screening people as they come in.”

    He adds, though, that certain events warrant higher security, including checking bags, such as the 2017 visit by provocateur Milo Yiannopoulos and the visit by then-presidential candidate Donald Trump in 2016.

    Some might view the no-bag policy as unfairly targeting women, who tend to carry purses, since there are few female mass shooters.

    But as Santos notes, “How do you know she’s not with a shooter? I don’t want to judge who is or who is not going to do something. If you have one rule across the board that protects everybody, that’s the way to go.”

    But Schneier, the security expert, says bag policies might “make you feel better but it’s not going to stop the behavior [of a mass shooter].

    “Ask any teenager how to smuggle alcohol into a concert,” he says, adding that a hollow “beer belly” can be strapped on and alcohol concealed inside.

    In a blog, he notes the U.S. has 5 million commercial buildings. “It’s impossible to defend every place against everything, and it’s impossible to predict which tactic and target terrorists will try next.”

    See Original Post

  • November 20, 2018 4:19 PM | Office IFCPP (Administrator)

    The Performing Arts Readiness (PAR) project is excited to offer two new training opportunities. Crisis Communication and Reputation Management for Performing Arts Organizations is a new free webinar that will be presented on Nov. 27. Emergency Preparedness 101 is a new live class that will be presented in Pittsburgh, Pennsylvania on December 13.

    Crisis Communication and Reputation Management reviews elements of strategic communication that are essential before, during, and after crisis events. This webinar examines how your organization can best prepare to respond to a crisis and restore your organizational reputation. More information and the registration form is here.

    Emergency Preparedness 101 is a half-day workshop designed for organizations of all sizes with varying years of operation and at all stages of preparedness planning. The session will cover an introduction to disaster and business continuity planning, risk assessment exercises, information on the PAR project, as well as other available resources. This workshop will be held at The Alloy Studios in Pittsburgh, PA and the registration fee is $50. More information and the registration form is here.

  • November 06, 2018 2:29 PM | Office IFCPP (Administrator)

    Reposted from Campus Safety Magazine

    Thermal imaging cameras equipped with onboard video analytics are capable of classifying human or vehicular perimeter intrusions, resulting in fewer false alarms.

    The objective of security is to protect people, locations and assets, and for the threats organizations face daily, early detection of potential problems is crucial. Security staff and third-party monitoring providers rely on alerts generated by intrusion detection technologies as the lifeblood of security.

    As helpful as these alerts can be, the unfortunate reality is they are often pain points. The number of false alerts from intrusion detection solutions can quickly become overwhelming for central station operators and law enforcement, especially for outdoor monitoring situations. Weather, animals, foliage and other factors can easily generate false positives.

    The best approach to mitigate false alarms is to ensure accurate identification, which not only helps identify valid threats but also increases the effectiveness and efficiency of response. The sooner a response can be put into action, the more likely it is that an organization can mitigate or avert a potential risk.

    Unfortunately, verification is another major pain point that creates significant challenges for organizations using many of the available intrusion detection technologies, delaying and hindering critical response.

    With these issues in mind, it is important security professionals and end users properly evaluate and select technologies that will augment security by reducing the number of false alarms and increasing both detection and identification. This will help ensure responders are only dispatched for true alarms, maximizing resources and streamlining first response efforts.

    A burgeoning means to reduce nuisance alarms through accurate intrusion classification and visual alarm assessment is the application of remote monitoring with thermal analytics. Read on to learn why thermal cameras, especially when combined with other security technologies, are fast becoming attractive options for installing security contractors and central stations.

    Heat Signature Advantage

    There are a number of technologies typically deployed for intrusion detection, including visible light cameras and motion detection technologies like fence-mounted sensors, microwave and more. While each has its strengths, there are also a number of drawbacks to using any one of these solutions in a standalone capacity.

    The main advantage of cameras that create images using visible light, such as conventional surveillance or IR-illuminated cameras, is the images they create are recognizable and easy to interpret. This familiarity makes them a more comfortable choice for end users. However, when it comes to detection, customers face a number of challenges.

    The primary drawback to these cameras is their reliance on the amount of available light. In sunshine or a brightly lit scene, visible light cameras perform fairly well. But in shadows, at night or in another situation where lighting is less than ideal, objects can appear faint — if they appear at all.

    Another limitation of these cameras is visual contrast. Because they capture only visible light, they can easily be fooled by visual camouflage or situations where similar patterns or colors blend together to obscure people and objects. Similarly, these cameras are also susceptible to being fooled by naturally occurring phenomena such as trees, shadows, animals and other factors.

    Traditional motion detection technologies like microwave, radar, fence-mounted sensors and radio-frequency identification (RFID) often fare quite well for detecting potential intrusion. However, as standalone solutions, they are essentially blind compared to surveillance cameras.

    For example, when a motion sensor is tripped, security personnel would still require additional information to assess the nature of the alarm, determine whether it is valid, and plan an appropriate response. Without a visual of the scene, there simply is no way to know whether motion on a fence is an intruder, an animal or a tree branch.

    Another notable perimeter application technology increasingly deployed across all sectors is thermal imaging. By utilizing thermal cameras, facilities can detect intruders from greater distances regardless of light and environmental factors, giving security forces more time to react and respond.

    The reason for this is that thermal imaging cameras don’t suffer the same problems as visible light, IR-illuminated cameras and motion-detection solutions. Thermal cameras clearly “see” the invisible heat that radiates from everything we encounter in our daily lives, creating images from these heat signatures.

    This allows thermal imaging to provide clear visuals in complete darkness. And because thermal radiation can penetrate visible barriers like smoke, dust, fog and other phenomena, thermal imaging is largely immune to their presence. For these reasons, thermal imaging is one of the most effective 24/7 surveillance technologies available today.

    For example, an intruder located in a densely wooded area would be difficult to detect using a visible light or IR-illuminated camera. With a thermal imaging camera, on the other hand, the person would be clearly visible because of their heat signature.

    Thermal security cameras let people see what their eyes can’t: invisible heat radiation either emitted or reflected by all objects, regardless of lighting conditions. Because they see heat, not light, thermal cameras are effective tools in any security setting. They can easily detect intruders and other potential hazards in any weather, as well as day and night.

    See Original Post




1305 Krameria, Unit H-129, Denver, CO  80220  Local: 303.322.9667
Copyright © 2015 - 2018 International Foundation for Cultural Property Protection.  All Rights Reserved