Archive for New Equipment and Gadgets

Revolutionary Applications of DensePose From WiFi: Enhancing Corporate Security and Empowering Military Tactical Teams

Example DensePose Image vs WiFiCutting-edge technologies continue to push the boundaries of what is possible in the realm of wireless communication and security applications.  It seems like every week there is something new in the technology front that enhances our capabilities in the security world.  Most notably since the revelation of ChatGPT, almost everything recently seems to be “AI” (artificial intelligence) based technology.  Cornell University’s groundbreaking research on DensePose From WiFi has emerged as a game-changer, revolutionizing how we perceive and utilize Wi-Fi signals. This article delves into the potential implications of that technology in corporate security for occupancy and muster reporting, as well as exploring its potential for portable deployment variations for military and tactical teams to visualize assailants through walls and barriers.

Understanding DensePose From WiFi (DensePose WiFi)

DensePose From WiFi is a pioneering research project that harnesses the power of radio frequency (RF) signals to track and analyze human movements in a given area. The technology leverages the existing Wi-Fi infrastructure and transforms it into a sophisticated motion-capture system. By analyzing the reflections and refractions of Wi-Fi signals as they interact with the human body, DensePose can generate accurate 3D representations of people’s movements in real-time.  The technology is based off of previous research (called simply DensePose) that utilizes video images with deep learning networks to correlate video camera imaging data to map the estimations of human body poses within its field of view.  DensePose’s objective is to provide human pose estimation that aims at mapping all human pixels of an RGB image to the 3D surface of the human body.   DensePose From WiFi took the video technology, paired it with WiFi data to feed into an AI deep learning model, and then took away the camera feed.  The result is an imaging capability just using radio waves.  Think of it as a type of bat sonar, except using signals from WiFi routers that can see further, and potentially through walls and other objects.

 

The first row illustrates the hardware setup. The second and third rows are the clips of amplitude and phase of the input WiFi signal. The fourth row contains the dense pose estimation of our algorithm from only the WiFi signal.

Corporate Security: Occupancy and Muster Reporting

One of the most promising beneficial applications of DensePose WiFi lies in enhancing corporate security measures, particularly in the realm of occupancy and muster reporting. Traditional methods of monitoring people’s presence within a building rely on physical sensors such as In/Out card readers, AI cameras, mustering point check-in readers, or even manual headcounts, which can be time-consuming and prone to inaccuracies, especially with visitors. However, with DensePose WiFi, businesses can now leverage their existing Wi-Fi infrastructure to precisely track and report the occupancy of various spaces to determine if a space, or even an entire floor, are “all clear”.  An entire building could be scanned within seconds to determine if the building is clear, and if not, provide security or first responders with the floor and exact location where those remaining individuals are.

When integrated with an intelligent security system, DensePose WiFi can monitor the flow of employees throughout a building, ensuring that everyone is accounted for in case of emergencies or evacuation drills. This technology enables real-time muster reporting, providing an accurate headcount and identifying any areas that may require immediate attention during critical situations.

Other potential applications could include patient wandering systems for hospitals, vacancy verification, or even automatic threat assessment alarms generated by certain poses which represent an obvious threat (gun aiming posture, headlock, standing over another person, etc).

Enhancing Security for Military Tactical Teams

The potential applications of DensePose WiFi extend beyond corporate settings and can prove to be invaluable for military tactical teams. In scenarios where situational awareness is crucial, such as hostage rescue missions or urban combat, this technology can be a game-changer.

By outfitting military personnel with lightweight and portable (or perhaps weapon mounted with heads-up display) Wi-Fi like transceivers, tactical teams can effectively “see” through walls or other obstructions. DensePose WiFi would allow operators to detect and track the movements of individuals on the other side of barriers, providing vital intelligence before initiating any tactical actions. This enhanced situational awareness could save lives and offer a considerable advantage in complex and high-stakes operations.

Ethical Considerations and Privacy Concerns

While DensePose WiFi presents tremendous potential for improving security measures, it also raises ethical and privacy concerns. The technology’s ability to generate 3D representations of human movements demands a delicate balance between security and individual privacy. Striking this balance will be crucial for ensuring public acceptance and responsible deployment of this technology in various domains.

DensePose WiFi represents an exciting leap forward in the realms of security and wireless communication. Its applications in corporate security for occupancy and muster reporting promise increased efficiency and safety in emergencies, while its potential use in military tactical scenarios offers unprecedented situational awareness. As this technology continues to evolve, it is essential to address ethical considerations and privacy concerns to foster its responsible adoption and ensure a secure and ethical future for all.

 

Posted in: Access Control, New Equipment and Gadgets, Security Technology

Leave a Comment (0) →

Vatican’s Security Dilemma: Dahua Cameras and the Potential Risks

The Vatican City, the spiritual and administrative headquarters of the Roman Catholic Church, is an iconic destination visited by millions of tourists and worshipers each year. With its priceless artworks, historic buildings, and religious significance, protecting the Vatican’s security is of paramount importance. During a recent tour, we noted that the Vatican has implemented a security system featuring Dahua cameras, a leading Chinese manufacturer, for their VMS platform. However, the adoption of Dahua cameras has raised concerns regarding potential security risks. In this article, we explore the utilization of Dahua cameras in the Vatican and the associated challenges.

A Dahua PTZ camera installed on the exterior wall of the Vatican City.

A Dahua PTZ camera installed on the exterior wall of the Vatican City.

Dahua Cameras: Advanced Surveillance Technology

Dahua Technology is a well-known Chinese company specializing in the production of surveillance equipment, including security cameras, recorders, and software. Their products are widely used around the world, known for their affordability. Dahua cameras incorporate cutting-edge technologies like facial recognition, high-resolution imaging, and intelligent analytics, enabling comprehensive monitoring and analysis of security footage.

The Vatican’s Decision to Deploy Dahua Cameras

Given the Vatican’s stature as a symbolic and historical landmark, ensuring security is a complex undertaking. In an effort to enhance their surveillance capabilities, the Vatican opted to implement Dahua cameras in various locations, including public areas, museums, and the St. Peter’s Square. The decision to deploy Dahua cameras was likely driven by their advanced features, wide product range, and competitive pricing (The only other dominant international CCTV brand evident around Rome was Avigilon).

Security Risks Associated with Dahua Cameras

The following are at least some of the obvious identified risks associated with the Vatican’s choice to deploy Dahua hardware:

  1. Data Security Concerns: One of the major concerns with the use of Dahua cameras is the potential for data breaches and unauthorized access. There have been reports suggesting that Dahua cameras may have security vulnerabilities (perhaps government sponsored or otherwise) that could be exploited by malicious actors.  Any vulnerabilities in the software or firmware of the camera system could potentially expose sensitive footage and compromise the safety of the Vatican and its visitors.  There are many examples of previous breaches easily found on the internet to demonstrate the potential damage for this kind of exposure.
  2. Surveillance Backdoors: There have been allegations that certain Chinese-made surveillance equipment, including Dahua cameras, may have built-in “backdoors.” These backdoors could potentially allow unauthorized access or remote control of the cameras, leading to a breach of privacy and security. Although Dahua has addressed some of these concerns by releasing firmware updates, the risk remains a significant consideration and there is some uncertainty in the industry if ALL of the backdoors have actually been removed.
  3. Geopolitical Implications: The utilization of Chinese-made surveillance technology raises geopolitical concerns. The Vatican’s decision to rely on Dahua cameras might inadvertently involve the Vatican in geopolitical controversies, considering the Chinese government’s influence over its technology companies. This situation could have diplomatic implications and potentially impact the Vatican’s relationship with other countries.  While the Vatican is a sovereign country and is not subject to the US NDAA as some  entities may be in this country, there well may be implications and consequences in foreign relations with NATO or EU countries that do have these types of protective legislative measures in place.
  4. Installation methods:  During our tour of the Vatican interior we noted that the cameras were installed using surface mount brackets and then plugged into a CAT5 jack located near the
    Interior Dahua camera plugged into data jack noted during tour of Vatican

    Interior Dahua camera plugged into data jack noted during tour of Vatican

    camera location.  In at least two cases, it would have been trivial for a (tall) person to simply unplug the camera from the jack or even cut the category cable to disable the camera.

Mitigating the Risks

So what should the Vatican do, if anything, to mitigate the risks of having Chinese government backed security equipment with history of known flaws in the firmware and architecture?  Given the resources available to the Vatican, our recommendation would be to hire a professional consulting firm to do a risk assessment on the installed VMS platform and recommend a replacement with a brand manufactured by a reputable company with a good performance record and advanced features needed by a prestigious venue such as the Vatican.   Short of that, other additional measures that should be considered are as follows:

  1. Rigorous Cybersecurity Measures: The Vatican should implement robust cybersecurity protocols, including regular firmware updates, network segregation, and encryption. Conducting regular security audits and penetration testing can help identify and address vulnerabilities promptly.  All security cameras should be on a separate physical network or VLAN that is not routable to the internet, with network intrusion detection systems IDS features implemented on the network switches and routers.
  2. Diversification of Suppliers: The Vatican could explore diversifying its camera suppliers to reduce the risks associated with dependence on a single manufacturer. Adopting a multi-vendor approach would provide more options and potentially enhance security by selecting cameras from different sources.  This can have implications itself in terms of spare parts inventory, and camera configuration and firmware management headaches by having multiple vendors with multiple models.  Using a major brand manufacturer such as Axis, Hanwha, Avigilon, or Bosch would ensure there are enterprise class tools available to manage these aspects.
  3. Enhanced Collaboration: Collaborating with cybersecurity experts, both internally and externally, would help the Vatican stay informed about potential threats and implement appropriate countermeasures. Engaging with experts in the field can ensure the continuous monitoring and evaluation of the security system.
  4. Installation Standards:  The Vatican should develop and apply security equipment and installation standards that should be implemented for all existing and new security devices.  All devices should be vandal resistant where possible, and all cabling should be protected in conduit or other protected raceway to prevent vandalism or sabotage.  Camera devices should have a minimum mounting height and standard for field of view and focal length based upon the objective and purpose.   Advanced analytic methods should be implemented for object detection and classification, facial recognition, license plate recognition, and other intelligent video analytic technologies such as people counting, loitering, object removal, object identification, line crossing, etc.

Conclusion

The Vatican’s decision to adopt Dahua cameras reflects its commitment to improving security and safeguarding its treasures. However, it is important to acknowledge the potential security risks associated with using this technology. The Vatican should diligently address these risks by implementing robust cybersecurity measures, considering alternative suppliers, and maintaining an ongoing dialogue with cybersecurity experts. By doing so, the Vatican can strive to strike a balance between utilizing advanced surveillance technology and mitigating potential security vulnerabilities, ensuring the protection of its spiritual and historical significance for generations to come.

Posted in: CPTED, IP Video, New Equipment and Gadgets, Premises Liability, Security Technology, Vulnerability Analysis

Leave a Comment (0) →

Do You Know Where Your Power Supply Is?

Altronix Eflow16 Low Voltage Power SupplyWe’ve all had it happen: either a bad battery or a blown fuse in a security power supply.   It causes cameras to fail, a card access door to stop working, or a whole panel to fail.

Power supplies in their simplest sense do a very basic thing:  They turn 120 volts AC power to low voltage DC power for low voltage security devices such as cameras, card readers, alarm panels, or detection devices.   And while they have become more sophisticated, adding fused outputs, relay contacts for fire alarm disconnects (life safety egress for maglocks), and smart battery chargers, until recently it was up to the security integrator or maintenance staff to maintain the power supply by testing power and replacing batteries periodically.

In the IT world, just about everything is monitored – Computer servers, network switches, server room air conditioning and filtration units, UPS battery backup systems, even cameras in the data closet monitoring temperature, humidity, and noise levels.  Much of this information is sent via the Simple Network Management Protocol (SNMP).  This protocol is monitored by software that notifies console operations of the exact conditions or problems that may arise with hardware or software in the footprint.

Enter the power supply network module.  The Altronix LINQ2 is a new product that offers the same kind of monitoring capability used in the computer industry.

The Altronix LINQ2 network module is designed to interface with eFlow and MaximalF power supply/chargers. It enables power supply status monitoring and control of two (2) eFlow power supply/chargers over a LAN/WAN or USB connection. LINQ2 provides values on demand for AC fault status, DC current and voltage, as well as Battery fault status and reports conditions via SNMP.

Now security operations can be notified of potential problems and critical failures as they happen, or maybe even before.

For more information visit http://www.altronix.com/products/product.php?name=LINQ2

Altronix linq2 SNMP module

The Altronix LINQ2 SNMP Network Module

Posted in: Fire and Life Safety, New Equipment and Gadgets, Security Technology

Leave a Comment (0) →