By verifying whether anyone is actually there allows the operator to make a determination whether to dispatch authorities. And, where video is recorded, operators can look back at recorded clips, especially those taken in the vicinity of motion detectors and other intrusion devices that triggered the alarm.
The same effect can be achieved by integrating alarm systems with the video motion detection built into some modern IP cameras, digital video recorders (DVRs), and other network devices. MOBOTIX IP Megapixel cameras, for example, not only have the ability to send images by email, but they can generate voice prompts that can be played to the assailant via an audible device.
Many times integration is as easy as linking a DVR with a modem or router while other times it requires additional effort. Traditional alarm technicians who lack the skill sets necessary to complete this portion of the job are turning to systems integrators for assistance.
Although experts will differ on what they see ahead for intrusion protection, radical changes are sure to lie ahead that will change the face of our industry. Two technological changes that I believe will do this is artificial intelligence (AI) and facial recognition, coupled with changes in communication technology.
"The CCTV market is in the vortex of developing changes in technology from IP and megapixel cameras to network recorders and analytics with no firm direction yet. Then in general all sorts of technologies are merging together," said Cantor. "Alarm systems now incorporate access control and home automation and as soon as we have accurate facial recognition systems, access control will be revolutionized. Then you will see real integration of alarm, access control, and CCTV."
The future of intrusion detection
Later in the 21st Century it's quite possible that intrusion security will take the form of a fully integrated access/security system using facial recognition combined with AI technology. Gone will be traditional door switches, motion sensors, and access control cards, tokens and fobs. At that point the AI controlled system will know who belongs and who does not. Through a host of cameras, the AI will also be able to determine when a break-in has taken place. Equipped with the right action plan, the appropriate response will ensue.
Taking this concept one step further, by mobilizing the AI controlled system to include roving mobile units, equipped with cameras, voice interfaces, and other attributes and features, it will be possible to confront those who enter a protected space. Verification of identity will take place using facial recognition, voice, hand geometry, genetic markers, and/or other biometric attributes. When an unauthorized individual is discovered, it will be possible to notify the appropriate authorities for immediate response as a perpetrator(s) is maintained in one of many locations that may act as a man trap.
No matter how you look at the future, intrusion detection will never be the same as in year's past. As we move further into the 21st Century, the use of network technology is sure to increase while older methods of detection, identity verification and signaling fall by the wayside. In their place will be a brave new world.