airport security-discussion 9

5
Running head: VIDEO SURVEILLANCE TECHNOLOGY Video Surveillance Technology Name: Subject: Institution: Date:

Upload: david-munene

Post on 07-Nov-2015

216 views

Category:

Documents


1 download

TRANSCRIPT

Module 9 Discussion

Running head: VIDEO SURVEILLANCE TECHNOLOGY

PAGE 4 VIDEO SURVEILLANCE TECHNOLOGY

Video Surveillance Technology

Name: Subject:

Institution:

Date:

Two incidents happened at Newark Liberty International Airport that prompted airport security systems to be enhanced. One incident was in 2010 when a student crossed a line undetected to say goodbye to his friend. This happened when a TSA personnel left his post for around 85 seconds (Anthony, 2014). The TSA officers used an airlines security system footage as surveillance cameras did not record the incident. This incident caused flights to be delayed inconveniencing many passengers as the security personnel looked for the person. This incident prompted enactment of tougher penalties for such offenders.Another incident happened in 2012 when a man passed through an exit to the secure side. The man slipped when a TSA agent was showing directions to another passenger. The man was noticed when he approached an airline personnel for assistance. (Anthony, 2014). This incident raised questions as to how many undetectable breaches had occurred at the airport. In view of this, airport operators are investing in innovation and technology to secure checkpoint exits.The video surveillance technology or the video analytics has helped in improving security in relation to movement of people in the airports. In some airports, doors have been replaced with an open configuration at the checkpoints. (Anthony, 2014). Some network surveillance cameras are mounted to guard against unauthorized passage in the area. They serve as watchers observing the movement of crowd while others serve as detectors. The detectors are incorporated with an intelligence system in the camera to help in identifying any movement in the wrong direction (Anthony, 2014). An alarm is triggered when a wrong movement is detected sending an alert to the security personnel while at the same time recording the breach. The analytics system can be used alone sitting on the ceiling mounted camera that is powered by a processing software. The system can also be integrated in a large and wide network of enterprise surveillance.Referenceshttp://search.proquest.com.ezproxy.libproxy.db.erau.edu/docview/1150205664Anthony Incorvati (Jan 07, 2014) Operation Checkpoint Security: The New Guardian at the Gate