FLIR Cameleon

Detecting threats at the perimeter makes a lot of sense for high risk applications, and in some critical infrastructure sites it’s an absolute necessity. Given the wide-ranging threats against such applications, the very earliest warning of any intrusion is essential to ensure the security plan is both robust and effective. To aid in the execution of exacting security policies, FLIR offers Cameleon Tactical, a software-based perimeter protection system that combines video, thermal imaging and radar.

Historically the emphasis on mainstream security system design has been to focus attention on buildings and structures within a site. The reason for this is simple: such parts of an application represent controllable environments, and as such are ‘friendly’ to technologies that might be impacted by changes in environmental conditions.

In recent times, advances in technology have resulted in high end security systems becoming increasingly stable. This, coupled with intelligent design principles, means that today’s systems are far more capable of operating in a wide range of conditions. This makes them well suited to delivering protection for all areas of a site, right up to the perimeter.

It is interesting that if you consider applications away from the mainstream, specifically those at high risk critical sites, protection has always started at the perimeter. This is because the earliest warning is required to ensure that intrusions and violations are dealt with swiftly and conclusively. Of course, today’s advanced systems mean that such an approach to security implementation can be taken by all end users.

Enhanced detection

Cameleon Tactical from FLIR is a software-based perimeter protection product that helps to create a holistic and scalable perimeter protection solution. It combines video, thermal imaging and radar to deliver an advanced system for perimeter intrusion detection.

The Windows-based software is an open platform system and supports FLIR’s thermal imaging and video devices, along with around 300 other third party devices. The latter grouping includes cameras, detectors and video management devices from a range of manufacturers including Axis Communications, Panasonic, Tyco Security Products, Bosch Security, Pelco, Milestone Systems, Vicon, Genetec, Lenel and a host of other credible security manufacturers.

The system’s intuitive graphical user interface makes use of map-based displays to indicate any known or unknown targets in the protected area. The maps are GPS-aligned, and therefore can provide accurate positional information of known targets. Unknown target information is captured using video analytics or radar-based detection. Multiple maps integrated with video streams and detection data can be linked to provide complete situational awareness when managing a site’s perimeter.

The software interface can be used across video walls, allowing a high degree of flexibility with regard to display formats, and utilises simple drag-and-drop actions to enable operators to customise access to displays and important data and alarm information. Custom windows can be created to view live and archived video, display site maps, connect to and control remote PCs or even to connect to the internet via an integral browser.

Control options include the ability to prioritise devices, ensuring that notifications of important events are not delayed by other system activities. Also, permissions for operators can be defined to a deep level, ensuring that only persons with appropriate authority can access secure parts of the system.

The software allows high levels of control over alarm management, video control and playback and advanced automation of alarm actions and responses.

Feature rich

Supported functionality has been designed to automate many of the processes associated with perimeter protection. For example, when known or unknown targets are detected, cameras can use the GPS information to automatically track any targets. This minimises the need for operator intervention whilst ensuring a high degree of security.

When using radar-based protection, detection zones can be overlapped to deliver complete coverage for a protected area. The radar devices – along with cameras and thermal imagers – can be ‘snapped’ to their exact location on the supported maps to ensure operators have a precise overview of the site as incidents unfold.

Maps can be created in a wide range of formats and are then customised with icons representing devices, alarms and automated events. Hyperlinks to additional maps and views can also be added for seamless navigation.

The software also allows full telemetry control. This can include switching between thermal and video views, managing on-site illumination and controlling devices and any peripherals directly from the software interface.

The software’s scripting capabilities allows the automation of common tasks. This can ensure that appropriate workflows are adhered to, and that actions are only performed when criteria are fully met. Additionally, automated actions can be created for common tasks to simplify operational processes.

It is also possible to ‘prioritise’ resources to reduce potential conflicts and allows operators to take exclusive control of devices.

In summary

Cameleon Tactical is an advanced perimeter protection system which allows a wide range of devices to be integrated to deliver a holistic security package. It allows operators to manage events as they unfold with a powerful array of detection devices.

The phrases ‘situational awareness’ is often over-used, but in Cameleon Tactical there is a tool that helps ensure this is achieved.

BENCHMARK
Benchmark is the industry's only publication for installers and integrators which is dedicated to technological innovation and the design and implementation of smarter solutions. With an unrivalled level of experience in technology-based systems, Benchmark delivers independent and credible editorial content.

Related Posts