Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

VIDEO SURVEILLANCE: Traffic Decongestion & Security, Too

April 3, 2006
Multi-tasking security video – in a prototype – is a success thanks to the team of Tom Cameron, who oversees telecommunications for the Tollway; the tollway's IT Chief Ted Young; and Sentry 360's Thomas Carnevale.


The Federal Highway Admin-istration estimates that the time rush hour drivers are spending in traffic is up a whopping 300 percent or an increase of about 80 hours a year. Security is another concern with more than 6 million vehicle traffic accidents a year.

So it’s no surprise that security video has come to the rescue.

For example, the Illinois State Toll Highway Authority recently deployed a multi-megapixel camera with a 360-degree view to monitor its highways and control traffic flow in highly congested areas. From Sentry 360 Security, Naperville, Ill., the equipment delivers a complete solution with a server prototype model CV360 Command Center that works with CommandView 360 by iPIX Security, Oak Ridge, Tenn.

When introduced to the new technology, tollway officials quickly realized the camera would address several challenges in monitoring critical heavy traffic areas. With the installation of a prototype communications tower camera system, the authority can now digitally monitor traffic flow into five toll plazas simultaneously.

Data demands

“A high bandwidth camera system with heavy data demands, such as the iPIX unit, will be an outstanding test of the Illinois Tollway’s next generation network,” said the tollway’s IT chief, Ted Young. “Based on current bandwidth demands on the prototype camera system, no significant network impact is envisioned.”

The effort was part of Open Roads for a Faster Future, a comprehensive congestion relief program launched last year and that requires monitoring traffic at toll plazas in various stages of reconstruction/restoration.

“(We) envision communications tower-based cameras acting as key monitors at all interstate junctions,” said Toll Authority Telecommunications Tech Tom Cameron. “Managing traffic at these junctions, such as the current location at I-294 and I-90, is one key to our 10-year, $5.3 billion congestion relief plan.”

This challenge was especially difficult in the 3.8 square mile area near O’Hare International Airport, where I-90 and I-294 intersect. Five toll plazas in that area serve, on average, nearly 300,000 cars each day. “The ability to have a single camera station to cover this wide area was, at the end of the day, more cost-effective and, in fact, gave us more coverage than straight fixed cameras,” said Young.

The technology creates a virtual map and can view five tollway plazas around the tower-mounted gear.

All-seeing security eye

Monitoring a traffic overview of these constructions zones has a bottom line security result. It ensures prompt response to the ever-changing traffic congestion patterns that lane closures and various plaza configurations present as well as identify any vandalism and theft incidents.

Taken into consideration were such factors and challenges as extended lightning protection, remote power solutions, extensive Category 5 and fiber optics wiring distances and transporting the final image 30 miles to the tollway’s central administration building in suburban Chicago. Data were integrated into the tollway’s network, but not without significant forethought.

“At present, our one iPIX camera is a moderate demand upon our network,” said Cameron. “But with our next-generation network, planned for deployment later this year, the impact will drop to such an insignificant level that the deployment of additional cameras will be practical.”

The CV360 Command Center solution archives the video stream from the CommandView 360 and provides the intuitive front-end user interface to control the PTZ camera interactions with the 360-degree “virtual map.” In addition to live monitoring, the camera system digitally records video from any of its three cameras, or even a hybrid video of all cameras.

“A high bandwidth camera system with heavy data demands will be an outstanding test of the Illinois Tollway’s next generation network,” said IT chief Ted Young as Sentry 360’s Thomas Carnevale is seated at the console.
Originally envisioned as stand-alone, the camera system demonstrated its features and proved its worth over a handful of network computers.

The key feature was the simultaneous video navigation by multiple users. An optional pan-tilt-zoom camera was also installed on the camera system body for long-range viewing. Immediately preceding the testing phase, the camera system was integrated into the tollway’s traffic information management system center.

The project objective, implementing an immersive 360-degree camera system capable of monitoring traffic flow at heavily trafficked highway intersections, was fully realized. As a result of this project, future junction cameras are already on the drawing board.

On top of a tower, the 360 degree camera can view numerous tollway plazas and construction sites for traffic management and security needs.

360 Degrees of View

The 360 degree camera used by the Illinois State Toll Highway Authority is the CommandView 360, which provides live and archived viewing in full 360 degrees, vertically and horizontally. Traditionally, cameras see only where they are pointed, missing potential threats outside the narrow field-of-view. With a 360 degree approach, there are no blind spots – the technology provides the ability to pan, tilt and zoom live or archived video. Megapixel resolution, optimized lens design and support of simultaneous navigation by multiple users provide greater monitoring performance and efficiency.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Bosch pennsylvania turnpike video surveillance case study

    Pennsylvania Turnpike Commission modernizes video surveillance to monitor traffic flow and roadway incidents

    See More
  • Our ASIS Inside Report: Mantraps, Video, and Tour of Chicago Security from Dallas, Too

    See More
  • San Diego Goes Fiber Optics to Handle Security Video Traffic for Mass Transportation Security

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • 9780367667887.jpg

    Surveillance, Privacy and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing