Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Getting An Eyeful

By Cindy H. Dubin
Day/night camera
May 1, 2012
View from security camera

In an effort to state the state more than $13 million, the Michigan Department of Corrections has decided to eliminate the armed officers who protect the perimeter of 27 state prisons. The concern is that no one will be around to stop weapons, drugs, or other items from being thrown over the barbed wire fences to inmates. Instead, surveillance cameras around the perimeters will replace 120 patrol officers.

“We will have cameras watching those locations so that an officer sitting inside one of the prisons can see someone approach the fence and dispatch a vehicle with an armed officer,” says Russ Marian, a spokesperson for the Michigan Department of Corrections. “The cameras will provide an enhanced level of security. We can watch all parts of a perimeter fence at all times instead of having one officer circling around.”

While local residents living in neighborhoods that surround the prisons are concerned about their personal safety, the trend of using surveillance cameras as a replacement or backup for security personnel is one that is growing. As a matter of fact, IMS Research forecasts that the global network security camera market will exceed $4 billion in 2015. “Day/night surveillance cameras provide another tool in the arsenal of tools that security has for surveillance or early detection,” says Wayne A. Stotts, a project manager for nuclear facilities. He has deployed FLIR thermal cameras and low-light cameras in various nuclear facilities to detect perimeter intrusion around controlled areas. “When coupled with video analytics, these tools along with other tools installed give our security force the advantage they may need to detect and deter any intruders well in advance of a real threat” he says.

As the movement toward video cameras continues to evolve, so too does the technology. The emergence of high-definition video and improved megapixel resolution has companies moving away from analog systems.  Additionally, video surveillance is now migrating towards computer networks, transmitting video by Internet Protocol (IP) or Power over Ethernet (PoE).

 

Cameras Take to the Streets

Law enforcement officials in Brockton, MA, view their security cameras as the backbone of their security force on the streets. The police department used federal money to purchase more than a dozen VB-C60 IP security PTZ (pan/tilt/zoom) cameras from Canon. The cameras are part of a public-safety surveillance system that was designed and installed by network integrator LCN. Developed during the past six years, the strategically located security cameras provide high-quality video, which Michele Thibeault, grant coordinator for the Brockton Police Department says is helping to make a difference in crime detection and prevention.

The cameras are positioned on intersections, streets, parking areas, and other places where illegal activity occurs. “Some of the cameras are visible to deter criminal activity while others are more hidden, but all can be manned 24 hours a day,” says Thibeault.

The camera’s panning range, its ability to capture clear images of moving objects, day/night capability and high-image resolution has made it easier for the Brockton Police Department to view crimes in progress and print quality video for courthouse evidence.

While crime statistics are not unavailable, Thibeault says that the cameras do act as another set of eyes and ears out on the streets. “People feel safer knowing the cameras are there and when criminals know they are being watched, the crime tends to move elsewhere,” she says.

As the security coordinator for the County of Maui, Dennis Schwind, executive assistant to the Managing Director for the County of Maui, knows a little something about crime. Schwind’s responsibilities include initiatives to provide protection to staff, residents, and visitors at all county facilities. In addition, he is responsible for maintaining a county-wide initiative that started after the terrorist attacks in 2001 to migrate towards a single system for all access control, biometric and surveillance systems. Maui County employees 2,500 people and has a population of 154,000 spread out over 2,400 square miles.

The county wanted to deploy day/night cameras to monitor county facilities — business offices, police stations, fire stations, water departments, golf courses, maintenance yards — after hours. “We have millions of dollars worth of vehicles parked outside, and in the past, we’ve had vehicles, tires and gasoline stolen,” says Schwind. In addition, after the tsunami of 2011, the mayor wanted to expand the surveillance system to the beaches and main highways to monitor these areas in case of an emergency. 

Schwind and his team ultimately chose to deploy day/night camera from Tyco Security Products. This high-definition megapixel camera offers high-resolution capabilities and built-in facial detection capabilities, which Schwind plans to leverage in the future. The cameras enabled the county to reduce cable costs as these are PoE systems.

The cameras were placed outside municipal offices; police, fire and water department facilities; and municipal golf courses to monitor equipment during the night to prevent theft and vandalism. “We had one interesting incident happen before we installed our new day/night cameras,” explains Schwind. “Our maintenance people use a golf cart because the facility spans three separate buildings. One night, our old cameras picked up some headlights on a golf cart being stolen. Unfortunately, we couldn›t tell who was on the golf cart. But, I am confident that our new cameras could provide a clear image to help us identify a person in another situation like this. There is no sense having a camera if you can’t view the image and determine who is in the video.”

Going forward, Maui County is working with Security Resources, a security system integrator, to upgrade to high-definition megapixel cameras on a county-wide basis. Some have already been incorporated at the liquor department and the fire department’s headquarters in Kahului. “Overall, our goal is to continue to move forward with a single, standardized security system so we will have consistency in the types of security systems that we deploy and use on a daily basis,” says Schwind.

 

To Catch a Thief

From the beach to the mountains, crime knows no boundaries. And, there is no worse time to be the victim of a crime than when on vacation. Nick Franzosa, security director at Bear Creek Mountain Conference Center and Resort in Macungie, PA, is relying on surveillance cameras for guest safety.

Forty-two high-definition day/night cameras from Avigilon have been placed throughout the 330-acre resort to monitor the main hotel, parking lots, and even the mountains. “Not only do we want to use the cameras to track down someone who may steal a guest’s item, but we also use the cameras to protect the resort from fraudulent insurance claims,” says Franzosa.

Although the cameras are visible, Franzosa can’t know for sure if the systems are preventing crime, but he has used the cameras to catch his thief. “We had guests at the resort from Ocean City, MD, whose snowboard had been taken. Thanks to the closed circuit cameras at the ticket window, we were able to get a picture of the thief and match it to his scanned lift ticket for a name. We found the thief and the snowboard within 30 minutes.”

Franzosa can’t comment on the resort’s financial investment in the Avigilon cameras, but does believe that the investment in the system is well worth it. “Just having the cameras there to protect us from fraudulent claims is worth the money,” he says.

Day/night cameras allow another means for detection and surveillance in conditions or areas where low light cameras or vision cameras may not see the proposed threat,” says Stotts. “In the security world, having the means to detect any threat in time to respond is everything. You can’t put a price on that.”

KEYWORDS: Michigan Department of Corrections perimeter security prison security security cameras video surveillance news

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Cindy Dubin is a contributing writer for Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • University housing

    Getting Buy-In for Remote Access

    See More
  • Biometrics Story

    Biometrics – Getting Personal and Liking It

    See More
  • Combating Complacency: Getting the Most Out of Your Data Breach Response Plan

    Combating Complacency: Getting the Most Out of Your Data Breach Response Plan

    See More

Events

View AllSubmit An Event
  • February 8, 2012

    2-Day AXIS Camera Station

    AXIS Camera Station training is an introduction course developed for salespersons and system designers. The course will give you the skills you need to successfully deploy and manage a small to mid-size video surveillance system. The training is carried out through a mix of presentations and hands-on exercises.
  • March 22, 2012

    2-Day Advanced AXIS Camera Station Training

    AXIS Camera Station training is an introduction course developed for salespersons and system designers.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!