Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

How Thermal Cameras Protect Critical Infrastructure

Thermal cameras have been a staple of popular culture media for decades, and it is now even available via smartphone.

By Claire Meyer
Thermal Cameras

Thermal cameras, positioned on surveillance towers, overlook the Strait of Malacca along the Malaysian and Indonesian coastlines in an effort to detect and prevent piracy and secure trade routes through the area. Photo courtesy of Techno-Sciences.

Thermal Cameras

Using thermal cameras, water treatment facilities in the City of Clermont, Fla., can reduce costs on lighting and even repairs due to a reduction in vandalism. “You can’t put a price on the safety of our drinking water. If this system prevents one contamination, it’s worth the million dollars,” says Environmental Services Manager Bob Reed. Photo courtesy of the City of Clermont.

Thermal Cameras
Thermal Cameras
March 1, 2014

Thermal cameras have been a staple of popular culture media for decades, and it is now even available via smartphone. But while the smartphone case, debuted at the 2014 Consumer Electronics Show, is marketed primarily for personal use, including identifying wildlife, detecting home energy loss or a variety of other practical and creative uses, thermal cameras remain a valuable investment for enterprise security leaders, even though you can’t fit them in your pocket.

One installation that is far from pocket-sized is the outfitting of 22 surveillance stations along the Indonesian and Malaysian coastlines off the Strait of Malacca with thermal cameras from Moog.

Today, about 40 percent of the world’s trade passes through the strait every year, including oil from the Persian Gulf and manufactured goods from a variety of Asian countries. However, this volume of high-value trade makes the strait a popular hunting ground for pirates, which made many enterprises skeptical about shipping through the area. In 2004, the Strait of Malacca suffered 38 actual or attempted pirate attacks – the second highest total in the world. In 2005, the London insurance market added the strait to its list of areas at risk of war.

In 2008, however, only two attacks were attempted in the Strait of Malacca. What changed? Cooperation between Malaysia, Indonesia, Singapore and Thailand led to significantly improved security in the strait, including organized sea patrols, airplane scouting, and information sharing on pirate activity. The improved security also included the 22 surveillance towers, which feature thermal cameras, radar and a variety of communication methods.

According to Eric Salter, Director of Product Engineering at Techno-Sciences, the project integrator, the project is part of the global War on Terror, helping nations crack down on piracy in international waters as well as illegal dredging, fishing and trafficking. An additional investment from the U.S. Navy enabled Salter to upgrade the project’s cameras to a thermal installation.

The stations report surveillance data to command centers, passing off actionable intelligence to intervention staff. For example, Salter says, if a high-speed vehicle is detected in the strait and it is not reporting its own position, an operator at one of the towers could send a report, along with a thermal video clip or still image, to the monitoring station, which could then dispatch naval resources to identify or address the vessel.

These coastal stations are manned by military personnel, and the cameras’ fields of view (a mix of limited and unlimited pan-tilt-zoom types) look out over the ocean and range from 180 degrees to 270 degrees, and the thermal cameras have a range of several nautical miles.

“Thermal enables them to have a 24-hour watch period,” Salter says. “They can go beyond detection of atypical ships and start working on classification and ID.”

By making the strait an inopportune location for piracy or illegal activity, the nations bordering it benefit from improved insurance ratings and a better outlook for international supply chain routes.

But your enterprise doesn’t need military backing to get strong ROI from thermal cameras. For the City of Clermont, Fla., Environmental Services Manager Bob Reed is using thermal cameras to act as tripwires around major assets, such as wastewater facilities.

Roughly $1 million was invested on the project, which covers 60 acres of property in three facilities, Reed says, and it enables the department to save money on both energy, maintenance and incident investigations.

“We can keep our areas dark now, and save money on lighting. That also helps to reduce vandalism – if you can’t see what’s there, you’re less likely to hop the fence to spray paint it,” Reed says. For one of the facilities, located near a middle school and a ball park, that’s an issue. “Middle schoolers like to test our systems. We’re concerned that one will try to hop the fence and get caught in our barbed wire, or trip and fall, so we want to catch them as soon as they get near our property.”

Now, the lights come on as soon as the alarm, configured through VideoIQ analytics on the Flir thermal cameras, is tripped. Then, the color PTZ cameras capture the intruder’s image. In one incident, a burglar hopped the fence to break into cars parked on the facility grounds, and the alarm was sent straight to the local police department. Officials arrived at the scene to catch the thief in the act.

“We have access control on every door, so by the time the intruder gets in, the police are right behind,” says Reed.

“You can’t put a price on the safety of our drinking water. If this system prevents one contamination, it’s worth the million dollars.” 

KEYWORDS: cost-savings infrastructure security international security news security technology thermal cameras

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Claire Meyer is a former Managing Editor for Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • oil_feat

    How Smart Thermal Cameras Protect Pipeline Infrastructure

    See More
  • Sec Feat

    Critical infrastructure: The critical industry everyone must protect

    See More
  • Generic Image for Business Continuity

    Lab Testing Models to Protect Critical Infrastructure

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products

Events

View AllSubmit An Event
  • June 15, 2012

    Axis Thermal Cameras

    Axis thermal cameras allow users to detect people, objects and incidents in complete darkness, bright daylight, and difficult conditions such as smoke, haze, dust, and light fog. In this webinar, we’ll highlight Axis thermal camera series and capabilities.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing