Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyIdentity ManagementPhysical SecurityVideo Surveillance

How artificial intelligence can transform event venue security operations

By Aman Bhardwaj
crowd entrance security fp
June 21, 2021

It has become an essential function for security teams to protect the public by preventing weapons and other prohibited items from being brought into the spaces where people gather for entertainment, learning, worship, and more. Security measures in places such as stadiums, outdoor venues, schools, religious facilities, convention centers, corporate campuses, and government buildings need to be efficient to safely process large volumes of people. Further, there is a growing need for contactless security in the wake of the COVID-19 pandemic that will allow physical distancing while also respecting the privacy of individuals to improve the security experience.

Traditional methods of screening such as walk-through and handheld metal detectors have been in use for decades, and while historically, they have been effective for the detection of metal weapons, they are also very prone to high false alarm rates. Additionally, they are not particularly efficient, with limited throughput and the need for patrons to remove certain clothing such as belts or to empty items from their pockets such as keys and cell phones. And even with these steps, it is often necessary to include secondary screening measures such as pat downs.

For event operators, this process can negatively impact the experience of the guests by causing delays, hassle, and unnecessary secondary screening, which can also impact the business’s bottom line by decreasing the time that the guests have to enjoy the venue’s potential food, drink and merchandise offerings. New technology is forthcoming that will enhance detection and security providing a more positive experience for guests and operators.

 

Improving the Efficacy and the Efficiency of Screening with Artificial Intelligence    

Technology advancements for data, artificial intelligence (AI), and computing provide an opportunity for security teams to make screening both more effective and efficient. This is done by using AI and deep learning algorithms, combined with large volumes of data acquired through three-dimensional (3D) imaging, along with advanced computing power, to improve the detection of concealed weapons.

3D images can be acquired using technologies such as low-power radar that bounces off a person’s body as the person walks past sensors at a security checkpoint. This means that is it possible to have patrons move through security more quickly, with less contact, fewer pat downs, and lower false alarm rates.


liberty defense

Example 1

 

liberty defense

Example 2

 

liberty defense

Example 3

The deep learning technology used for this is also used in many other real-life applications such as speech recognition, object recognition, sentiment analysis, and autonomous driving. The neural networks it uses are inspired by biology and how the human brain works, recognizing complex patterns within unstructured data. This is why deep learning is capable of detecting concealed firearms, IEDs, explosives, and other prohibited objects.     

 

Contactless Security

Artificial intelligence can also provide another benefit that in the wake of the pandemic has become incredibly relevant. The COVID-19 pandemic provided the event industry with an opportunity to pause and re-evaluate what aspects of security could be made stronger, more efficient, and more comfortable for guests.

AI, when deployed as described in this article using 3D-imaging technology, can create a completely distant, contactless, and seamless experience for guests. The means that venues can be filled more quickly so that guests will spend more time being excited about their event and spend less time bogged down with security procedures.

 

Privacy

Another benefit to using AI in security operations is that it can also help guests maintain their sense of privacy. They are not required to empty their purses or pockets, are not being patted down by personnel, are not removing belts or jewelry, and they are not being asked about what metal they may have on or in their bodies. And because the 3D images used by the AI are used only by the AI, as opposed to by humans, this further protects the privacy of guests, because no personally identifiable information is captured or stored, and no images of their bodies are seen or stored.

   

How It Works

To prepare deep learning applications to detect weapons or other prohibited items, a structured and iterative process of training deep learning models is required to ensure that the quality of the data is high.

Deep Learning is a data-intensive task. Having a large volume of data, and in this case, 3D image data is a key success factor in order to train neural networks to achieve a high level of accuracy in their predictions. However, this alone is not sufficient. A large volume of high-quality annotated data is also required, and so the data must go through pre-processing, labeling, and a quality audit process. Any errors in pre-processing and labeling will lead to lower performance such as higher false alarm rates. To train computers using data and artificial intelligence, the data needs to represent real-world scenarios such as different body types, obscurants, weapons (class, shape, sizes, materials, etc.), and security operations. This is achieved by obtaining high-quality data sets and ensuring that all data that is used by the AI provides the necessary information for detection through the use of 3D imaging technology.

 

Looking Forward

With newer technologies providing rich data, advancements in deep learning in computer vision applications and exponential gains in computing power, artificial intelligence is making a difference in screening patrons for dangerous or prohibited items and delivering a significantly improved experience and result.

Against the backdrop of the pandemic, the need for minimizing contact between patrons and screeners will accelerate the use of AI technologies. Using AI, the screening process at event facilities could involve little or no touching, little or no need to remove jackets, empty pockets, and purses, and often no need for patrons to even stop walking – allowing for higher throughput without comprising safety, and an overall more positive experience for guests and staff.

KEYWORDS: artificial intelligence (AI) event security false alarms public safety screening process

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Aman bhardwaj 01

Aman Bhardwaj, COO of Liberty Defense, is a product development executive with 30 years of experience in bringing product and services to market in wireless, security, consumer electronics, and e-learning industries. He has extensive experience in defining, developing, and deploying complex technology products, managing technology partners, building high performance engineering teams, and in program management of large and complex product development programs. Prior to his management roles, Mr. Bhardwaj spent ten years as an RF engineer designing, and developing wireless products. He holds both a Bachelor and Master of Science Degree in Electrical Engineering from Georgia Institute of Technology specializing in RF and electromagnetics and an Executive MBA from Georgia State University.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • G4S_healthcare

    How AI can be used to improve healthcare security operations

    See More
  • Security cameras

    Transform what video intelligence can become with AI

    See More
  • SEC0319-Cyber-Feat-slide1_900px

    How Artificial Intelligence is Going to Make Your Analytics Better Than Ever

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!