Showing posts with label Safe secure Magazine. Show all posts
Showing posts with label Safe secure Magazine. Show all posts

Sunday, May 26, 2019

Globally Tailgating is common problem

Globally Tailgating is common problem

One of the biggest weaknesses of automated access control systems is the fact that most systems cannot actually control how many people enter the building when an access card is presented. Most systems allow you to control which card works at which door, but once an employee opens the door, any number of people can follow behind the employee and enter into the building. Similarly, when an employee exits the building, it is very easy for a person to grab the door and enter the building as the employee is leaving.
This practice is known as "tailgating" or "piggybacking". Tailgating can be done overtly, where the intruder makes his presence known to the employee. In many cases, the overt "tailgater" may even call out to the employee to hold the door open for him or her. In these cases, good etiquette usually wins out over good security practices, and the intruder is willingly let into the building by the employee.

Tailgating can also be done covertly, where the intruder waits near the outside of the door and quickly enters once the employee leaves the area. This technique is used most commonly during weekends and at nights, where the actions of the more overt tailgater would be suspicious.

Solutions To The "Tailgating" Problem

First, recognize that the tailgating problem is probably the biggest weakness in your security system. This is particularly true at doors that handle a high volume of employee and visitor traffic. Many security managers spent a lot of time worrying about unauthorized duplication of access cards and computer "hackers" getting into their security system over the network. It is far more likely that someone who wants access to your facility will simply "tailgate" into the building rather than using one of these more exotic methods to breech your security.

The practice of overt tailgating can be reduced somewhat through employee security awareness training. If employees are frequently reminded of the tailgating problem, they are less likely to let a person that they do not know into the building deliberately.

It is difficult to overcome the problem of covert tailgating through employee security awareness alone. While it would be possible to ask employees to wait at the door until it locks after they pass, it is probably not likely that this procedure would be followed except under the most extreme circumstances.

You can follow this link http://arindamcctvaccesscontrol.blogspot.com/2015/11/anti-passback-in-access-control-systems.html "Regular access control is more than adequate for standard control at entry points. Use anti-tailgating systems to address a specific problem that could or has happened" says Arindam Bhadra.


The problem of covert tailgating can usually only be reliably solved through the use of special "anti-tailgating" devices.

"Anti-Tailgating" Devices

To minimize the problem of tailgating, the security industry has created a number of "anti-tailgating" devices. These devices include mechanical and optical turnstiles, security revolving doors, security portals, and doorway anti-tailgating devices.

The essential function of each of these devices is that they permit only one person to enter or leave the building at a time. They either do this by providing a physical barrier that only allows one person to pass, or electronically by providing sensors that detect when a person attempts to tailgate in, or when more than one person tries to enter using the same card.

The following is a brief summary of each of the common types of anti-tailgating devices:

HALF-HEIGHT MECHANICAL TURNSTILE
Description: Rotating mechanical barrier arms installed at waist height prevent passage through opening. Electrically-controlled, using valid access card causes arms to unlock allowing passage of one person. Turnstile can be controlled in both directions, or allow free-passage in one direction.


Approximate cost: ₹ 4, 50,000 to ₹ 5, 50,000 per opening.
PROS: Lowest cost anti-tailgating device, readily accepted by most users, relatively unobtrusive, well-proven and reliable.

CONS: Can easily be climbed over or under, requires separate door or gate for emergency exit and for handicapped users, easily defeated by knowledgeable intruder, can be somewhat noisy when operated.

Comments: Good choice for use at visitor lobbies or employee entrances where cost is a consideration. Works best when turnstile can be observed by security officer or receptionist to allow detection of people climbing over or under the device.

FULL-HEIGHT MECHANICAL TURNSTILE
Description: Rotating mechanical barrier arms installed to prevent passage through opening. Extends from floor to height of approximately eight feet. Electrically-controlled, using valid access card causes arms to unlock allowing passage of one person. Turnstile can be controlled in both directions, or allow free-passage in one direction.

Approximate cost: ₹ 14,50,000 to ₹ 15,50,000 per opening.

PROS: Provides good security at a moderate cost. Well-proven and reliable.

CONS: Obtrusive in appearance, requires separate door or gate for emergency exit and for handicapped users, lacks sophisticated anti-piggybacking detection features, can be somewhat noisy when operated.

Comments: Good choice for commercial and industrial facilities where security and cost considerations are more important than appearance.

OPTICAL TURNSTILE
Description: Consists of two freestanding pillars mounted on each side of opening. Equipped with electronic sensor beams that transmit between pillars. Passing though opening interrupts sensor beam and causes alarm unless valid access card has first been used. Sensor beams are connected to computer processor that detects when more than one person attempts to pass though opening on a single card. Turnstile can be controlled in both directions, or allow free-passage in one direction. Available with or without mechanical barrier arms and in a wide variety of styles and finishes.

Approximate cost: ₹ 20, 50,000 to ₹ 25, 50,000 per opening.

PROS: Aesthetically-pleasing appearance, accommodates handicapped users, does not require separate emergency exit, has sophisticated anti-piggybacking detection systems, provides good visual and audible cues to users.

CONS: Expensive, units without barrier arms provide no physical deterrent, must be used at an entrance manned by security guard, relatively high "false alarm" rate, some user training required to work effectively.

Comments: Good choice for use in manned building lobbies where aesthetics prevent the use of a half-height manual turnstile.

SECURITY REVOLVING DOOR
Description: Standard revolving door that has been specially modified for security use. Extends from floor to a height of approximately eight feet. Typically has multiple quadrants equipped with electronic sensors that detect number of people in each quadrant. Use of valid access card allows one person to pass through door, if more than one person attempts to enter, door sounds alarm and reverses to prevent entry. Door can be controlled in one or both directions.

Approximate cost: ₹ 70,00,000 to ₹ 75,00,000 per opening.

PROS: Provides best protection against tailgating and piggybacking, fast, handles high volumes of traffic, unobtrusive in appearance, provides energy savings when used at exterior entrances.

CONS: Very expensive, requires separate door or gate for emergency exit and for handicapped users, door cannot be used for loading/unloading of large objects, relatively high maintenance costs.

Comments: Good choice for use at unattended building entrances where appearance is important.

SECURITY PORTAL (also called "Security Vestibule" or "Mantrap")
Description: Consists of passageway with door at each end. Regular swinging doors or automatic sliding doors can be used. Passageway is equipped with sensors that detect total number of people present. Sensors can include electronic beams, floor mat switches, and weight detectors. Video cameras with analytic software can also be used (see video analytics below). To use, user enters passageway and closes door behind him. He then proceeds to second door, and uses access card to enter. If more than one person is present in passageway, portal sounds an alarm and prevents entry. Portal can be controlled in one or both directions.

Approximate cost: ₹ 18,50,000 to ₹ 21,50,000 per opening.

PROS: Provides good protection against tailgating and piggybacking, unobtrusive in appearance, accommodates handicapped users, does not require separate emergency exit, allows load/unloading of large objects.

CONS: Expensive, relatively slow, cannot support large volumes of traffic, some versions can have high maintenance costs.

Comments: Good choice for use at unattended building entrances with relatively low traffic volumes and for entrances into high security internal areas, such as computer rooms.

DOORWAY ANTI-TAILGATING DEVICE
Description: Consists of devices installed on each side of regular doorway. Equipped with electronic sensor beams that transmit between devices. Passing though opening interrupts sensor beam and causes alarm unless valid access card has first been used. Sensor beams are connected to computer processor that detects when more than one person attempts to pass though opening on a single card. Doorway can be controlled in both directions, or allow free-passage in one direction.

Approximate cost: ₹ 6,00,000 to ₹ 7,00,000 per opening.

PROS: Easy add-on to existing doors; provides good protection against tailgating and piggybacking, unobtrusive in appearance, accommodates handicapped users, does not require separate emergency exit, allows loading/unloading of large objects, relatively inexpensive.

CONS: Must be used at an entrance manned by security guard, does not provide good visual and audible cues to users, some false alarms.

Comments: Good choice for use at doorways with relatively low traffic volumes and where conditions do not permit the use of another type of device.

VIDEO ANALYTICS ANTI-TAILGATING SYSTEMS

Description: Consists of video cameras installed at doorway opening. Cameras are connected to a computer with special video analytics software that detects and analyzes people and objects at the door. System may use multiple cameras that allow precise determination of object size, height, and direction of travel. When used at single door, video analytics anti-tailgating systems work similarly to doorway anti-tailgating devices and sound alarm when more than one person attempts to enter through door after a valid access card has been used. Video analytics anti-tailgating systems can also be used with security portals to both sound alarm and deny access when more than one person attempts to enter.
Approximate cost: ₹ 3,50,000 per opening for single door system, ₹ 12,50,000 to ₹ 15,50,000 for security portal system.

PROS: Easy add-on to existing doors; provides good protection against tailgating and piggybacking, unobtrusive in appearance, accommodates handicapped users, does not require separate emergency exit, allows loading/unloading of large objects.

CONS: Single door systems do not provide a physical barrier so must be used at an entrance manned by security guard, requires frequent user training to prevent false alarms, relatively expensive.

Comments: Popular choice for use at computer rooms and other high-security facilities.

Selecting the Right Anti-Tailgating System

Choosing the right anti-tailgating system is an important decision. You need to consider your overall level of security risk, your ability to provide security staff to monitor your entrances and respond to alarms, and your budget for initial purchase and ongoing maintenance of the anti-tailgating systems.

Artical Publish by Safe Secure Magazine in the month of May 2019 issue.

Sunday, April 14, 2019

Know about BMS technical protocols

BMS - What you should know about technical protocols

If you or a client is choosing a building management system (or BMS), it’s important to understand how it communicates information with digital devices such as controllers, meters, and input/output boards, and computers.

The details are important because some BMS use languages—or technical protocols—that lock you into using their vendor’s proprietary technology. Use of such protocols may force you and your client to pay higher prices for software and hardware available from only one vendor or its licensees.

This article describes common categories of BMS protocols. It recommends that you avoid proprietary protocols and favor more open ones.

A BMS communicates through protocols
To exchange data, digital devices must use a common data structure and a common channel or medium of communication.

The figure below shows a master BMS that communicates with devices that use microprocessors. They include a roof-top unit (or RTU), refrigeration controllers, energy meters, and other input/output boards within a building. The building controller also uses the Internet to share temperature, operating parameters, or energy data with remote users through enterprise servers or personal computers.
A BMS protocol defines the format and meaning of each data element, in much the same way a dictionary defines the spelling and meaning of words.

The data exchange often occurs through a physical wire such as a twisted-pair RS485 or an Ethernet CAT5 cable). It may also occur wirelessly over wi-fi network, through an internet protocol (or IP).
The phrase “BACNet over IP” means the BACNet protocol communicates through an IP network.
Some protocols are more open than others
Protocols fit in one of four categories, depending on their relative “openness:”
1.       Open. The protocol is readily available to everyone.
2.       Standard. All parties agree to a common data structure. The protocol may be an industry standard, such as BACnet and Modbus.
3.       Inter-operable. The protocol is vendor agnostic. A controller from one vendor can replace one from a different vendor.
4.       Proprietary. The data structure is restricted to the creator of the device.

Why you want BMS with open protocols
A BMS with proprietary protocols locks the system owner into using a single BMS vendor. For example, you can’t remotely change the set points of a proprietary BMS unless you use the vendor’s software.
In contrast, with open and standard BMS protocols you can shop for alternative providers of digital devices and enterprise software.

This is why use of proprietary protocols is inconsistent with best practice. The lesson is clear:
In choosing a BMS, be sure its protocols are not proprietary.

How to know whether a BMS protocol is open
To determine whether a BMS protocol is open, ask the vendor two simple questions:
1.       Can your competitors exchange data with your BMS?
2.   Is the system’s protocol published in such a way that it’s easily accessible to everyone (including competitors)?

Best open protocols: BACNet, Modbus, and XML
For a master controller that exchanges data with devices and meters within a building, prefer the BACNet, Modbus or any other standard protocol. Otherwise, make sure it’s at least open enough so anyone with proper security access can read and write information.

For remote enterprise access (protocol B in the figure), organizations often use BACnet over IP.
The current trend is toward use of additional Internet technologies. Companies like Honeywell Tridium (Niagara framework) and many others have exchanged data through standard internet eXtensible Markup Language (or XML) with web services.

Even the ASHRAE BACNet committee has convened a working group to define use of XML with BACnet systems. The group is also working to define web services that will enable data exchange between building automation and control systems and various enterprise management systems.

Put in short, use these criteria when you’re choosing devices and BMS:
·         For devices such as RTUs and refrigeration controllers, look for ones that use open protocols such as BACnet or Modbus.
·        Make sure these devices give you both “read” and “write” capabilities so you can change set points.
·         For easy enterprise access, choose a BMS with web services and XML capabilities.
·         Make sure the web services of the BMS allow both read and write capabilities.
·      Be sure the BMS supplier provides the XML dictionary and definitions of web services to anyone, including competitors.

 
This Artical published on April 2019 at Safe secure Magazine.

Sunday, March 3, 2019

Guide of IP Camera’s Footage Storage

Guide of IP Camera’s Footage Storage


If you are end-user then you may make question “if somebody destroy or theft my NVR/DVR then how we get video footage”. Question is very much true. Analog camera store / record there motion event on DVR & IP Camera store / record there NVR, some IP camera store limited data to there internal microSD card.
Or, Is there a camera that saves the footage on a host with FTP? Can I use my computer to store surveillance videos or footage? Are there any cameras that support cloud storage? Is there any camera that has a built-in memory card?

Or, you may say I am looking for a camera that can store up to a few days of data or a camera that uploads footage offsite or to a cloud or server.
How Can you Store Footage and Video Recordings
Generally speaking, you can store footage and recordings on an SD card, cloud, NVRs/DVRs, FTP or NAS. It comes down to what you are looking for. That being said , it’s still very important to weigh on differences and conveniences of each solution to narrow down growing pool of models available and find the best match.
·         Option 1. Micro SD Card
·         Option 2. NVRs/DVRs
·         Option 3. FTP Server
·         Option 4. Cloud-Based Storage
·         Option 5. Workstation Computer

Option 1. Micro SD Card

People will be opting for onboard SD storage when they are just looking for cameras that save motion-triggered footage or don’t want to subscribe to cloud service. For example, users said
“I want to store footage locally instead of uploading to a cloud or getting a DVR/NVR.”
“I intend to keep and save footage but don’t want to subscribe to a cloud service for storage. “
Or people who are looking for cameras that will be used in a location where internet access is limited but still want to store motion-based footage. For example, one user explained that
“I have a rural property and only have power at the house and barn. Best option would be a motion activated cam outside that I could attach to a tree. Wifi at my house is only available very close to the house and we are on satellite internet, so no real broadband for cloud solutions.”
The obvious benefit of storing via SD card is that it’s relatively safe and inaccessible by others, micro SD card storage option is extraordinarily popular with homeowners for surveillance on the front doorbackyardapartmentremote areasvacation home, oany place that doesn’t require constant 24/7 recording.

Option 2. NVR's/DVR's

Standalone NVRs and DVRs, as offsite storage solutions, are increasingly popular and widely used among home security systemsmall businessworkshop and etc.
If you are looking for a security system that can record video constantly and be able to save weeks of footages, standalone NVR's/DVR's with a built-in hard drive are what you need. For example, users expressed their needs, saying
“No need for motion activation but constant recording. And must have ability to review footage without needing to pause or stop recording”, “I need 30-day non-stop recording and want to record and save more than 3 cameras’ footages to a hard drive”
NVRs/DVRs are not just for storage, they are also embedded with the operating system to multi-task including managing multiple cameras simultaneously, motion-triggered recording & alarm, scheduling recording, 24/7 recording.
NVRs can also be accessed remotely from a Smartphone, tablet or personal computer.
One piece of advice after buying NVRs/DVRs would be keeping them safe from burglars orthieves as well as backing them up regularly to FTP server if needed.

Option 3. FTP Server

FTP server is a great footage storage option for those who have a reservation for cloud storage but don’t want local network drive or built-in memory card. For example, many homeowners expressed their thoughts on , saying
“I don’t want to go down the road of paying for monthly memberships to a cloud storage option for recording. I am looking for FTP or some other generic protocol method that is NOT a subscription based ‘cloud’ solution.”
Or
“I would like to save the footage on a host with FTP instead of storing the footage on a local network drive that could just be taken. or I have a FTP server and want to manage the footages or videos on FTP server, configuring security cameras to upload event-based recordings or snapshot or recorded images and videos to a FTP server.”
FTP server is, without any doubt, a good solution. Security cameras such as Reolink cameras are proving to be increasingly popular with homeowners. Many Reolink security cameras do support FTP storage, both motion-based footage and constant video recordings.

Option 4. Cloud-Based Storage

Cloud-based storage is gaining popularity among users who are looking for an alternative to NVR/DVR, SD card, and NAS and there are growing numbers of cloud-based video surveillance cameras and IP camera with cloud storage available on the market.
Cloud-based storage is relatively convenient and safer; however, cloud services are commonly charged and require a varied monthly subscription fee.
Cloud-based storage is also potentially putting a strain on the home network by putting pressure on network bandwidth, as well as compromising photo or video quality to achieve optimal performance.

Option 5. Workstation Computer

Of course, you can always turn your personal computer into a storage unit by configuring storage path to your computer; however, massive data storage could slow your computer down and eat up storage space rapidly.
Not only that, CCTV forage auditing you can do from computer. You need window license based software only. That software takes screenshot of your open Camera Viewing window. In this scenario you can see what camera saw. Camera see 24Hr, you are able to see within 24min, I am confirm your DVR / NVR can’t do it. ‘Auditing’ means 'seeing' what the cameras 'saw'. CCTV video footage should be audited daily; several times a day if need be. Depending on the requirements, auditing of CCTV footage of critical cameras on a daily basis must become an SOP. Auditing will help relevant stakeholders to ‘discover’ the 'unknown'. Auditing as an activity may be manual, it may be post-facto, but it is a very dedicated and systematic process, which helps address some of the challenges of live monitoring (video blindness, poor attention span, boredom, bias, fatigue etc.), as well as the challenges related to alert-based systems (how often has one faced false alerts, or what is called the ‘cry-wolf’ effect). Auditing will help discover issues as mentioned above as well as in identifying and analysing threats and hazards (THIRA/HIRA) of various kinds. Auditing CCTV video footage will also be extremely helpful in waste reduction and following the 5S philosophy, i.e. sort, set, shine, standardize and sustain (all part of Six Sigma practices).  Moreover, in case of an accident/incident, relevant authorities can analyse CCTV video footage to determine whether implementing or improving existing policies, procedures, and processes could help reduce the potential for future occurrences.
And you can transfer those recordings from your computer to hard drive, pen drive, USB and etc accordingly.

The Tradeoff

There’s no right answer here. It’s really a matter of preference and there are plenty of models out there to suit either taste. Understanding each footage storage option will help you narrow down the growing pool of models available today and it will help you understand the features that matter to you most. Camera saw everything, but we can’t see what camera saw.
This Artical published on March 2019 on safe secure magazine 2019.


Sunday, January 6, 2019

PoE NVR and PoE Switch

Difference between PoE NVR and PoE Switch?

Sir “I’m going to install two IP cameras in my house. However, I have no idea whether to use a PoE NVR or a PoE switch matching with them. So, what’s the difference between them? “

Hello “Arindam sir, this is XXX from BBB, as you are security expert, I realy confused from my cctv vendor, someone quote PoE based NVR someone quote PoE switch with Normal NVR. Please suggest which technology is best for us.”


Such type of questions I face throughout 2018, which indicates many people feel confused about the selection between PoE NVR and PoE switch. This write-ups / blog intends to explore the differences between PoE NVR and PoE switch in details.
What Is PoE?
PoE, an abbreviated form of Power over Ethernet, allows a single CAT cable connecting a power sourcing equipment (PSE) to provide both data connection and electric power to powered devices (PDs) such as IP cameras, wireless access points, etc.
What Is a PoE NVR?
NVR represents for network video recorder which provides you with centralized video controls to easily view, manage, and store your surveillance footage in one convenient location. A PoE NVR is a security video recorder with built-in PoE switch designed to use with PoE-based IP cameras.

Equipped with a PoE switch, a PoE NVR recorder can deliver both data and power over a single Ethernet cable. There is no need for an additional PoE switch, which will reduce the cost of equipment in theory. You just need to connect one Ethernet cable from the camera to the PoE NVR recorder and then the built-in switch will provide power to the camera while transmitting data.

A PoE NVR is ideal for users with minimal network administration experience and is generally used in homes and small businesses. It creates a private camera network, keeping surveillance footage isolated from the main network and adding an extra layer of privacy.
What Is a PoE Switch?
A PoE switch or power over Ethernet switch, containing multiple Ethernet RJ45 ports, is a dedicated network switch with multiple Ethernet ports to connect network segments and provide power and network communications.

It expands a network created by a router. Basically, it just assigns LAN IP addresses to your camera and needs to be tied into a system that allows you to see and manage your cameras, which is usually done with video surveillance software on a computer. Therefore, it must be connected directly to a router on the same network as your NVR. It can reduce the need for extra outlets and extension cables and saves deployment cost and labor efforts as well.

Power over Ethernet switch can be classified into many types. In addition to the most common one, gigabit PoE switch, for example, there are other types as well such as unmanaged and managed PoE switches. Most PoE switches provided in the market have standard gigabit Ethernet ports which can provide speed of 10/100/1000Mbps. For smaller network, 8-port Gigabit PoE switch is very popular. For larger/enterprise network, we use 24-port PoE switch and 48-port managed switch.
Main difference between a PoE NVR & PoE Switch
From the above, you will see that both PoE NVR and PoE switch can provide power and data transmission. However, the former is limited in minimal network administration experience while the latter can expend the network freely. What’s more, a switch does not assign IP addresses, which is the job of a DHCP server, usually built into a router. PoE NVRs provide this service, while PoE switches don’t. The switch simply provides a data path between all of the devices connected to it.

Note: You cannot plug a POE switch into an NVR directly - it must be plugged into your network.


Tips of Hanwha PoE NVR 
By default, PoE NVRs are set to connect directly to IP cameras.  In cases where the PoE ports are connected to network switches, the NVR must be put in Manual mode.
In addition, the PoE ports are set to Isolated mode, where each device can only communicate only with the NVR and not each other.  This is a security feature to prevent rouge devices from accessing other devices on the network.  This will prevent a connected PC from accessing IP cameras for setup changes.
If you are uplinking non-camera devices, such as switches, media converters, PCs, etc., you must set the NVR to Manual mode.
From the setup menu of the NVR, navigate to System > System Management > Settings > Load Factory Default.
Select the Manual Setup Mode.  If you wish to save some of the settings to speed up setup, check the Not Included options of User, Camera, and/or Network as needed.

Click the Initialization button and wait for the NVR to reboot.

This Write ups published on safe secure magazine Feb 2019 issue.


Saturday, January 6, 2018

DRI in Video Surveillance

DRI in Video Surveillance

Wish you a very happy new year 2018. In today’s competitive environment, having new customers constantly is one of the keys of success. To make professional quotes with proper sketches, realistic test objects, 3D images, mock ups etc, which leave a lasting impression on your clients.
When you are answering queries related to your product, you can quickly glance through the details while your client is on call.
DRI stands for Detection, Recognition and Identification in video surveillance. DRI ranges, expressed in meters, km (or miles), can be found in the specification table of infrared camera brochures. In order to select the right sensor meeting the application requirements, these DRI ranges have to be, first, perfectly defined, but also assessed with regards to globally adopted industrial standards.

DRI Definition

The terms “Detection”, “Recognition” and “Identification” were defined as follow:
  • Detection: ability to distinguish an object from the background
  • Recognition: ability to classify the object class (animal, human, vehicle, boat …)
  • Identification: ability to describe the object in details (a man with a hat, a deer, a Jeep …)

The following pictures illustrate these definitions:
    Left image: Detection – At several kms, 2 targets are detected out of the background 
    Center image: Recognition - a human is walking along the fence 
    Right image: Identification – 2 males with trousers and jackets are identified – one is smoking.
We detect an object when it enters the field of view. Detection means we are aware that an object (or person) now exists where previously it was not seen. Usually, this is due to movement of the object into the field of view of the surveillance camera. Detection simply means we are aware of the object, but have too little details to recognize or identify the object.
As the object moves closer, we may recognize the object from characteristics previously encountered. For example, aircraft recognition is taught to military ground troops and airmen. All aircraft have wings, engines, a fuselage, and tail assembly. They differ in size, shape, number, and position to each other. A particular model of aircraft can be recognized by recalling these characteristics from pictures, drawings or past detailed observations.
Identification is the process where sufficient details are available to uniquely discern a person or object that is previously unknown. Identification requires sufficient detail to accurately describe or recall the characteristics of the subject at a later time. For example, a mug shot (booking photograph) is taken following the arrest of a subject as a means of photographing (recording) sufficient details for later identification by a victim or witness. In video surveillance terms, sufficient detail is calibrated in pixels per foot of the area recorded by the camera.

DRI Ranges

“A picture is worth a thousand words” goes the old and equally wise saying. It is true that most human beings learn much quicker when aided by visuals rather than pure text as that is more in tune with the human psychology of learning.
So instead of remembering commands and functions you will easily remember that yellow color indicates areas where it is possible to recognize people, red color indicates areas suitable for people identification, green areas for detection and so forth.
To put this in perspective, sensors have a resolution of 640×480 which is over 300,000 pixels.
Human “detection” only requires 3.6 of those pixels and “identification” only requires 230 pixels, which is an extraordinarily small amount on the screen that can easily go unnoticed by the human eye. In fact, if this page were the size of your video feed, the area required for a human detection rating is about equivalent to a lowercase letter “i” in this text. The amount of detail visible at the detection, recognition and identification distances is not as high as one might expect, as can be seen in the chart below.
Another thing that is often not mentioned is that these ratings are based on what is termed “ideal conditions” which rarely happen in the real world. The average environmental application will get 25% less than the distance that the thermal camera is rated for and in extreme conditions can be less than 10% of the rated distance.

Based on SR-100 & SR-100P by FLIR the approximate DRI (Detection, Recognition and Identification) range for a vehicle and a human target is listed in Tables 1 & 2.
Lens
Detection
Recognition
Identification
100mm
4.4km
1.1km
580m
Table 1: DRI range for Vehicle with 2.3m critical dimension using a Thermal Security Camera with 38 micron pitch detector

Lens
Detection
Recognition
Identification
100mm
1.6km
400m
200m
Table 2: DRI range for Human Target using a Thermal Security Camera with 38 micron pitch detector
Assumptions:  50% probability of achieving objective at the specified distance given a   2-degree temperature difference and 0.85/km atmospheric attenuation factor.  Actual range may vary depending on camera setup, user experience, environmental conditions, and type of monitor or display used.
Each & every Camera has this DRI ranges, before preparing project oriented ppt, do confirm the ranges & show in a slide with sketch.
Artical publish at safe secure magazine January 2018 issue.

Warrior 2.0 26BF2 is a 1080P 2MP Fixed Lens Mini Bullet Camera
Detect: 100 ft
Recognize: 50 ft
Identify: 25 ft

Laser 2.0 - 26ZV-LIR is a 2MP (1080P) IP PTZ Camera with 33x Optical Zoom & Laser Infrared camera and Spotlight 2.0 - 26ZV-W is a 2MP (1080P) IP PTZ Camera with 22x Optical Zoom & Full Spectrum Light Camera
Detect: 950 ft
Recognize: 875 ft
Identify: 750 ft

Lookout 2.0 - 26ZV is a 2MP (1080P) IP PTZ Camera with 30x Optical Zoom Camera
Detect: 1000 ft
Recognize: 900 ft
Identify: 800 ft

Judge 8.0 - 26DV8 is a 4K (8MP - 4x1080P) Multi-Purpose Lens Dome Camera with Motorized Zoom and IK10 Camera and Gladiator 8.0 - 26BV8 is a 4K (8MP - 4x1080P) Multi-Purpose Lens Bullet Camera with Motorized Zoom and P-Iris Camera
Detect: up to 200 ft
Recognize: up to 150 ft
Identify: up to 100 ft

Deputy 4.0 - 26DF4 - 4MP (2x1080P) Fixed Wide Angle Lens Turret Dome Camera
Detect: 115 ft
Recognize: 50 ft
Identify: 35 ft

Archer 2.0 - 26BV2-L - 2MP Long Range, Low Light Bullet Camera with Motorized Zoom and Focus
Detect: up to 450 ft
Recognize: up to 350 ft
Identify: up to 300 ft

Warrior 4.0 - 26BF4 is a 4MP (2x1080P) Fixed Lens Mini Bullet Camera
Detect: 150 ft
Recognize: 75 ft
Identify: 50 ft