This blog is meant as a resource for Security Professionals,Property Managers, Builders, Designing Consultants, Architects, Project Managers, Law makers, Building approving authorities, Facility Managers, Security & Safety Officers & System Integrators. From Now we add Automation write-ups. For Safety please visit http://bhadrafiresafety.blogspot.in/ If you found this is useful then donate some amount, pls read my complete profile in RHS.
Tuesday, May 31, 2011
Monday, May 30, 2011
Three Common Mistakes made with Security Company Websites
Find out the three biggest mistakes you can make with
your security company website.
I’ve visited a lot of Security and Investigation websites
over the years, more so than most people ever will. I’ve also built 100’s of
websites over the last decade, so I have an idea of what works and what
doesn’t. Some sites are fantastic promotional tools for the company. Many in
the security industry though leave a lot to be desired.
Below I’ll cover some of the biggest mistakes I’ve seen on Security Company Websites and give you an insight into why.
1. We are the leading security company
Really? Are you sure? Did you know that the potential client just visited 10 of your competitors and 8 of them said exactly the same thing. Who are they to believe? In a world where information is fast and quick at hand, where your competitors are only a few clicks away, sprouting to the world that you are the leading company does not inspire confidence. In fact it can have a negative effect when everyone else is saying exactly the same thing.
Find ways of inspiring confidence in your product or services that don’t require you to make claims without validation.
2. We offer Security Services Melbourne, Guards Melbourne, CCTV Melbourne, AlarmsMelbourne
We get the point, you offer services inMelbourne .
But who exactly do you think will be reading the words on your website?
Potential clients? Existing clients? What are they going to think when you
repeat words over and over to the point where it becomes painful to read? It’s
not like you’d ever use a sentence like that when talking to them face to face,
but that’s what your website is doing.
Now some of you reading this may be thing why on earth would anyone do that. Well some web designers, so called search engine optimisation experts and some people that just read the wrong things online think that if you repeat words over and over that you’ll get better search engine rankings. To an extent this is somewhat true. I mean the search engines are just programs and need to figure out what your page is about. So including on-topic keywords “within reason” helps the search engines get a better picture of what your company is all about.
The biggest problem with this though lies in the fact that the page will be read by humans, your potential clients. Even if you get the better rankings, what are those potential clients going to think when they read that? You may also find yourself penalized and lose your rankings in the search engines, but that’s another story. There are a lot of factors that go into search engine rankings, so focus on things that don’t require making a mockery of the English language. So to keep it simple, write for humans first, search engines second.
3. Last updated 2007
Do you still exist? You must since you paid your webhosting and domain name fees all this time, but do potential clients know that? A website built in the style of the last millennium also doesn’t inspire much trust or professionalism.
Now not everyone that set-up their website a long time ago believes the internet holds any value for their business. It probably didn’t work for them then and hence forth it probably won’t work now. The website though is a reflection of your business and speaks volumes about your attitude towards potential clients.
A quick update is in store and you don’t even have to break open the piggy bank to do so. With all the how-to websites around, with kids these days learning to build websites in school, I’m sure most companies could find a way to upload at least a one page site to replace that dinosaur. Keep it simple, present it neatly and include all relevant information. It should be a pretty quick thing.
How much is one new client that finds you on the net worth to your security business over a number of years anyway?
Below I’ll cover some of the biggest mistakes I’ve seen on Security Company Websites and give you an insight into why.
1. We are the leading security company
Really? Are you sure? Did you know that the potential client just visited 10 of your competitors and 8 of them said exactly the same thing. Who are they to believe? In a world where information is fast and quick at hand, where your competitors are only a few clicks away, sprouting to the world that you are the leading company does not inspire confidence. In fact it can have a negative effect when everyone else is saying exactly the same thing.
Find ways of inspiring confidence in your product or services that don’t require you to make claims without validation.
2. We offer Security Services Melbourne, Guards Melbourne, CCTV Melbourne, Alarms
We get the point, you offer services in
Now some of you reading this may be thing why on earth would anyone do that. Well some web designers, so called search engine optimisation experts and some people that just read the wrong things online think that if you repeat words over and over that you’ll get better search engine rankings. To an extent this is somewhat true. I mean the search engines are just programs and need to figure out what your page is about. So including on-topic keywords “within reason” helps the search engines get a better picture of what your company is all about.
The biggest problem with this though lies in the fact that the page will be read by humans, your potential clients. Even if you get the better rankings, what are those potential clients going to think when they read that? You may also find yourself penalized and lose your rankings in the search engines, but that’s another story. There are a lot of factors that go into search engine rankings, so focus on things that don’t require making a mockery of the English language. So to keep it simple, write for humans first, search engines second.
3. Last updated 2007
Do you still exist? You must since you paid your webhosting and domain name fees all this time, but do potential clients know that? A website built in the style of the last millennium also doesn’t inspire much trust or professionalism.
Now not everyone that set-up their website a long time ago believes the internet holds any value for their business. It probably didn’t work for them then and hence forth it probably won’t work now. The website though is a reflection of your business and speaks volumes about your attitude towards potential clients.
A quick update is in store and you don’t even have to break open the piggy bank to do so. With all the how-to websites around, with kids these days learning to build websites in school, I’m sure most companies could find a way to upload at least a one page site to replace that dinosaur. Keep it simple, present it neatly and include all relevant information. It should be a pretty quick thing.
How much is one new client that finds you on the net worth to your security business over a number of years anyway?
Sunday, May 1, 2011
Reduce Crime with Wireless/ non-Wireless CCTV Systems
CCTV Cameras are probably the best ways to reduce crime with your business or home, and there are numerous of places to purchase CCTV equipment. Below are a few factors to consider once shopping for CCTV cameras that will help you save time and expense, as well as help you to preferable to protect your home.
CCTV systems are used in public places all over the world for crime prevention. Or in the case of a crime being committed, the footage from the cameras can be used to apprehend and convict the perpetrators, perhaps even recover stolen property. And if they are wireless CCTV systems, it’s even more convenient.
CCTV systems for homes and work are, of course, not as elaborate as the ones used in huge malls or city streets. But they follow the same principle. The signal from the cameras is transmitted to only a limited number of screens or monitors. The footage is recorded so you can view it at your convenience. The system is quite easy to set up so you don’t have to pay a technician to come over and install it. Since they are wireless and there are no cables to get tangled up in, you can change the location of the cameras as and when you wish. Wireless CCTV cameras are fast becoming the ultimate tool in the fight against crime.
Rather than hire security personnel, most people are choosing CCTV systems to monitor their home or business. Security guards gain a lot of knowledge about your property and your comings and goings even if they’re on the job for just a week. This information can prove invaluable to planning a break-in. No matter how clean their background checks, who can you really trust nowadays?
The sight of a CCTV camera on your property will psychologically impair a burglar’s nerve to break and enter. Security experts aver that this is the main reason that CCTV systems are so effective in preventing crime. If the criminal plans to go ahead with the crime regardless, there’s a greater chance that the fear will make him bungle the job and get caught anyway. Statistics show that shops and convenient stores that have visible CCTV cameras have fewer instances of shop-lifting or “stick-ups”.
Where to Set Up Your Wireless CCTV System
Survey the property that you want to protect. You’ll want a camera at all entry and exit points including windows. You can also install infrared cameras outside your home for night-time surveillance. If the system is for your shop, consider all areas of the shop that are not directly visible from the cashier’s desk. Then, of course, there’s the cash counter. Consider any area that might be an advantage to a burglar, and put up a camera there. The receiver and monitors should be installed in an area where you spend most of your time.
Some CCTV systems come equipped with motion sensors. So it is only when the system detects an intruder that the cameras will come on, accompanied by a piercing alarm. Some security systems will even call the police or your cell phone to alert you. This is especially useful if you’re away a lot or if you don’t have the resources to man someone at the monitors all day.
The form of your camera will even play a huge part in how well hidden you is, and exactly how secure you can your office or home. Often times, if a surveillance camera is very obvious or large, criminals will immediately try and destroy the camera before stealing merchandise or money, or otherwise not damaging the home. If your CCTV camera is well hidden, it will be a hardship on burglars to obtain the camera, and it's also more likely that you're going to catch the trespassing on tape accurately. A discreet camera will likely make customers forms of languages in your house feel safer. So, small cameras, dome-shaped cameras, and in many cases submergible cameras make the perfect idea if you wish to add a little more security to your dwelling or business.
Don’t wait till you’re the victim of a crime before taking precautions. Install a wireless CCTV system today and sleep easy.
Saturday, April 30, 2011
Things that slow your PC down
You are install one CCTV Software in your Customer PC. During boot up a
computer brand new from the store, and to revel in the galactic super-speed in
which it loads. It’s another to keep it running at that same speed, especially
after some months have passed.
There are many reasons why your computer isn’t running at its optimum. Fortunately, they’re all very easy to solve. Read on to find out what slows your PC down, and what you can do about it.
There are many reasons why your computer isn’t running at its optimum. Fortunately, they’re all very easy to solve. Read on to find out what slows your PC down, and what you can do about it.
An overloaded startup
Most applications you install usually add themselves automatically to your Start Up folder. This results in a slower startup because of the time needed to load them all. If your computer used to boot at the speed of light, but now moves slower than an old lady at the zebra crossing, this might be your problem.
SOLVE THIS: by accessing the MSCONFIG command through your search bar or run application, heading to the Startup tab at the top, and unchecking all unnecessary programmes. Seriously, do you really need iTunes to boot whenever you start your computer?
Most applications you install usually add themselves automatically to your Start Up folder. This results in a slower startup because of the time needed to load them all. If your computer used to boot at the speed of light, but now moves slower than an old lady at the zebra crossing, this might be your problem.
SOLVE THIS: by accessing the MSCONFIG command through your search bar or run application, heading to the Startup tab at the top, and unchecking all unnecessary programmes. Seriously, do you really need iTunes to boot whenever you start your computer?
Too many temporary files
Whenever you look at webpages, watch videos, look at photos or even type on Microsoft Word, your computer stores temporary files so that it can load up faster the next time round. These files build up over time and may slow your computer down, especially since they’re usually located in your OS drive.
SOLVE THIS: By running Windows Disk Cleanup, found in Accessories, regularly.
Whenever you look at webpages, watch videos, look at photos or even type on Microsoft Word, your computer stores temporary files so that it can load up faster the next time round. These files build up over time and may slow your computer down, especially since they’re usually located in your OS drive.
SOLVE THIS: By running Windows Disk Cleanup, found in Accessories, regularly.
A fragmented disk
A very old school problem, but still a very real one. Disk fragmentation occurs when the file system can’t or won’t allocate enough continuous space to store a complete file. This results in gaps within that file, and can make that file run slower than it usually would. Sometimes, those gaps occur when the OS deletes a file it doesn’t need any more. (This is safe though, your OS is smarter than you think).
SOLVE THIS: By running the Disk Defragmenter, also found in Accessories, regularly. We suggest not using the computer whilst the Defragmenter runs so as to minimise more fragmentation
A very old school problem, but still a very real one. Disk fragmentation occurs when the file system can’t or won’t allocate enough continuous space to store a complete file. This results in gaps within that file, and can make that file run slower than it usually would. Sometimes, those gaps occur when the OS deletes a file it doesn’t need any more. (This is safe though, your OS is smarter than you think).
SOLVE THIS: By running the Disk Defragmenter, also found in Accessories, regularly. We suggest not using the computer whilst the Defragmenter runs so as to minimise more fragmentation
Programs uninstalled improperly
What a mouthful this header is. A PC does not work like a MAC – simply deleting the application you don’t want won’t cut it, and leaves behind remaining files that may cause your computer to slow down.
SOLVE THIS: By always uninstalling programs with the proper uninstall.exe, or remove them via the Control Panel. Go one step further to delete leftover files from the folder manually after uninstallation. This could include save games, 3rd party add ons, screenshots and etc.
What a mouthful this header is. A PC does not work like a MAC – simply deleting the application you don’t want won’t cut it, and leaves behind remaining files that may cause your computer to slow down.
SOLVE THIS: By always uninstalling programs with the proper uninstall.exe, or remove them via the Control Panel. Go one step further to delete leftover files from the folder manually after uninstallation. This could include save games, 3rd party add ons, screenshots and etc.
A full OS disk
Many people make the mistake of saving everything possible into their C:/ drive, and that usually hosts their OS, or operating system. Once that drive gets too full, it slows down, thereby slowing down your entire computer’s processing speed.
SOLVE THIS: by partitioning your drive into C:/ and D:/ and saving your data in D:/. The lack of strain on your OS drive will let it run faster. You might be pleasantly amazed at the difference this can make.
Many people make the mistake of saving everything possible into their C:/ drive, and that usually hosts their OS, or operating system. Once that drive gets too full, it slows down, thereby slowing down your entire computer’s processing speed.
SOLVE THIS: by partitioning your drive into C:/ and D:/ and saving your data in D:/. The lack of strain on your OS drive will let it run faster. You might be pleasantly amazed at the difference this can make.
Background anti-viruses
Anti-viruses are always helpful, but can sometimes do more harm than good. Since they’re always running and usually boot together with your computer, they can slow down processes considerably. Strangely enough, it’s always the ones you’ve got to pay for that wreak the most havoc.
SOLVE THIS: By disabling auto scans and updates, or by switching to a more lightweight, freeware anti-virus. Some have suggested Avira and AVG Antivirus, but it’s your job to ask your trusted geek friend what he’s using.
Anti-viruses are always helpful, but can sometimes do more harm than good. Since they’re always running and usually boot together with your computer, they can slow down processes considerably. Strangely enough, it’s always the ones you’ve got to pay for that wreak the most havoc.
SOLVE THIS: By disabling auto scans and updates, or by switching to a more lightweight, freeware anti-virus. Some have suggested Avira and AVG Antivirus, but it’s your job to ask your trusted geek friend what he’s using.
Spyware and viruses
Malicious software often heads straight for your Windows Registry or core file system, slowing down your computer. They can sneak in with applications you download online and install, and can also hop in from less-than-savoury websites you visit.
Malicious software often heads straight for your Windows Registry or core file system, slowing down your computer. They can sneak in with applications you download online and install, and can also hop in from less-than-savoury websites you visit.
SOLVE THIS: While spyware and viruses can be removed manually by deleting
them from your registry, some can be more persistent. In this case, use an
automatic spyware remover – tons are available if you do a Google search. One
of the more popular one is Ad-Aware Spyware Remover.
--Thanks to Maryanne Lee to provide info.
Door Monitoring and Control with Internet CCTV
Because internet CCTV cameras are intelligent, as opposed to the “dumb” traditional CCTV cameras, you can use them to see your property from wherever you are in the world, over the internet. That, however, is just the start. By joining these cameras to simple alarm and control circuits, they can be used to monitor and control doors. In part one of this two-part series, I will show you how the monitoring side of the equation works.
Seeing your home, business or family from the other side of the world is amazing enough, but wireless internet CCTV cameras can do so much more than even this impressive feat. Most of the best of this type of camera will have a digital input/output port, or I/O port, that allows the camera to be connected to electrical circuits. The two input connectors on the port can be used to monitor an alarm circuit and trigger an alarm as I will explain.
The input connectors can be wired to each end of a so-called alarm circuit that in reality is nothing more than an unbroken loop of low-voltage wire, connected to, say, a pair of magnetic door contacts. These are a standard part of any alarm system, but for those of you who have not come across them, you basically get two magnets, with plastic mounts. One of them has connectors for the two wires of the alarm circuit. You screw this one with the wires to the door frame, and the other one to the opening door so that they are lined up very close to each other when the door is closed, which keeps the circuit unbroken. This is known as a “normally closed” or “NC” circuit, because in its normal state, the circuit is complete or closed. When the door is opened, the magnetic contacts separate and the circuit is broken.
The wireless internet CCTV camera will detect when the circuit is broken because there will be a change in voltage at the input connectors and the camera is programmed to raise the alarm when this happens. So, when the door is opened your camera can send an immediate message across the internet to a central computer. This computer is programmed to send a text message to your mobile phone, and perhaps an email too – all within seconds of the door being opened. Of course, if you want this great feature without “getting your hands dirty”, you will need a specialist “internet CCTV” company that can provide you with a camera pack ready-configured to work with your alarm circuit, so you can just plug it in.
We looked at how your wireless internet CCTV camera can monitor the area in front of an external door, and raise an alert when someone approaches the door. In this final part of the series we are going to look at the next step in the process; how to use your camera to unlock the door.
You may remember from part one that most good quality internet CCTV cameras have a digital input/output port, or I/O port. This is simply a series of connectors that allow the camera to be attached to electrical circuits. I have shown you in part one how the two input connectors on the port can be used for monitoring an alarm circuit and raising an alert. In a similar way, the two output connectors can be used to switch electrical equipment. Your camera can be configured so that a current is sent to the output connectors under certain circumstances. This gets very interesting, because unbelievably you can use the camera to actually open the door! So how can a wireless CCTV camera actually open a front door? I will explain how in the next few sections.
The first piece of equipment you will need is an electronic door release, which you fit to the door frame. This is a common piece of equipment in home and business security systems and can be obtained inexpensively by searching for “electronic door release” on the internet. The door release is fitted to the door frame so that the catch on the door lock fits into it. The door lock is untouched and the door can be unlocked with a key as usual, but the electronic door release can also open the door. It does this by freeing the catch from the door frame without unlocking the lock, when a current is sent along the attached wires.
The next step is simply to run the wires from the door release mechanism to the output connectors on the internet CCTV camera’s I/O port. The camera has to be programmed so that it will accept an “open door” text message from your mobile phone or from a web page, and send a current to release the door. Of course, you may be happy enough fitting the door release mechanism, but programming the camera to work with it is a specialist task. I always recommend getting in touch with an “internet CCTV” provider for a ready-programmed camera that you simply plug in, so you get this great feature without needing any technical knowledge.
Once you have everything connected, here is how it all works in practice. Let’s say you get a text message alert from the camera to tell you that someone is at the door, and you know it’s about the time your son gets home from school. You log in using your mobile phone or PC and see a live picture of your son standing outside the front door, unable to get in because he’s forgotten his key. You can simply send a text message from your phone to a central number, with your password, user name and a simple command such as “open front door”. A central computer program gets your text message and processes it, checking your credentials. Then, the system sends a message across the internet to your internet CCTV camera, and the camera then sends a current to the door release mechanism, which opens the door for your son, all within a few seconds!
New applications for wireless internet CCTV such as door monitoring and control bring the technology to a different level when compared to traditional CCTV. This is yet another reason why these intelligent digital cameras are fast replacing dumb analogue cameras the world over.
TCP VS UDP & IP Topics
Can you explain the difference between UDP and TCP internet protocol (IP) traffic and its usage with an example?
A. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)is a transportation protocol that is one of the core protocols of the Internet protocol suite. Both TCP and UDP work at transport layer TCP/IP model and both have very different usage.
Bridging the Analog-IP Gap
The name "encoder" does not really do these technological miracles justice. These investment-protecting, budget-saving marvels build a bridge between two generations of surveillance technology and bring harmony to your network.
IP-based video surveillance systems bring many important benefits. The image quality they deliver is a vast improvement. The networks are more scalable and cheaper to run. Better still, computerization means you can automate systems to bring about event management and intelligent video. Nevertheless, it is too early to claim that this development has rendered analog CCTV surveillance systems obsolete.
One option to installers would be to replace everything analog. This would mean getting rid of the existing analog cameras, the coaxial cables that have been laid inside and outside the buildings, the recording systems (AVRs or DVRs) and the management system. It would then be necessary to introduce an entirely new Ethernet cabling infrastructure, which would involve not insubstantial disruption, along with new IP-compatible storage hardware and a management system suited to IP or network video.
In many cases, that would be a waste of time and money, and the people who bought analog systems are not going to write off their investment any time soon, especially when around 95 percent of the estimated 40 million surveillance cameras installed in the world are still analog.
While analog technology is being fast eclipsed by IP video, which is growing at 30 percent a year according to IMS Research, there is no reason why the two infrastructures cannot be rationalized together, apart from a few technological hurdles. These barriers to integration are, in most cases, easily surmountable.
For most installations, the most valuable service you can offer your clients is to migrate them from analog to IP video by making judicious use of their existing network. The key to this magic passage is the video encoder. Encoders help convert analog networks into IP-friendly formats, putting the existing investment in cameras and coaxial cable to good use.
A. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)is a transportation protocol that is one of the core protocols of the Internet protocol suite. Both TCP and UDP work at transport layer TCP/IP model and both have very different usage.
Difference between TCP and UDP
TCP | UDP |
Reliability: TCP is connection-oriented protocol. When a file or message send it will get delivered unless connections fails. If connection lost, the server will request the lost part. There is no corruption while transferring a message. | Reliability: UDP is connectionless protocol. When you a send a data or message, you don't know if it'll get there, it could get lost on the way. There may be corruption while transferring a message. |
Ordered: If you send two messages along a connection, one after the other, you know the first message will get there first. You don't have to worry about data arriving in the wrong order. | Ordered: If you send two messages out, you don't know what order they'll arrive in i.e. no ordered |
Heavyweight: - when the low level parts of the TCP "stream" arrive in the wrong order, resend requests have to be sent, and all the out of sequence parts have to be put back together, so requires a bit of work to piece together. | Lightweight: No ordering of messages, no tracking connections, etc. It's just fire and forget! This means it's a lot quicker, and the network card / OS have to do very little work to translate the data back from the packets. |
Streaming: Data is read as a "stream," with nothing distinguishing where one packet ends and another begins. There may be multiple packets per read call. | Datagrams: Packets are sent individually and are guaranteed to be whole if they arrive. One packet per one read call. |
Examples: World Wide Web (Apache TCP port 80), e-mail (SMTP TCP port 25 Postfix MTA), File Transfer Protocol (FTP port 21) and Secure Shell (OpenSSH port 22) etc. | Examples: Domain Name System (DNS UDP port 53), streaming media applications such as IPTV or movies, Voice over IP (VoIP), Trivial File Transfer Protocol (TFTP) and online multiplayer games etc |
Further readings
UDP is the faster protocol as it doesn't wait for acknowledgement so it is not at all having reliability as compared to TCP.Bridging the Analog-IP Gap
The name "encoder" does not really do these technological miracles justice. These investment-protecting, budget-saving marvels build a bridge between two generations of surveillance technology and bring harmony to your network.
IP-based video surveillance systems bring many important benefits. The image quality they deliver is a vast improvement. The networks are more scalable and cheaper to run. Better still, computerization means you can automate systems to bring about event management and intelligent video. Nevertheless, it is too early to claim that this development has rendered analog CCTV surveillance systems obsolete.
One option to installers would be to replace everything analog. This would mean getting rid of the existing analog cameras, the coaxial cables that have been laid inside and outside the buildings, the recording systems (AVRs or DVRs) and the management system. It would then be necessary to introduce an entirely new Ethernet cabling infrastructure, which would involve not insubstantial disruption, along with new IP-compatible storage hardware and a management system suited to IP or network video.
In many cases, that would be a waste of time and money, and the people who bought analog systems are not going to write off their investment any time soon, especially when around 95 percent of the estimated 40 million surveillance cameras installed in the world are still analog.
While analog technology is being fast eclipsed by IP video, which is growing at 30 percent a year according to IMS Research, there is no reason why the two infrastructures cannot be rationalized together, apart from a few technological hurdles. These barriers to integration are, in most cases, easily surmountable.
For most installations, the most valuable service you can offer your clients is to migrate them from analog to IP video by making judicious use of their existing network. The key to this magic passage is the video encoder. Encoders help convert analog networks into IP-friendly formats, putting the existing investment in cameras and coaxial cable to good use.
Tuesday, March 15, 2011
Change the MAC address in Windows 7
To spoof your MAC address in Windows 7 there are a few
facts you need to know. If your network adapter has newer updated drivers, then
you can only spoof your mac address to an address that begins with 12. For
example 12197ECD414A. You should enter the MAC address without the dashes.
If you would like to spoof your mac address to an address that begins with 00
(for example 00197ECD414A) you must downgrade your network adapter's drivers to
an early version.
Go to Start and then click Run. In the text box type CMD (enter). In
the command prompt type ipconfig /all. This command gives you all the
information for any network card in your system including the wired network
adapter, bluetooth adapter, and the wireless adapter. So you’ll have to look
under the specific heading you need because each adapter will have it’s own MAC
address. The MAC address is called Phyical Address. Now you know your MAC
address.
Go to Start -> Control
Panel -> Network and Internet -> Network and Sharing
Center -> Change Adapter Settings -> Properties -> Configure -> Network
Address -> Value (type your new MAC address). Enter the
MAC address without the dashes.
To verify the change of MAC address. Go to Start and then click Run. In the
text box type CMD (enter). In the command prompt type ipconfig
/all.
CCTV Illegal (90%) Ineffective (80%)
Whether CCTV is an existing element of your security/management strategy or you are considering investing in CCTV, you need to be sure that the system will provide unequivocal evidence.
Imagine your frustration at having your CCTV evidence rejected in a health & safety claim or employment law dispute due to poor quality images or procedural mistakes. The financial impact of such cases could amount to tens if not hundreds of thousands of currency; by comparison most instances of theft can appear almost inconsequential in terms of loss.
The quality of images as seen on TV News and crime reporting programmers is a damning indictment of CCTV standards. Consider the numbers quoted in the headline, 90% Illegal stated by CameraWatch is based on ‘initial research’ and refers to total or partial shortfall in Data Protection Act compliance. 80% Ineffective refers to the efficacy of CCTV evidence examined by the Police and is stated in the Home Office National CCTV Strategy.
These statistics are largely based on anecdotal evidence, nevertheless practical experience of those professionally involved in the assessment of CCTV systems would broadly agree with these estimates.
Another interesting number is the 3.2 to 4.2 million CCTV surveillance cameras employed in the India. Which figure is closest to reality no one knows, but there is probably 1 camera for every 15 members of the population, capturing our images as we go about our lives.
According to current folklore our image is captured 300 times a day and stored for a month or more. Should we be worried?
Provided that CCTV images are managed in accordance with Data Protection Act principles and you are a law abiding citizen, there should be no concern and in countless high profile cases CCTV has proven to be an invaluable aid to investigation. Evidence of the immediately preceding terrorist bombings was of fundamental importance to the Police investigation.
Data Protection Act legislation is at the very core of protecting our Human Rights when it comes to the use of CCTV, so are we safe to assume we are protected from its misuse? The law is certainly adequate and has been since the 1998 Data Protection Act encompassed CCTV images. The Information Commissioner is responsible for enforcement and serious cases of non compliance can result in a substantial fine or even a custodial sentence.
You must let people know that they are in an area where CCTV surveillance is being carried out. The most effective way of doing this is by prominently placed signs at the entrance to the CCTV zone and reinforcing this with further signs inside the area. The signs should contain details of the organization responsible for operating the system, the purposes for using CCTV and contact details.
The Data Protection Act does not prescribe any specific minimum or maximum periods which images should be retained for, the archive period should reflect the organization’s own purposes although 30 days is the accepted norm.
A little known aspect of DPA law is Right of Subject Access, you have a legal right to request a copy of your images captured on CCTV and subject to certain reasonable conditions the organization responsible for the CCTV system (the Data Controller) must provide a copy.
You will need to make the application in writing: stating where you were, the time & date and provide photographic identity so that the relevant images can be searched for. The Data Controller is entitled to charge something for the search including the cost of providing a CD or DVD. The images must be provided to the applicant within 40 days of the date of application or a valid reason for not being able to comply must be given within 21 days.
Legislation is weighted in favor of the applicant and the Data Controller can incur substantial costs in producing the copy recording, particularly if it is found to include images of third parties as well as the applicant. These third party images must be masked in order to protect the identities of others.
A frequent dilemma faced by Security / Facilities Managers of multi tenanted buildings is when a tenant demands access to recordings that may assist them in criminal or civil law matters. In the case of criminal investigation the response is clear cut, the tenant must report the matter to the Police who will request a copy of any video evidence they may require.
Non criminal cases are more complex and disclosure of images directly to the tenant may result in a breach of Data Protection Act law, on the other hand refusal may result in bad feeling if tenant holds the reasonable view that; ‘security is included in the service charge that I am paying and I should be allowed access to CCTV recordings that relate to my business’.
A reasonable response would be to establish the parameters of the recording; date, time and cameras. Then download images in the same manner as for a criminal investigation, but without allowing the applicant to view the images. You have at this point protected the required images from being overwritten by the recording equipment. The next move is to suggest that the tenant instruct their lawyer to request a copy, subject to an undertaking that the law firm becomes Data Controller for the issued copy.
In this article we refer to digital recording only, on the basis that video tape is redundant technology that is no longer serviceable and unlikely to be effective.
Digital images are primarily recorded to hard drive and are only downloaded on demand, the recording equipment should be held in a secure enclosure fixed to the building fabric or located in a security control room. Access to the system to download images should be password protected and only available to nominated Data Processors.
Images should be downloaded to non rewritable media such as CD or DVD and be playable on any video enabled PC or laptop without the need for additional software. It is good practice to download two copies of an incident, one being the Working Copy for issue and the other being an Archive copy held securely on site for backup or verification purposes. It is vital that a robust audit trail is created by means of Unique Reference Numbers printed on the disc during the printing process. The audit trail should be supported by suitable documentation. Download to memory stick, re-recordable media or the internet without secure encryption will compromise the veracity of the evidence.
If CCTV is an existing element within your security & management strategy, make sure that you have a CCTV policy in place describing how it should be managed in compliance with Data Protection Act law. Don’t then file and forget, but ensure that your security staff are issued with a copy and carry out an annual assessment of management and equipment performance, thereby ensuring that your CCTV continues to meet current needs and best practice.
If you are considering the installation of CCTV get a professional to assess your risks and system requirements in the form of an Operational Requirement based on the Home Office model. This is in effect a performance specification that can be issued to those responsible for the technical design and bid process, you can thus be sure of obtaining comparable quotations on which to base your buying decision. Furthermore you will have created a benchmark against which performance can be objectively assessed as a part of an effective professional handover process that will include; System Operating Manual, CCTV Policy, Management Documentation, Statutory CCTV Warning Signs and training of those responsible for managing the system.
Tuesday, March 1, 2011
Products Designed to Provide Home Security
When it comes to protecting your
home and your loved ones, you really can't be too cautious. To help homeowners
protect the things they cherish, manufacturers of home security products have
made a variety of different systems available for use.
Home Alarm SystemsProbably the most used systems for home security are those which come with alarms. The most basic alarm system is a simple device which attaches to an entrance. This economical alarm is usually placed on the front entrance to the home along with a warning sticker informing any would be intruders of the home's protection. On a larger scale, alarm systems can include multiple alarms wired to several entrances as well as first floor windows.
Home security systems with alarms can also include other devices for monitoring the area. Motion sensor cameras and outdoor security lights can be connected to an alarm systems so when they detect motion in the area, the alarms will sound. Some indoor systems use infrared lights to detect motion in the area, which in turn will sound the interior alarm. Alarms are available with different decibel levels making them audible for different ranges. An inexpensive front door alarm will usually be audible to everyone inside the house and possibly to the next door neighbors.
Fake Security DevicesSome people want the security of having deluxe systems installed, but do not have the funds available to invest in these systems. One way to scare off possible intruders is to purchase fake security equipment. Most of the fake items are designed to look like real security cameras. The outer casing is identical to all of the most common types of security cameras, but the inside is empty. These fake cameras come with mounting hardware so they can be attached to any outside wall.
Homeowners can also purchase signs and stickers indicating there are security devices installed on the premises when in fact, there is not. Many people purchase these signs and stickers and place them in their yards and on their doors and windows to deter any potential intruders.
Home Improvements for SecurityIn addition to the alarm and home automation system homeowners can purchase for security, there are also home improvements which can help make a home harder to break into. Replacing screen or service doors on entrances with wrought iron doors will make it much harder for intruders to enter. These doors are made with wrought iron bars designed in attractive styles so they add appeal to the outside of the home.
Installing windows that have interior latch locks can also make them harder to open from the outside. Front doors and garage door sensor can have electronic keypads installed to replace traditional key locks. Keypads require the person to enter their special code number in order to unlock the door. Installing outdoor lights around entrances and on garages will also add protection to a home when the lights are connected to an automatic timer designed to turn them on in the evenings whether you are home or away.
Home Alarm SystemsProbably the most used systems for home security are those which come with alarms. The most basic alarm system is a simple device which attaches to an entrance. This economical alarm is usually placed on the front entrance to the home along with a warning sticker informing any would be intruders of the home's protection. On a larger scale, alarm systems can include multiple alarms wired to several entrances as well as first floor windows.
Home security systems with alarms can also include other devices for monitoring the area. Motion sensor cameras and outdoor security lights can be connected to an alarm systems so when they detect motion in the area, the alarms will sound. Some indoor systems use infrared lights to detect motion in the area, which in turn will sound the interior alarm. Alarms are available with different decibel levels making them audible for different ranges. An inexpensive front door alarm will usually be audible to everyone inside the house and possibly to the next door neighbors.
Fake Security DevicesSome people want the security of having deluxe systems installed, but do not have the funds available to invest in these systems. One way to scare off possible intruders is to purchase fake security equipment. Most of the fake items are designed to look like real security cameras. The outer casing is identical to all of the most common types of security cameras, but the inside is empty. These fake cameras come with mounting hardware so they can be attached to any outside wall.
Homeowners can also purchase signs and stickers indicating there are security devices installed on the premises when in fact, there is not. Many people purchase these signs and stickers and place them in their yards and on their doors and windows to deter any potential intruders.
Home Improvements for SecurityIn addition to the alarm and home automation system homeowners can purchase for security, there are also home improvements which can help make a home harder to break into. Replacing screen or service doors on entrances with wrought iron doors will make it much harder for intruders to enter. These doors are made with wrought iron bars designed in attractive styles so they add appeal to the outside of the home.
Installing windows that have interior latch locks can also make them harder to open from the outside. Front doors and garage door sensor can have electronic keypads installed to replace traditional key locks. Keypads require the person to enter their special code number in order to unlock the door. Installing outdoor lights around entrances and on garages will also add protection to a home when the lights are connected to an automatic timer designed to turn them on in the evenings whether you are home or away.
Monday, February 28, 2011
Edge Recording in CCTV System
What is Edge Recording?
Edge recording, also called local storage or on-board recording,
is when a camera records video directly onto a SD or memory card in the camera
instead of a separate NVR or storage device. Edge recording gives you more
flexibility in recording video.
How Edge Recording Works
Saving video files on an on-board memory card is called edge
recording because the file location is on the “edge” of the surveillance system
network where the camera is located, instead of a “central” location like a NVR
where all cameras and other devices are connected.
The SD cards surveillance cameras use can have limited space
compared to large computer hard drives or NVRs, making them a great solution
when you only want to record small numbers of files. Motion detection-activated
recording, where your camera only records if it detects motion and can go long
stretches of time between recorded events, work well with edge recording.
Edge recording is also an alternative to larger storage systems
if you’re on a budget. While you will need to purchase the SD card separately
from the camera, NVR systems can be more expensive and intensive than you need
if you don’t save many files.
How Edge Recording Can Help You
Edge recording provides a cost-effective storage system for
small systems. But it can also add flexibility to your system, and provide a
backup storage method. While specific features will vary by manufacturer, edge
storage can:
·
Record files to the memory card in the event that the connection
to the central NVR is lost
·
Store video for cameras that cannot easily connect to a central
NVR, including remote locations and mobile camera systems
·
Minimize bandwidth by not sending large video files over your
network
When used as the main storage location for small video files or
as part of a larger system for saving and retrieving files, edge recording is
used by many industries and system installers:
·
For businesses who only save motion-activated video at night
when the office is closed
·
For home owners, who only record when they are out of the house
·
For public transportation, included busses and trains, who
cannot stay connected to a central NVR while traveling
Subscribe to:
Posts (Atom)