Friday, November 4, 2016

British and European Intruder Alarm Standards

British and European Intruder Alarm Standards

DD243
Code of Practice for installation and configuration of intruder alarm systems designed to generate confirmed alarm conditions.
BS 8473:2006
Code of Practice for Intruder and hold-up alarm systems - Management of false alarms
BS EN 50131 Series
European Standards on Intruder Alarms
(Originally due to commence October 2005)
PD6662:2004
Guideline for the implementation of BS EN 50131-1:2004

Introduction
To help ensure that alarms are designed, installed and maintained reliably, suppliers and installers make reference to a series of British Standards and Codes of Practice. Some of these have been withdrawn and replaced by the ‘European Standards for Intruder and Hold Up Alarm Systems' - usually referred to as the Euro Standards.
The Euro Standards only apply to new systems.  Existing systems remain subject to the British Standards and Codes of Practice applying at the time of their installation; but exceptionally may need to comply with the new Euro Standards if they require such extensive re-design/equipment replacement that they effectively become a ‘new system'.

Means of Introduction
Because some of the Euro Standards relating to components are not yet published, and the Euro Standards do not cover some issues that alarms may be required to meet in the UK to satisfy the police or insurers, an enabling ‘standard' has been prepared.  This outlines retained/additional UK requirements that apply alongside the Euro Standards and was published in August 2004 titled ‘PD6662:2004 - Scheme for the application of European Standards for Intruder and Hold up Alarm Systems'.
Timescale for Introduction of PD6662
A transition period operated until 1st December 2005, during which new alarms could be installed to previous British Standards or the PD6662 scheme.  Now PD6662 must be used.

Overview of EN 50131
The major differences between EN 50131 and the old BS 4737 are:
· Structured standards
· Grading of systems
· Classification of equipment
· Risk based
This provides a structured approach to:
· Assessment of risk
· Technical survey
· System design
· Installation of the system in accordance with agreed specification
· Installation of equipment in accordance with manufacturers' recommendations.
A significant advantage for insurers and surveyors applying European Standards to systems is the specification of grades appropriate to the associated Risk. One of the major differences in the European Standards is the grading of systems, which is not a feature of BS 4737.   

Security Grading
Under BS EN 50131-1:2004, intruder alarm systems will need to be Security Graded according to the kind of intruder considered likely to try to defeat the system.

Insurers are understood to support the Grading approach and it is expected that they will, in due course, recommend particular Grades of system in relation to particular premises risks.  Where this turns out to be the case, installers and customers may take the lead given by insurers, as regards the minimum Grade of system they require, and discuss whether to go for a higher Grade of system.

The grading of a system based on a structured risk analysis will determine the:
· Extent of the system
· Signaling
· Tamper security
Within the new European Standards there are four security grades:
· Grade 1 - low risk
· Grade 2 - low to medium risk
· Grade 3 - medium to high risk
· Grade 4 - high risk
Who Decides the Grade of Alarm? 
Installers
Installers are required to carry out a formal assessment of the theft risk to determine a suitable Grade of alarm.
To do so they will consider the items at risk, existing security arrangements and any previous thefts, etc.  Before they proceed they will seek the customer's formal approval, and may also suggest that any interested insurer be consulted. 

Insurers
Depending on the risk exposure, insurers may require an intruder alarm before providing certain insurance covers, eg theft.  As the Grade of an alarm cannot be readily changed after installation, it makes sense to check a proposed alarm with any interested insurer before proceeding.
Insurers may respond to a request to approve an alarm by visiting the premises, making a decision based on information already held by them, or by agreeing the outcome of the installer's risk assessment.
Insurers will make their own decisions, but as a general guide the following is likely: 
Detection and Control System
Grade 2 - Lower risk premises.
Grade 3 - Normal risk premises, ie all except those suitable for Grade 2 or 4
Grade 4 - Very high risk premises, eg cash handling centres, banks, museums.
A further inclusion in the European Standards is the classification of components that are used for the intruder alarm system installations. These will be classified, which in turn will determine where they are installed.
Detection and Control System - Grading
Apart from increasing control panel event memories and levels of recommended detection; the key difference between Grades 2, 3 and 4 is that movement sensors at Grade 3 must be able to detect ‘masking', ie something has been placed over the sensor lens and at Grade 4 ‘range reduction', ie something has blocked part of the detectors' field of view.

Key Action Steps 
When having a new alarm installed:
·        Use a reputable installer, eg one inspected by the NSI (NACOSS) or SSAIB.
·        Co-operate with the installer's risk assessment procedures.
·        Check any interested insurer agrees with the proposed alarm Grade, Detection, Signaling and Response.
·        Where police response necessitates a ‘Confirmation System' check that the installer designs a system that has:
·        Dual Path Signaling
·        Confirmation from each ‘at risk' area
·        A ‘Means of Unsetting' that does not prevent the police being called should an intruder force open the designated alarm entry/exit door.


 BS 8473:2006 European Standards for Intruder Alarm Systems

Code of Practice for intruder and hold-up alarms – Management of false alarms.

BS 8473 has been drawn up to assist all parties in the management of false alarms, to reduce the disproportionate level of resources being absorbed by the police, the alarm industry, customers and operators as a direct result of false activations.

Preventing false alarms: points to remember;
The intruder alarm system (IAS) is to be operated only by persons who have been correctly trained. If there is uncertainty about the correct operational procedures the alarm company should be contacted.
Before leaving the premises check that all doors and windows are physically secured. A walk around the supervised area is the only effective way of doing this properly.
Ensure that detection devices are not obstructed. In particular be careful that infra red beams and movement detectors are not obstructed by stock or other items.
If movement detectors are used do not introduce sources of heat, movement or sound into the area supervised by these detectors without informing the alarm company.
Always follow the entry/exit procedure agreed with the alarm company. Entry through any door other than the one designated should be physically prevented. Switching off the IAS is always the first task on entry.
Before entry, ensure that the means necessary to enter the premises and unset the IAS are known and available in a secure manner to the operator.
Inform the alarm company of any alterations to the premises which could affect the IAS. Do not permit people other than employees of the alarm company to make changes to the IAS. Place system on test when building immediately.
Treat the IAS with care. Wiring and detection devices can be accidentally damaged or moved. If this occurs inform the alarm company immediately.
After a false alarm, check the system carefully, and if possible, note the cause of activation. Inform the alarm company of the believed cause of the activation immediately.
Make sure regular maintenance checks are carried out by the alarm company and that you have the correct contact details for the alarm company and ARC. Remember that excessive false alarms can result in police response being withdrawn.
Most IAS require a mains electricity supply. If the electricity supply to your system is disconnected for more than 4 h contact the alarm company.
EN 50131 European Standards for Intruder Alarm Systems

EN 50131 was phased in to replace British Standards BS4737, BS7042 and BS 6799 and was adopted in October 2005 utilizing PD 6662:2004, an enabling document which facilitated the introduction of EN 50131 into the UK.

The difference between PD6662 / EN 50131and the old British Standards
PD6662 differs from former British Standards in the following ways:
It determines not only the system but also the component design requirements for Intruder and Hold-up Alarm systems.
A comprehensive Risk Assessment is required to determine the design criteria of the system.
Applicable to both hard-wired and wire-less installations.
Grading of systems is required to reflect "the risk". I.E. Grade 1 - Low Risk, Grade 4 - High Risk.

Does my existing system need to be upgraded to comply with PD6662
If your current system complies with the old British Standards and is working effectively changes are not required.
If any upgrade to your system is undertaken your insurance company will require the system to comply with PD6662.
If  you lose Police Response and the URN is withdrawn it can only be reinstated if the system is upgraded to comply with PD6662.

RISK ASSESSMENT
One of the most significant issues within the new EN standards will be evaluating the risk associated with the premises and determining a grade of system. This is because once the grade of a system is determined it will define the extent of the system, its signalling and tamper security requirements.

SECURITY GRADES
One of the most important aspects of the EN 50131 requirements is the concept of a security grade. For each installation the grade of system has to be chosen according to various factors. In the EN the grade is described in terms of the type of intruder and how much effort they would put into a burglary.
What are the Grades?
Grade 1 is for an installation with a low risk of theft. The property is not likely to attract intruders. It is assumed that a thief is likely to be opportunistic rather than bothering to plan things in advance. In the application guide (DD CLC/TS 50131-7) it assumes that an intruder is simply going to break open a door.
Grade 2 is for a slightly higher risk of theft. The property is likely to have something of interest to an experienced thief. In this case the intruder is expected to have some knowledge of how alarm systems work and possibly carry some tools to allow him to overcome a simple alarm system. The thief is likely to check the building for ease of access through doors, windows and other openings.
Grade 3 is for a reasonably substantial risk property. There is good reason to assume it may be broken into and might well contain objects of high value. An intruder is likely to gain access by penetrating doors, windows or other openings. The thief could be very experienced with intruder alarm systems and possess a number of tools and equipment to overcome the system
Grade 4 is for very high-risk properties. Intruders could be expected to plan a burglary in advance and have the knowledge and equipment to alter parts of the intruder alarm system to prevent detection. It is assumed that the intruder could gain access by penetration of floors, walls and ceilings. The intruder is unlikely to be working alone.

What Grade of System does my installation need?
This is difficult to say at the moment and opinion on this matter varies from country to country. The view in the UK tends to require grades that are higher than other countries (e.g. a shop in Belgium at grade 2 could be grade 3 in the UK). To a large degree the choice of grade would be guided by insurance companies. A typical view though could be:
· Grade 1 would only be of interest in domestic properties (without an insurance requirement for an alarm system).
· Grade 2 would be most domestic properties and low risk commercial (e.g. florists)
· Grade 3 would be for high-risk domestics and most commercial properties (e.g. Newsagent with cigarette sales)
· Grade 4 would be for extremely high-risk domestic and higher risk commercial properties (e.g. bullion stores).

Mixing Components of Different Grade
The EN standard says that it is not necessary to use the same grade of component throughout an intruder system.
If the installation is a grade 2 then there is no problem using, for example, a grade 3 power supply.
If however an installer fits a grade 2 component (such as a detector) in a system then that system is limited to grade 2 at best.
It is possible to have a defined part of a system at a higher grade so long as all associated parts are at the same (or higher) grade. For example a system combining intruder and hold-up (PA) functionality could have a grade 4 hold-up system whilst the intruder parts were limited to grade 3. But this example is only valid if the power supply, alarm transmission system and warning devices used by the hold-up (PA) parts are all grade 4. This would still allow intruder parts such as PIR's to be grade 3. The system as a whole is, of course, only grade 3. 

Friday, October 21, 2016

Power Line Communication Camera

Power Line Communication (PLC) Camera

Power-line communication (PLC) or Ethernet over Power (EoP).carries data on a conductor that is also used simultaneously for AC electric power. Transmission or electric power distribution to consumers. It is also known as power-line carrier, power-line digital. Subscriber line (PDSL), mains communication, power-line telecommunications, or power-line networking (PLN). As we know, WiFi IP Cameras was developed to reduce the cabling costs.
However, WiFi technology has its shortage. Such as low stability, limited transmission distance, Interference problem, big bandwidth consumption etc. All these shortage are no longer exists on our PLC Security Systems. With PLC technology applied in our IP Cameras and NVR, we have cracked the main pain points for Home Security Surveillance Systems.

The PLC Cam uses the house‘s power line like a long video cable, ensuring that no connections other than the power outlet are needed. Thus installation is particularly easy: plug the PLC Cam into the power outlet, connect the provided PLC adapter to the DSL router - you‘re done! Even while on holiday or at work: the direct Internet connection and app for Apple iPhone/iPad and Android devices makes individual monitoring possible anywhere in the world.
Power-line communication (PLC) carries data on a conductor that is also used simultaneously for AC electric power transmission or electric power distribution to consumers. It is also known as power-line carrier, power-line digital subscriber line (PDSL), mains communication, power-line telecommunications, or power-line networking (PLN).
A wide range of power-line communication technologies are needed for different applications, ranging from home automation to Internet access which is often called broadband over power lines (BPL). Most PLC technologies limit themselves to one type of wires (such as premises wiring within a single building), but some can cross between two levels (for example, both the distribution network and premises wiring). Typically transformers prevent propagating the signal, which requires multiple technologies to form very large networks. Various data rates and frequencies are used in different situations.'

A number of difficult technical problems are common between wireless and power-line communication, notably those of spread spectrum radio signals operating in a crowded environment. Radio interference, for example, has long been a concern of amateur radio groups.
Power line can be used to shorten the wiring so that safety cameras, speed up data transfer and recording to Nas and makes mounting the camera becomes easier. If it requires more than one then the connection can power-line connected to the access point in setting exudes wifi and emit a signal with a full bar to obtain the camera so that the camera is always a constant ping without breaking or disturbance barrier wall or conflicting signals.

Advanteges:
1. PLC signal is stable and relible. Siganl is much better than Wi-Fi. No consumtion of bandwidth, no interference.
2. Transmit distance is over 300meter over powerlines. No need dedicated cabling.
3. Plug and Play, super easy operation. We changed the professional CCTV system to easy handling consumer electronics.
4. PLC signal speed is over 200Mbps, 4-ch 1080p video streams flow without 
delay.

Disadvantages:
If your home electrical wiring isn't
up to date, you might not get optimal performance from a powerline networking solution. It's not as fast as Gigabit Ethernet speeds (the fastest networking solution for home or office), but it is on par with current Wireless-N Wi-Fi networking.

Powerline networking is often touted as one of the easiest and most affordable whole-home networking solutions because you don't have to lay a lot of cable or install more wiring in your walls. However, you will still need to purchase adapters that will plug into your electrical outlets. Compared to buying multiple adapters, the price of a single wireless router might make more sense depending on what you'll be networking.

You also have to be careful to choose powerline networking adapters and accessories that use the same standard. There are three standards available from a variety of manufacturers:
HomePlug AV (available from manufacturers like Belkin, Linksys, Netgear, and ZyXEL)
UPA, which stands for Universal Powerline Association (available from D-Link, Netgear, and others)
HD-PLC, which stands for High Definition Power Line Communication (available from Panasonic)

Saturday, October 15, 2016

WEP vs WPA

WEP vs WPA

The best way to secure your wireless network is to change the type of encryption that your computer uses to send data. The three most common choices for encrypting your data are WEPWPA, and WPA2. This guide describes these different types of encryption so that you can decide which is the best choice for your network.

WEP

WEP (Wired Equivalent Privacy) was introduced in 1999 and at first, it was thought to be as secure as a wired network. WEP uses a password to create a static encryption key that it then uses to encrypt data sent over the web. This means that the same key is used for all of the information or "packets" you send over the air waves during a session. This static key becomes a big problem with security because a key that doesn't change is much easier to attack than one that is constantly changing. WEP is not a "wired equivalent," as it's name suggests; it can be cracked in less than a minute by a commonplace hacker. Unfortunately, a lot of older routers have WEP as their default choice.

WPA and WPA2

Due to the major inefficiencies of WEP, WPA (Wi-Fi Protected Access) became available. WPA was the intermediate step between WEP and WPA2 and was not intended to be used indefinitely. WPA uses a type of temporary encryption key that changes with each packet sent over the web. Also, WPA enables your router to automatically reject any packets that it receives out of order. This is good because it prevents hackers from injecting packets onto your network which is one of the primary means of getting in.


In 2006 WPA2 became mandatory in all new Wi-Fi devices. WPA2 replaced WPA's temporary key with a superior government level security encryption. This upgraded encryption uses AES (Advanced Encryption Standard) thought to be uncrackable at this point. WPA2 is considered very secure.

WPA2 Modes

WPA2 has several different versions to choose from:
·   WPA2-Personal is sometimes referred to as WPA-PSK (Wi-Fi Protected Access Pre-Shared Key). With WPA2-Personal, you set up a password in your router which you share with those you want to have access to your network. This password is entered through the computer or device that is connecting to your Wi-Fi network. We recommend this security mode for home networks.
·   WPA2-Enterprise is used for businesses only.
·   WPA/WPA2 Mixed Mode may also be a choice in your particular router. This means your router uses WPA2 if possible but falls back on WPA when needed. Due to WPA2 being a much safer choice, we recommend not using this mode. If you have devices that are not compatible with WPA2, we recommend updating your equipment to better protect yourself against unwanted security attacks.
Both WPA and WPA2 require the use of a strong password, it is recommended that you use a password of at least 20 characters, including symbols and numbers. Check out this guide to learn more about how to create a strong password.

Recommended Wi-Fi Settings

The security of the information you send over the internet should be of top priority. We recommend using WPA2-Personal whenever possible since it has the strongest encryption. WPA should be a far second choice and WEP should not even be considered a choice. If you have a router newer than 2006 you should have a firmware upgrade that allows for WPA2-Personal, which we highly recommend upgrading to. If you have an older router, made before 2006, you may want to consider upgrading your device to a newer one that can be better secured.
Also note, that after changing your router to a different encryption type, you will need to re-configure all of your wireless devices to your network. Devices like wireless printers, phones, music players, gaming consoles, and wireless televisions may need to have their settings changed and be re-connected to you network.

Saturday, October 1, 2016

Wired or Wireless Analogue / IP CCTV cameras

Should I use wired, (cabled), or wireless analogue CCTV cameras? 
Choosing whether to use wired or wireless should be an easy decision.
There is only one question to ask: can I run a cable from my camera to recorder? If the answer is “yes” then you should always run a cable. If it is very difficult to cable then using a wireless camera may be an option, but only as a last resort.
Advantages of a cabled CCTV camera:
  • Reliability – a physical cable will always be a lot more reliable than a wireless camera
  • Less chance of interference – wireless cameras are prone to interference from many sources
  • Less expensive – wired cameras generally cost less
  • More professional – wireless cameras are only used in cheaper home systems
  • Security – wired cameras are very difficult to jam. Wireless cameras can be blocked very easily by many different pieces of electronic equipment, eg: Wireless Access Points, mobile phones, microwave ovens, TV’s, two way radio equipment, gaming equipment, energy efficient lighting, the list goes on....
  • Privacy – nobody else can see the cameras on your CCTV system, (CCTV means “Closed Circuit”), wireless cameras can be easily viewed by anybody with the right receiver, including your nosey neighbour!
  • Generally better quality.
  • Wired cameras can be connected to just about any CCTV recorder. Wireless cameras need specific wireless receivers, so they generally can’t be used from one system to another.
  • Higher quality CCD image sensor, gives a clearer, better balanced picture. Many wireless cameras use cheaper CCD sensor, the images look murkier.
  • Huge range of cameras to choose from, from Rs. 2500 up to Rs. 7500, wired cameras are available to suit just about any need, no matter how specialised.
Advantages of a Wireless CCTV Camera
  • Easy for non-professionals to install
  • Can work out cheaper – ideal for when capturing reliable, clear images isn’t important
  • Easy to receive the images with cheap wireless receivers – your friends and neighbours can easily see the images from your cameras too.
So there you have it, the answer is clear, never, ever use a wireless camera solution if you can avoid it. If you need to use a wireless solution because of the long distance involved, then use wireless transmitter.

5 Important Locations in Your House That Need To Be Secured
1.     Front Door
Experts state that almost 34% of all intruders enter through the front door. You will have to select a safe location for this camera and preferably place a protective covering over it so that the risk of tampering is minimized.
2.     Back Door
Expert state that 22% of all intruders use the back door hence this is also an important spot to place a surveillance camera. Make sure you place it at a location where it is out of reach and safe from projectiles.
3.     Off-Street Windows
Burglars often use windows that are not visible from the streets, to break into houses as this reduces their chances of being caught. Motion detectors or glass-break detectors are designed to detect such break-ins.
4.     Backyards
These can be an ideal place for robbers or burglars to start off at night. Night-vision surveillance cameras can be used in backyards along with motion-sensor floodlights.
5.     Basement Stairs
Basements usually have multiple small entry points like hatches, doors or windows which can be used to sneak in. A motion sensing alarm can be placed here to help catch any intruders.
Whether, its wired or wireless, surveillance cameras play a central role in protecting you and your loved ones. Installing surveillance cameras at the right points and keeping on top of your security system is essential and necessary.

Friday, September 23, 2016

Auto-tracking PTZ for Perimeter surveillance

Auto-tracking PTZ for Perimeter surveillance

Auto tracking is an advanced image processing algorithm to track the moving objects with respect to the speed and direction of the movement. Based on the requirement and application it has several advantages to reduce the number of cameras and increase the coverage area, reduce human intervention and manpower costs. A single PTZ camera to cover a large area and to automatically detect, follow and record video of moving objects such as humans or vehicles.

The auto-tracking system works in the same way as motion detection in that the camera will compare the current image taken with the previous image. If too many of the pixels are different the camera will register motion. In addition to this though, the auto-tracking system will work out which portion of the image is moving and register it as an object. It will then move the camera to keep that object in frame for as long as it can (comparing frames to understand the direction of movement). This means that even if the system is not actively monitored, the camera can follow possible intruders around the area picking up vital evidence where a normal PTZ camera would not. Once the object no longer registers the camera can be set to return to a preset position.

Conventional Speed Dome cameras have a wide detection range, they have to be manually controlled to adjust the camera to track the moving objects, which is inconvenient and less of reliability. Besides, if there are multiple cameras installed, it’s not so possible to control all of them simultaneously when some particular accidents happen. Meanwhile, detecting the moving object and tracking the movement can be critical even for movements with low frequency. For example, the museums after closing and the parking lots at night can be very quiet with barely no movement occurred. Normally, thieves breaking into a museum after closing may have minimal movements, however it’s extremely important to capture these movements for the security teams.

Infinova Auto-tracking is the feature built into to the camera to automatically track the moving objects with auto zoom in/out and auto-focus parallelly. The camera has its how intelligent logic to understand the moving objects speed and direction and tries to track them when crossed any Intrusion area selected by the User or triggered by means of any external alarms such as Alarm input contacts. Auto tracking can also trigger for a PTZ from VMS Software and the trigger options are numerous.

Advanced Auto tracking involves alarm-based trigger which may use the self-camera alarms like motion detection, Intrusion detection etc or from other cameras alarms by using raw trigger method or Software based trigger. Once the alarm has been triggered the PTZ camera will Auto track the moving object within the specified scene available and then track the objects. User can also configure a Home position and can opt for Move to Home position when alarm triggered and then Auto track. These are typical usage applications for Auto tracking. According to user requirement and application auto tracking can be configured in several forms as below
1. Self-analysis and Track
2. Other camera Alarms linked to track (SW/HW)
3. I/O based alarm linked to track
4. Software based Alarms linked to track

Infinova Auto tracking PTZ camera is approved by IS 13252(PART 1):2010/ IEC 60950-1: 2005

Below are the images to showcase the Perimeter Auto tracking
Fig 1: Auto tracking image
Below sequence of images are derived from live demonstration of Auto tracking from Hyderabad City Police demo
Instance : 1
Advantages:
·        Minimize Human intervention and requirement
·        Automatically tracks the moving object with respect to the speed and direction
·        Evidence for every movement within the scene specified
·        High chances of intruder tracking
·        Can cover larger areas with minimum number of cameras
·        Cost effective and efficient
Disadvantages:
·        Accuracy levels depends on configuration and system setup at field level
·        Limitations while multiple moving objects on the scene at the same time
·        Heavy usage of Hardware and components while PTZ in Auto tracking mode.
 
Infinova has deployed the Auto tracking PTZ and successfully demonstrated for the below projects

1. SHAR (Satish Dhawan Space Centre) - Perimeter surveillance

2. Indian Oil corporation - Perimeter Surveillance

3. Bharat Petroleum Corporation - Perimeter Surveillance

4. City surveillance projects - General surveillance

5. Airports perimeter - General and Perimeter Surveillance

“Utilizing the Pan/Tilt/Zoom to focus on, follow and track the moving objects automatically, Infinova PTZ cameras with auto-tracking function will no doubt to be more competitive beyond other products in the market. We design Supply & Commissioning of such project” says Arindam Bhadra (Director SSA Integrate).

Conventional others Auto Tracking PTZ May give you below scenario.
Illustration demonstrating how the larger object will be targeted by the Auto-Tracking Camera
Before acting on such assumptions, here are a few considerations to keep in mind with some scenarios where just one auto-tracking camera could work.