Archive for the ‘ CCTV Articles’ Category



How to Connect an IP Camera to an NVR (Network Video Recorder)

Written By:
Wednesday, May 6th, 2015

For years, many customers have asked me what is the best way to to connect an IP camera to an NVR (Network Video Recorder). In this article, I will describe what I think are the best settings you should have in your NVR and IP cameras.

One thing I will recommend to you is to investigate how your network is laid out and have some knowledge of how many computers are connected to your network. This way, it will prevent any IP conflict when configuring the IP camera and the NVR security recorder. By default, all of our recorders will be set with a static 192.168.1.108 and the majority of the IP cameras will be DHCP.

The easiest way to figure what to do at this point is to connect the recorder to the power supply that comes with the unit and then connect an Ethernet cable from your router to the Ethernet port of the NVR. After the unit turns On you will then need to go to the network settings of the NVR. Of course, you need to be connected to a monitor to see these settings.

Main menu

Most of our NVRs will have a new interface, the “blue interface”, and the menus will be spread out a bit different than the previous version. At this point you will notice that there are 3 parts of this window menu: The top is operation, mid is info, and bottom is setting. Go to network and the following page will display:

Dual Nic Art2

Depending on the type of NVR you have, some will have additional settings, but overall the steps are the same. We will be focusing on getting an IP address for the NVR. Click on DHCP, apply and save. You will be kicked out of that menu and in a few seconds your NVR will contact the router to get an available IP address.  Go back to the network settings to see what IP address you received. Normally what I will do is to set the IP address to a digit higher than what the NVR was assigned. This way I will avoid any IP conflicts in the network. Certain router’s DHCP settings will start from 192.168.1.100 all the way to 192.168.1.254 and it also depends on the network scheme and who configured the router initially. Assuming that the router’s scheme is within the numbers above I will set the NVR with the following IP: 192.168.1.200.

Now that I have that out of the way the next thing to do is configure the IP cameras. In the past, all of our IP cameras used to be configured with this IP address: 192.168.1.108. Many times customers and installers used to connect all the cameras at the same time without considering that it could cause a major problem when trying to assign an IP address to the camera or even to have the cameras show up in the tool finder (Config Tool). Nowadays most of our cameras are configured as DHCP. Therefore, if you have a router in the same network as the NVR, then most likely the camera will get an IP address from the DHCP pool setup in the router as soon as it is connected to the the POE switch that they will be connected to.

Here a snapshot of the config Tool:

Config Tool

CAMERA CONFIGURATION PROCESS

Open the config tool and it should populate all of the IP addresses that your equipment got assigned from the network.

NOTE: THERE IS NOT A 100% GUARANTEE THAT ALL THE CAMERAS WILL BE DHCP. THEREFORE, IT COULD NOT SHOW ALL OF THE CAMERAS CONNECTED IN THE NETWORK. AT THAT POINT IT WILL BE RECOMMENDED TO CONNECT ONE CAMERA AT THE TIME AND CHANGE EACH IP ADDRESS AS YOU CONNECT EACH CAMERA.

Assuming that each camera showed up in the tool, click on one of the IP addresses and a box will appear asking you for a username and password:

Config Tool Login

Click on login to access the camera’s IP interface:

Config Tool DHCP

If the camera is configured DHCP most likely it will show like the picture above. Noticed the IP address field along with subnet mask and gateway are gray out. Uncheck the DHCP option marked in red and now you will be able to change the last digit of the camera’s IP address to something different. Like I said before, I will change this camera’s IP address to 192.168.1.220 and click save.

Config Tool Static

Now that we have assigned an IP address in the camera, it is time to access the camera’s settings and features. To do so, you will need to open Internet Explorer and begin to set up some of the features of the browser. Click on this link http://www.securitycameraking.com/securityinfo/forum/remote-viewing-software/web-service/ to follow step by step of how to setup this feature.

Type the IP Address of the camera on the address bar of your browser to access the web service. Once the web service comes up, input the username and password. The default username and password for our cameras is “admin”. After accessing the camera make sure the ActiveX files are installed. They will be needed to access and configure Video resolutions, Schedule, etc.

On the left side of the camera settings go to conditions to adjust the brightness, contrast, HUE etc. I normally leave these settings alone, and just change them depending on the environment.

Conditions

Click on video to configure the resolution of the camera, Frames per second, Encoding, etc. This part of the settings is crucial because it has to do with the recording resolution. Notice that you have two columns: One label is Main Stream and the other is Sub Stream. In a nutshell, this is referring to recording streaming and viewing streaming. The Main Stream settings will affect how the camera sends the image to the NVR over the network, among other things; it will also affect recording quality and how many FPS (Frames per Second) your NVR will be able to use as each camera gets added to each of the NVR Channels.

Video

NOTE:  DVRs have a maximum amount of FPS (frames per second) that they can handle. In the case of NVRs, the majority of them are restricted to an amount of  incoming bandwidth, which it makes certain NVRs to support higher resolutions. Although that is a true statement, I will never have cameras connected to the unit using the maximum bandwidth they can handle, because realistically a network can only handle so much data at one time. For those NVRs with a fixed incoming bandwidth, you will need to divide the advertised speed by the amount of cameras connected to the NVR to realize what bit rate each of the cameras need to be set at. Also, you most consider that the incoming bandwidth is shared also with the sub stream. So, on an NVR that supports 200Mbps for incoming bandwidth you will need to allocate 32 Mbps for the Sub Stream, so at the end you will have 168Mbps available in the Main Stream to stream and record.

Once you have decided how many cameras you will be adding to the NVR, it is important to configure the correct FPS, Bit Rate Type and Bit Rate.  For the Bit Rate Type I recommend “CBR” (Constant Bit Rate) instead of “VBR” (Variable Bit Rate), this way the camera will constantly use a predetermine amount of data you set under Bit Rate. The Bit Rate settings will vary depending on what resolution the camera is configured. For a 1080p resolution I will set the Bit Rate to 1024 (1MB) and the FPS to 15. This amount of data is more than enough to stream one camera at 1080p without loosing pixels.

Next we will set the Sub Stream settings. These settings will not affect recording video quality; instead it will affect the way the video performs over a smart phone while using our app TechproSS or TechproSS plus. This is mainly just for viewing purposes and should be set to D1 at 7 FPS or 10 FPS. The Bit Rate type is fine if we use CBR, and the Bit Rate can be set anywhere between 250 Mbps to 320Mbps. Also make sure the Enable option for this Stream is checked, otherwise you will not be able to view any kind of video while viewing the cameras over the phone or NVR local Interface. Under “Code-Stream Type”, click on the Drop Down and choose Motion. Noticed that the Encode Mode and Resolution are now gray out, and this means that you can only change the FPS and Bit Rate to affect how motion events occurs. These settings are ideal when recording based on Motion only, so you can have the Main Stream at a less intense setting and the NVR will record at a higher FPS and resolution when Motion happens due to these settings. Click Save when done.

Motion

Proceed to “Event > Video Detect”. In here we can enable the motion detection feature of the camera. Also, we can adjust the “Anti-Dither”. This acts like a delay to prevent false motion events. The higher the number, the higher the delay the camera will react to motion events. Right now, I like these settings shown in this picture:

Video Detect event

Next option is the Schedule. Click on “Storage > Schedule” and you can set now Motion recording for every day 24/7. Always remember to save your settings.

Schedule

We are almost done configuring the camera. The last thing we need to make sure we have correct is the Time Zone and Date and Time. This is so the info will be displayed correctly in the NVR.  You can click on “Sync PC” button to get the Time and Date of your PC instead of doing it manually. DST is another option you could set up if you want the camera to change its time when the time changes occurs. NOTE: I will much rather to get DST configured over using an NTP server, because the NTP server works with the Time Zone of the Camera and the NVR. I have seen that I’m force to change the Time Zone when the time changes. Typically DST occurs the 2nd week of March and the first week of November every year, but is worth give it a try in my opinion. Check the internet for more details about the time changing based on a the upcoming years.

DST

Lastly you could export all of these settings if you have many cameras to apply this to. The file containing the settings of the camera will not change the IP address of the camera so is safe to apply this to the cameras you are configuring.

Export

HOW TO ADD THE CAMERAS TO THE NVR

Now for the last step after all of the cameras and NVR are configured, we will need to add the cameras to the channels of the NVR. To me the easiest way to do this is from a PC accessing the NVR over the network.  Open Internet Explorer and begin typing the Internal IP address of the NVR.

Go to Setup> Remote and you can click on device search. At this point the NVR will search the entire network and will display the devices for you to select them and add them to the NVR.

Remote Device

Device Search

Add cameras

At this point, after we add the cameras they should show up in the NVR web interface and the device list below:

Cameras added

Here is how the cameras will look in the web interface:

Time

I hope this article will help you understand how this process works.

facebooktwittergoogle_plusredditpinterestlinkedintumblrmail

Keeping Your Information Safe When Connecting to “Smart Devices”

Written By:
Tuesday, May 5th, 2015

HiRes

Some questions that are always on people’s minds are, “Where is all my information getting routed to?” And, “Who has access to this data?” These questions are especially important when it comes to the new electronic devices making our home a “Smart Home”, such as our thermostats, Door Locks, Fridges, Television Sets, Light Fixtures, Garage Doors, etc. These devices are either connected wirelessly using your WiFi Router or a LAN connection. This means that if you do not take care of how this data is managed, it can land in the hands of an unauthorized user.

Firmware Updates 

Firmware wiki logo

Firmware is permanent software programmed into a read-only memory. Firmware Updates takes care of bugs and any improvements on how the device takes care of a task. This means that if there is a flaw on the code on the initial or any past firmwares the Devices Manufacturer will go ahead an push Firmware to the device fixing the issue. This is a key issue when it comes to these devices as many of us simply forget to verify if they have updated the firmware it is only when the device has stopped working that we go ahead and upgrade the firmware.

Use a Network Security Key

Wi-Fi_Logo

If you have these devices connected via a wireless connection, you should configure it with a network security key. With encryption, unauthorized users cannot connect to your network. They are required to input a security key to gain access to the network. Also, any information that’s sent across your network is encrypted so that only computers that have the key to decrypt the information can read it. This will help with any unauthorized attempts to access your network and files without your permission. Wi‑Fi Protected Access (WPA or WPA2) is what I recommend as a wireless network encryption method.

If possible always use WPA2. Do not use WEP as it is easily cracked. WEP can be cracked with ease using penetrating tools such as Aircrack-ng and Aircrack-ptw. Both of these tools are similar to one another. Like everything out there, there is no such thing as a full secure system. Only a system that is not connected to a Network with no external devices connected to it is where you would get a fully protected system. I say this because even with WPA encryption, you can attack it using other methods that I will not mention, but these tools are out there and a good Network Admin would take care of blocking the way the network sends and receive data either by creating Virtual LAN or other means.

As you see I am focusing on your wireless router, as a LAN connection will require physical access to any port. In this case get yourself a good Guard Dog 😉 lol.

Lets move on to other points of WI-FI tips.

If you have a router or Access Point, you must have Credentials to access the Graphical Interface where you can make changes to the router or access point. Ensure that these are not the default username and password, as this can also be a security issue. You also do not want to use the default SSID [Service Set Identifier] and make sure that the SSID is not the same as others in your area, this can lead to issues with connectivity.

position-of-router

One simple but major issue is positioning your router to maximize coverage. This can create issues with any wireless device as packets are lost as well as performance from the device connecting can become slow as its trying to gain access. This is simply fixed by positioning the router or access point in a location where it can serve the whole location best. You can, in some instances, reduce the power of the radio. This will enable you to restrain anyone outside of the building from gaining access.

“The Cloud”

h

Many “Smart Devices” utilize servers to interact with services. One example is Ivee, a smart Clock that interfaces with devices such as the nest and smart switches and locks. This device connects to the services of the Nest and other devices through their account. This means that if someone gains access to this one device they have access to all of your devices. This device does not require any Port Forwarding to communicate back home nor any authorization to make any changes. This is why when thinking about a smart device that is based on “The Cloud” you have to get some time to read about how it communicates, and if you are ready to allow this communication to happen. One easy way to monitor your traffic is by getting an old computer and installing a firewall Operating System on it and adding some gigabit NIC cards [Network Card Interface] that will serve as a mediator if you will.

PF Sense Firewall 

pfsense-logo

Pf Sense is an Open Source Operating System that will serve as a Firewall for your home or business network. I should say Small business. I personally use it in my home along with some Switches and a 24 port Cisco Switch that I love. This enables me to add Virtual LAN’s, Set NAT configurations for Gaming and Surveillance Equipment, along with the ability to monitor in and out of my home how traffic of data is being transmitted or distributed. I have some devices that are on one switch that are for when I have guest with its own router. This will allow them to have an internet connection and keeping them where I want them. I can also do traffic shaping and select which items have more priority over others.

In the end its about learning how all of your devices work and not having to cover up that web cam on your “Smart Television” or Laptop. In this day in age we give up a lot of information with all of these Social Networks and then ask ourselves how come this company has all of my information. The “Company” knows you better than you do. With smart devices we choose to give up confidential information, as these know when we are home, what lights are on when and where we were etc..

Lets learn how to handle information more efficiently and to expose what you do not want on the internet. Once its on the NET it will stay on the NET.

Y_U_No_Protect

facebooktwittergoogle_plusredditpinterestlinkedintumblrmail

A Guide to Motion Recording on Security DVRs and NVRs – Pros and Cons

Written By:
Monday, May 4th, 2015

Why do you use motion recording?

There are pros and cons of using motion recording, so this would be a good place to start.  The two reasons that I have heard from people as to why they like recording motion:  1) they don’t have to look through all the footage on their DVR or NVR to find an event.  2) It saves hard drive space.  There is no doubt that it saves hard drive space, but it is not often easier to find video footage.  For example, an outdoor camera can be recording most of the time because of how difficult it can be to mask out moving grass and trees and there are bugs and animals as well.  Any change in pixels is considered motion, so cameras are not smart enough to know when a person is moving through the lens.  With that being said, you will still likely have to look through most of a channel’s footage to find an event.  What I do not like about motion is that the DVR or NVR creates one file for each event, so you will end up with thousands of little files as opposed to one file per hour per channel for the 24/7 full time recording.  Full time recording makes playback a dream too, because you will be able to use a sync function to synchronize cameras since they will possess recordings of the same times.  The purpose of having a DVR or NVR is to protect assets, so it is always best to record full time 24/7 so that nothing is missed.  This is not a pro motion-recording article, but I hope to help the people that are adamant about using that recording method.

The challenges of using motion recording outside

Any change in pixels is considered motion.  The camera does not know what the difference is between a person, a bug, an animal, a shadow, or a moving strand of grass.  This makes it extremely difficult to adjust sensitivity and mask out the things that you do not want recorded.  What has changed in the motion world is that cameras now have such high quality video, that they are even more sensitive to changes in pixels since there are more pixels that can be different.  On the newer blue menu systems, there are 6 sensitivity levels, and the default is 3.  Level 6 is the highest level of sensitivity.  Anti-Dither is the time it takes for motion detect to trigger when motion happens, and the default setting is fine for most uses.

motion1

The most control you will have with motion recording is at the region screen where you can be extremely creative.  For example, you can unselect all colored boxes on your view until you only have one box that is used like a trip wire.  In this scenario, only motion happening in that tiny box will trigger the recording.  This can be useful if you only want to trigger a recording when a door opens or closes, so you can guarantee that a person will be in the video.

motion2

There are also different region colors that you can adjust so that every section of your view can have its own individual sensitivity and threshold setting.  Most people should keep it simple and stick with one setting for the entire view, but there could be scenarios where you need high sensitivity by a fence line, for example, to monitor any activity in that area.  If you need to mask out and adjust sensitivity in your entire view, you can be very creative so that you are not getting recordings of things you do not need.  However, it will require much trial and error to find the best settings.  We find that sensitivity of 50 and threshold of 5 for outdoors is a good general starting point.  The default setting on this screen is generally sensitivity of 80 and threshold of 0, which may work for an indoor camera.  Unfortunately, there is no way to have optimal results without spending the time to adjust these settings.  Every environment is completely different, so get a partner and start testing the settings that will work best for you.

I want to use motion recording inside

Using motion indoors is relatively easy since you need to worry about very little.  There will still be pets, insects, shadows, and other issues that can cause motion.  Even something simple like video noise will be considered motion because there is a change in pixels.  Running that vacuum cleaner in another room can cause the video noise that would be considered motion.  You can use all the same principles that you apply outdoors, but can likely increase the sensitivity and threshold.  You still have the same option of masking out most unwanted space so that only a person would trip the pixels needed to start the motion recording.  For example, a door or a major walkway is a good area to detect human beings.  So be creative, and you can eliminate false positives.

In conclusion

You can likely get motion to act exactly how you want it to with much trial and error by tweaking the settings.  Placing motion in high traffic areas will not reduce your hard drive space since it will likely be recording all of the time.   Also, that scenario will not save you time looking at recorded footage, so full time recording may be a better choice to service that camera.  The point of owning a security camera system is to protect assets, so adding hard drive space to record full time will always be the best option.  Check your DVR or NVR specifications to see how many hard drive SATA ports are available, and what the maximum amount of Terabytes will be.  If  you decide to use motion, you must spend the time to make those adjustments to make sure it will do exactly what you want before you deploy it as a standard in your business or home.

Please note that you need to set all cameras in the Recording section of the DVR or NVR to schedule (Auto), and then set the Schedule section to Motion Recording in order to record motion.  Be sure to also check out my article on Sending Snapshots by E-mail From a DVR When Triggered by Motion Events. 

facebooktwittergoogle_plusredditpinterestlinkedintumblrmail

Security Cameras – An invasion of privacy or necessary evil?

Written By:
Friday, May 1st, 2015

It was 1984 and Rockwell must have seen the future when he flooded the airwaves with his hit “Somebody’s Watching Me”. The paranoid pop rant was catapulted to the top of the charts with Michael Jackson adding his distinct voice to the chorus of a song that spoke of “The Twilight Zone” and “Psycho” as the writer asked “can the people on TV see me or am I just paranoid”.

ROCKWELL

Fast forward 30 years and Somebody Is Watching You! From satellites hovering high above to cameras intruding on almost every aspect of your daily life, you might consider them nothing more than an invasion of your privacy. You question big-brother (AKA The Government) reaching beyond the limits of legal and ethical standards. So, is the proliferation of cameras in our day to day lives a bad thing?

Before you make a decision in respect to the good and bad of it, a little history lesson might be helpful. A glimpse back to what may very well be the first known “security camera” ever used shows that in 1933, a Mr. Norbury in London, England was disturbed to find eggs and chickens missing from his coops. He set up a simple box camera with cords that were connected to the door and the lever on the camera that would cause an image to be captured when the door was opened! To make it even more effective, he fixed a second cord to the door and when it was opened; it made a piece of metal rattle against the tin tub that the eggs were kept in. This caused the intruder to look toward the sound giving the victim a perfect profile of him. Within a matter of days, Frederick William Barnwell struck again and his image was captured, subsequently resulting in a guilty plea and kudos from the judge. Pure genius!

COOP

Think about a security video as a compilation of a bunch of images like the single image of the egg thief. Images have been proving, disproving and leaving us wanting more for over a century. Today, hidden and not so hidden cameras are everywhere. They’re in offices, retail locations, the drive-thru, schools, EVERY Government building, main streets, side streets and even in your home. Maybe you’ve seen red-light cameras that are triggered by a sensor located under the white stop line and before the entrance of the intersection. This sensor becomes active when the traffic light turns red.  NOT yellow, but completely red. There are spy planes, Google-maps, private satellites and the biggest user of security cameras, the Department of Homeland Security!

So, we know that the original intentions were good, but how have security cameras evolved to our present day? What has it come to? Reflections of George Orwell’s 1984 ring true to some in this passage, “There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time. But at any rate, they could plug in your wire whenever they wanted to. You had to live—did live, from habit that became instinct—in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized.”

BOMBERS

Since 9/11, things have changed and many people feel inconvenienced and intruded upon. I think you need to weigh what you have truly given up and how you have been adversely affected. Is it worth one life, or ten, or one-hundred lives that you have to take your shoes off at the airport?  Are you upset because there’s a camera on that downtown street you’re walking down? I’ll bet the college student who was raped by the guy that followed her after she left a restaurant by herself is happy there were cameras that helped identify the rapist! Ray Rice probably wishes he never stepped foot into that elevator with a camera in it but, think about how much conversation and attention was brought to the subject of domestic abuse! Consider the images of Dzhokhar Tsarnaev and Tamerlan Tsarnaev that were captured and tied them to the Boston Marathon bombing and then discuss personal privacy versus public security!

My take on it is this . . . if you’re not doing anything wrong, you shouldn’t be concerned. Until someone shows me definitive proof that Big Brother is watching me doing every day, mundane things, I’m not going to get worked up about that camera in the retail store or the one that sees me walking down that downtown street or driving  down the highway. I will, however, be glad when the cameras at my house keep out that criminal that needs a fix, or feels entitled to what I’ve worked for. If I’m ever in Boca Raton shopping at Town Center and my car is broken into, I’d like to know that they have security cameras that may have caught a glimpse of the &$@(*$ or their license plate. Last but not least, I’ll be glad to know that there are cameras on campus when my daughters go off to college! Face it, it’s not a perfect world and I’d rather be a little inconvenienced and know that while I’m being watched . . . so is the bad guy!

PICKING

If you’re still scared and angry because you feel violated, I’ll tell you not to be. As a matter of fact, I suggest you peruse our website at SecurityCameraKing.com or call us at 1-866-573-8878 and see what we can do to help you feel more secure in your home or business.  And by the way . . . to answer the question “can the people on TV see me or am I just paranoid”. For those of you who have cameras built into your television or laptop, the answer is yes! That’s because the browser on your computer or web enabled TV can be hacked thereby allowing someone to take control of the camera at any time possibly catching you when you least expect it! This doesn’t mean that you should be afraid of cameras and technology. It only means that you need to learn how to protect yourself from unwanted intrusion by making sure that your personal network is protected sufficiently. You know; if your name is Barbara and you were born in 1971, don’t make your network password Barbara71.

Maybe next month we’ll delve into securing your network! Until then . . . act right when you’re in public because chances are . . . you are being watched!

facebooktwittergoogle_plusredditpinterestlinkedintumblrmail

CCTV Systems Networked Together: The Big Picture

Written By:
Thursday, April 30th, 2015

3

You are benefiting from CCTV systems even if you don’t own one yourself. If you are saying “Huh?” to yourself, and asking yourself “How so?” That is a normal reaction and you are in the right place for some answers to this statement that might seem a little off the wall. Please, let me explain. Have you ever seen an episode of Cops, 48 Hours, or any of the other major TV crime shows? If you don’t know what I might be referring to you might want to check these shows out as soon as you can. If you are into crime, investigation, and all of that stuff you are going to appreciate this recommendation greatly! 

So, in these shows there are real life criminal situations that take place, and most of the time where the crime was committed there wasn’t any security cameras. The investigators and law enforcement agents have to look elsewhere for security camera footage to work with to continue the investigation to hopefully solve the crime and get the criminal behind bars! Ok, so back to my original statement of benefiting from a CCTV system even if you do not own one yourself.

2

Consider this scenario. You are at the local pizzeria which, might I add, DOES NOT have a surveillance system in their building. This pizza joint is not in the best area and sits in the middle of a strip mall, with a Jamaican hair braiding shop to one side, and a pool hall to the other. You did not want to visit this area, but it was rated the “Best Pizza in Town”, and you if you are much like me, you will go to extremes for a good pizza pie. So, you are sitting inside the restaurant anxiously waiting for your mushroom pie to arrive, and as you take your last slurp of Coca-Cola, slurping every last drop  annoying every customer in the joint, a guy comes in and holds the cashier at gun point demanding for money as well as pepperoni pizza. He demands the cashier to put the money in a pizza box. She does, and as he is leaving the young cashier asks the gunman if he wants his pepperoni pizza still. He grabs that pizza box, mistakenly leaving the box with the money! Thankfully no one was hurt, and the only thing the gunman got was a pepperoni pizza!

Now it is time to call the police and report a robbery. The police get to the pizza shop and are a little upset that the store owner does not have a surveillance system, but assures the store owner that they will find the suspect. The police have enough knowledge that they can use other businesses and homeowners’ cameras to their benefit. The police go next door to the pool hall, and find out that they have several cameras inside and outside of their building. The store owner gives access to their CCTV system, and soon find out that the criminal was in there playing pool before he decided to rob the pizza joint! The cashier from the pizza shop had a description of the guy so they were able to pin point the suspect. There were many camera angles and the criminal was eventually caught due to the neighboring store for having a CCTV system!  Now, I am not recommending that you do not have CCTV system in your business, but if you currently don’t have one I would get friendly with your neighbors and maybe have them adjust their camera angles to view your business somewhat as well.

Irish Delegation

Imagine if one person on every block in your neighborhood owned a CCTV system. Your town is now protected in a, let’s say, “CCTV NETWORK”, meaning that all of the cameras in the town are working as one. And, as I stated before, you do not even have to own one of these systems to benefit from this network. The community is now able to work as one and help the police and society in general to protect, and serve.  Again, I am not endorsing not owning a CCTV system, but what I am saying is that with or without, you can benefit even without knowledge! You don’t truly know how amazing this idea of having a “Networked” Town is until you have first-hand experience of being a victim of a crime, or accident etc. Ask around, and you will be assured that someone on your block has a camera that was recording when the event took place. Now, there is a downside to this. Not a big one, but you might not get the picture quality, the frames per second, and clear picture. BUT, you will have something which is way better then nothing!

Now, lets look at this idea on a bigger scale. Instead of a Town, lets look at a whole City. Now the whole entire city is linked together with home owners who have a CCTV system in their home.  Owning a CCTV system is helping out the community as well as society at large. For example, if you own a CCTV system, and lets say you register your home into a national data base that says your home is under surveillance, the police and other forms of law enforcement could contact you to view your recordings. The benefit of this you ask? Solving crimes faster, getting criminals off the street, viewing accidents for insurance fraud, etc. There are so many benefits to having a “CCTV Network”.  I personally think there should be some kind of incentive for the mass population to purchase CCTV systems as it can possibly link the whole world together for a greater cause.

How awesome would it be if this became a reality where there would be a national data base of CCTV systems hooked up for a greater cause? Where forms of law enforcement could access their system when needed, with their consent of course, for a greater good? Like I stated in the beginning, we benefit without even knowing, or even owning a system ourselves!

facebooktwittergoogle_plusredditpinterestlinkedintumblrmail