Archive for the ‘ Knowledgebase ’ Category



A Guide for License plate cameras

Written By:
Tuesday, November 10th, 2015

License plate cameras, why do we need them!? Well…..self-explanatory, to record license plates. Since a vehicle tag is a very valuable piece of information in any criminal investigation, it is understandable why private and commercial customers would want to implement a device that records it as part of their security system. Now, some of you will say “Why can’t I just use a regular high resolution camera. It can obviously record a vehicle tag from a distance?!” Well…. it’s not that simple! The license plate cameras have certain unique features that classify them as license plate cameras.

_3503006

Before I go into those unique features, a quick class in basic videography is needed.

The key of any video scene is the light that affects any video footage that we are recording.  Before the camera records a certain scene, there is an automatic process that is done by the cameras internal mechanism. The sensor calculates the existing conditions like the colors, amount of light, differences between highlights and shadows at the scenery and configures the camera’s shutter and iris to an average configuration that was programmed by the manufacturer. The shutter and the iris both are responsible for the amount of light that enters the camera by controlling its speed and opening. The faster the shutter works, the less light is caught by the sensor. The larger iris opening will let more light in. By default, this process is automated by a camera’s processor.

wpid-leaf-shutter-lens-images-04-2013-01-9-00-55

Going back to our case…… maybe this average setup is good for general video recording but it is not good enough if we need to record something very specific like a vehicle’s license plate. Besides that, there is another problem. We know that an average CCTV camera has IR illuminators that turn on as soon as it becomes dark at the scene and the camera switches to infra-red mode so the IRs can illuminate the dark scene. That does not help us since the license plate that we want to catch is reflective as required by law and the light reflects back into the camera and distorts the video/image.

close-full

So we need an ability to record the tag in any light conditions, day or night. That’s where the specialized license plate cameras come in. These cameras have  options that are designed to help solve issues that were mentioned earlier. The controls can be manipulated by the user manually and to the point that is desired by the user and to his needs. A good license plate camera will have all or some of these options:

  1. Manual shutter
  2. Manual iris
  3. Option to turn off the cameras IR mode
  4. Varifocal lens
  5. Manual focus

You’re wondering why we need those manual adjustments and how can we use them? We are going to use those manual adjustments to record the piece of information that is important for us, the vehicle tag. In the beginning, there’s a very important part of the installation and that’s the positioning of the camera. It is obvious that the installer needs to install the camera in a way that the vehicle’s license plate will be visible at a certain point by that camera or pass through the scene that the camera is viewing. This will be done by using proper focus, varifocal lens and axis movements that the camera has. In the second phase of the installation, we need to make sure that we configure the camera in a way that it will record the tag by using manual adjustments like shutter, iris or both.

gv_lpc_daynight

Security Camera King currently sells 2 different models of license plate cameras. These cameras have the abilities that were described earlier in this article and can be used successfully to record vehicle tags. The second part of this article will guide you through how to set up these cameras as license plate cameras.

CVIOB-TP2IR550B

This camera is from our TP series of cameras and it is a CVI camera. This camera is a long range, varifocal, weatherproof camera that can work as a license plate camera. It has all the necessary features that will make it a license plate camera and here are the adjustments that need to be made.

Start working with the camera by viewing the camera full screen on your DVR. Click the right mouse to bring up a menu and choose ‘PTZ’. Click again on the small arrow that is located on the right side of this menu and another menu will open. Click on the camera icon in the upper right corner and this will bring up the OSD menu.

20151015_092225_HDR

Use the arrows on the menu to go to ‘Exposure’ and click ‘Enter’ to choose it. In the ‘Exposure’ menu choose ‘Shutter’ and the next menu will allow you to manually adjust the shutter. There are no exact settings that the shutter will need to be set at. It’s all trial and error so you will need to play with it so you can find the right adjustment.

20151015_092355_HDR 20151015_092505_HDR

Go back to the ‘Main Menu’ and choose ‘Day & Night’. Click on the right arrow of the menu to change it to ‘Color’.

20151015_092720_HDR

The last adjustment should be the intensity of your IR illuminators. On the bottom part of the camera there is a cover that covers the knob that controls that adjustment. Turn the knob to the minimum so the IR illuminators will not interfere with the license plate light.

IPOB-TP2MP250L660-W

This camera is also from our TP series and it is an IP camera. Similar to the previous camera, this camera is also a long range, varifocal, weatherproof camera that can work as a license plate camera.

You will need to log into the web-interface of the IP camera to setup the necessary adjustments. Once there you will find ‘Video Settings’ on the Main Menu and click it. Choose ‘Video Parameters” and then go to tab “Advanced”. Change the ‘Exposure Time’ to a higher value to close the shutter on the camera. Again, this will be a trial and error method. You need to try so you can find the right adjustment.

Capture24524

Choose the ‘IR’ tab and change the ‘IR mode’ to ‘Time Detection’. Then change the time to 0:0:0 a day to 23:59:59 a night. The ‘IR’ should be changed to ‘Low Level’ and you are all done.

Capturedfgbhxdfgh

Remember, a license plate camera by itself is not sufficient. As a license plate capture solution it would be wise to pair it up with more cameras that would have an overall view of the general scene.

Facebooktwittergoogle_plusredditpinterestlinkedintumblrmail

NAT and Port Forwarding Part 2

Written By:
Wednesday, October 28th, 2015

How do I know if I have Double NAT or Triple NAT?

In my last article we talked about NAT and what it does, and Port Forwarding and what that is. This article is the second in that series.
It should be easy enough to get your DVR/NVR up and accessible on the LAN (Local Area Network) by inputting a valid LAN address in the DVR/NVR setup. Now the question is – how do we make it accessible from off site. I mentioned in the previous article – while we were in the router, we should check for it’s ‘External IP Address’ to see what is showing there. This is usually in the ‘Status’ section or ‘WAN’ setup. Now you will need to know what you found there. The WAN or Internet status will tell us a couple of things.

1. Is it a static or dynamic address? If you see something like ‘DHCP’ / ‘Obtain Automatically’ / or you just can’t find an address anywhere, then most likely the address is dynamic. For Port Forwarding purposes, we don’t want anything to be dynamic unless it absolutely has to be. In a dynamic address scenario, your IP address can change, and then your Port Forwarding is broken. If your router shows ‘DHCP’ or ‘Obtain Address Automatically’ it may not show the address it has. This then, becomes a little tricky to figure out.

A good way to test for Double/Triple NAT, if you are comfortable working in the DOS Command prompt – run a ‘tracert’ command. (Trace Route) Trace route shows every node , or device that you pass through on your way to a certain web site. (Try it on your favorite web site sometime – you might be amazed at how far your signal travels to get to a site that is physically hosted only a few miles away) The first ‘hops’ it shows may reveal Internal Addresses replying. This is a clear indication of how many routers you are passing through on your way to the Internet. To run a trace route command – open the Command prompt and type “tracert www.yahoo.com” without the quotes, and be sure to leave a space between tracert and the www (you can use any site you want, I just always use Yahoo or Google). To open a command prompt – Press and hold the Windows ‘Flying Flag’ key between Ctrl and Alt on your keyboard – this will pop up a ‘Run’ dialog. Type “cmd” (without quotes) and click Enter. This will open your Command Prompt. Then just type in “tracert www.yahoo.com” (without quotes) Make sure to leave a space after ‘tracert’. That will return a series of IP Addresses similar to this =

tracert

As you can see, the first hop shows 192.168.2.1 (Class C Internal Address) The second hop shows an address of 96.88.74.138 (NOT an Internal Address) and it also shows Comcast information as well, confirming that it is an External Address. This shows me that I have only one router in line before I get to the Internet, so only single NAT on my system. If you see two or three hops showing an Internal Address, then you have Double or Triple NAT or Quadruple NAT or…? The point being, if you see more than one Internal Address, your task just became a little more difficult.

Another method, if you can do it without taking the customers business offline, unplug the Cat-5 cable coming in to the ‘WAN’ or ‘Internet’ port on your router, and plug directly in to your PC. Restart your PC, then run an ‘ipconfig /all’ command from a DOS prompt and check the IP Address you find there. (Try to connect to the Internet with a browser to verify you are getting a valid address when you test this way.) Hopefully you will see an ‘Internet Address’, then you know there is nothing else in line to worry about. If, however you see an ‘Internal Address’ Make a quick note of the IP Address, Subnet Mask, Gateway, and DNS Servers you see there – we can use them in the router you are connected to. As soon as you have the information you need, pull that cable and disconnect from the Internet. (It is risky to connect directly to the Internet so keep your test as brief as possible)

2. If you see the IP address is set to ‘Static’ in your router, you WILL be seeing an IP address. Check to see if that IP address is a ‘Private Range’ address =
Class A = 10.0.0.0 through 10.255.255.255
Class B = 172.16.0.0 through 172.31.255.255
Class C = 192.168.0.0 through 192.168.255.255
When you see this on your WAN status (or WAN Address or Internet Address) –There is another device in line between you and the Internet that is performing NAT and you will have to Port Forward that device to the device you are looking at. To accomplish this you will need to set the router to a ‘Static’ address. The quick and dirty way is to take the IP address , Subnet mask, and Gateway that you discovered in the test above (connecting the routers’ WAN cable directly to your PC) and use them in the router you are working on. For DNS servers, use the ‘Gateway IP address’ or whatever you saw in the ipconfig test. (If you ran ‘ipconfig /all’ you will see DNS servers listed)
It is important to know that a modem with only a single LAN connection can also be a router. Even if it has only one port to connect to, it can be performing NAT and you’ll need to Port Forward it as well. (This is not usually the case on a cable connection – cable modems are generally set to ‘Bridge Mode’ so they are transparent on the network) This is where the ‘Status’ page of a router helps, if its WAN address is a private IP address, then your modem is also a router and it is supplying that address. Or , even more common, you will find another router in line between you and the Internet.

The easiest test here is to look for the ‘Gateway’ address showing on the WAN status. The gateway you see there will be the next router in line. Put in that address and see if you get a logon prompt. If you see another router, log into it and then run the same tests to see if it is directly connected to the Internet or not. Keep going until you no longer see private addresses on the router’s WAN connection. Start making a diagram of what you find and the different ranges of IP addresses you see on each one. You will need this information to map out your port forwarding. If you find only one router, you are golden – port forward it and call it done. If you find two or three routers in line – you are going to have to port forward every one of them.

Ports are forwarded directionally from the Internet toward your device.
The important thing to remember in Port Forwarding is that you must forward in ‘Daisy Chain’ fashion through all devices in your path.
Port Forward your ports from the modem to your first router – from your first  router to the next router – and so on until you get to the router where your device is connected. That last router will then be forwarded to your device.
**The most common mistake in port forwarding is to try to forward the first device in line directly to the camera or DVR IP Address instead of porting through the chain of devices.

Double NAT or Triple NAT can be tedious to set up because it takes extra time and you need to be sure of the connection sequence of your devices, and in some cases, you may find the customers network is not set up correctly. In my next article I will show you what to look for and how to fix it, as well as a detailed example of how to ‘Port Forward’ through a series of routers.
Happy Networking!

Previous Article in this series NAT and Port Forwarding Part 1

Facebooktwittergoogle_plusredditpinterestlinkedintumblrmail

NAT and Port Forwarding

Written By:
Tuesday, October 13th, 2015

NAT and Port Forwarding
What is NAT and what does it do?
NAT is Network Address Translation. There are different types of NAT, but we’ll stick to the easy non-technical explanation of ‘Many to One’ NAT.
Your router is a Gateway, or ‘door’ to the Internet. There are two sides to the router, the External (WAN) side and the Internal (LAN) side.
Your computer should be connected on the inside (LAN) with an Internal or private address.
Your computer will only communicate with IP addresses that are on your same subnet. (Address range)
Everything on the outside of the router uses different IP addresses and Subnets – the router allows you to communicate with other devices in other subnets.
OK, so what does all of that mean?
Your computer can not communicate with another computer that does not have an address in the same ‘subnet’.
The router ‘translates’ different subnets for you, allowing you to communicate outside of your subnet.

NAT serves three main purposes =
1. Provides a type of firewall by hiding internal IP addresses.
Even though your computer shows an address of 192.168.1.115 – when you browse the Internet – your address shows as something entirely different to any Internet computer.
Your routers’ External address is what shows up. This is also called ‘IP Masquerading’. This helps keep your computer ‘anonymous’ on the Internet.

2. Enables a company to use more internal IP addresses.
Since they’re used internally only, there’s no possibility of conflict with IP addresses used by other companies and organizations.
A company using a hundred computers or more only needs 1 Internet address. Internal address ranges are hidden from the public and are not part of the Internet address scheme.
This is where the term ‘Many to One’ comes from. Since the router is the only connection to the Internet, it’s address is the only one visible to the Internet. 100 or more computers using that router show up as 1 single address to the Internet (Many addresses to One address)

3. Allows a company to safely set up a device on the Internal Network for access from the Internet.
Using ‘Port Forwarding’ allows a company to set up Internet access to a device on the LAN. The porting guides the incoming signal to the correct device. The benefit of this is the Internet user sees only your ‘Public IP Address’ (your modem or router) and can not see your ‘Internal IP Address’ so they have no direct access to the device other than through the software they are using to access it. (IP Masquerading again)
So, in a nutshell – NAT allows you to ‘see’ other IP Subnets while keeping you anonymous to those other networks.
Now you have a very basic understanding of what NAT is and does, and hopefully, you already know how to set an IP Address on your LAN so your device can communicate.
So how do you set it up to be accessed from the Internet? This is where ‘Port Forwarding’ comes into our picture.
When you are accessing your device from a remote location, in 99% of all instances, you will actually be accessing the router or modem. The router then guides your incoming signal to the correct device on your LAN. The only exception to this rule will be when your device is set with an Internet IP Address and exposed directly to the Internet. This is always risky – and this is why Internet Security companies make the big bucks. Putting a Windows based computer directly on the Internet with no protection is an open invitation to bad things happening, and bad things WILL happen within a very short time. We tested a PC connected to the Internet with an External address – in 45 SECONDS we had been infected with SQL Slammer virus. (This PC was running Microsoft SQL with listening ports set to defaults) So protecting your computer from the Internet is important, to say the least. This is why you need a router to ‘mask’ your computer and hide it.

So, how does your remote query to 74.93.230.34 end up connecting you to a device with an address of 192.168.1.120? The answer is ‘Port Forwarding’. My favorite analogy to describe a router is to think of it as a Hotel. The Hotel has a ‘Street Address’ – the same as your routers ‘Internet Address’ The rooms in the Hotel all have different numbers – the same as computers on your LAN.
When you send mail to the Hotel, you send it to the ‘Street Address’ of the Hotel. If you don’t have a room number or customer name – the Hotel does not know where to send that incoming mail. You can’t add an Internal IP Address (room number) to an Internet query, so you’ll need some other kind of information for the router to direct your incoming signal. Ports provide that extra information for your router.
Setting up Port Forwarding is pretty easy when you have all the necessary information.
You will need the IP address of the Router to access it for programming.
You will need the IP address of the device you are forwarding to.
You will need the port numbers required by the software.
The hard part is figuring out where to go on the router to get it set up. You will find that different models of routers sometimes use completely different terminology for the same thing. To set up port forwarding on your router, look for ‘Advanced Configuration’, ‘DHCP’, ‘NAT’, ‘Applications and Gaming’, ‘Virtual Servers’ or ‘Pinholes’ depending on the router model and manufacturer.
Sometimes they actually call it ‘Port Forwarding’, but you’ll usually find it hidden in one of those other sections.

On a Linksys router – look under ‘Applications and Gaming’
LinksysAppsGaming

Here you can see the information requested –
Application = call it what ever you want, but use something descriptive in case you have to come back for a service call a year later.
Start = The starting port or lowest number port in a range.
End = The ending port or highest number port in a range.
(If you are only forwarding two ports, 80 and 37777 for instance, then create two entries instead of a range – Start Port = 80 / End Port = 80 for the first one and Start Port = 37777 / End port = 37777 for the second one. Avoid using a range when the port numbers are so far apart. In this case entering a range of Start Port = 80 / End Port = 37777 would work, BUT you would be opening over 37000 ports. That is a security breach just waiting to happen.
IP Address = the Internal IP address of your device.
Enabled = Turn it on !
Save = Always look around for a ‘Save’ or ‘Apply’ button – if you forget or miss it – the router may ‘dump’ all your hard work and you’ll have to do it all again..
While you are logged in to the router, try to find the WAN status or Internet Address. This will tell you if you are connected directly to the Internet or if you are routing through another device, such as another router or a modem that is also routing. (A modem with only one network port can still be a router, handing out a private address range.)
If you see an address there that falls into the “Private” range of addresses, then there is another device between your router and the Internet performing NAT and you’ll need to Port Forward that device as well. When you have more than one router to pass through before you get to the Internet, then you also have a situation called Double NAT or Triple NAT, where each router is translating for it’s unique subnet. When you have a double or triple NAT situation, then you also have to do double or triple port forwarding to route your incoming signal back to your device.
In my next article, I will show you how to discover Double NAT and Triple NAT situations, and how to map your way through them to establish Port Forwarding. Happy Networking!

Check out the 2nd Article in the Series NAT and Port Forwarding Part 2

 

Facebooktwittergoogle_plusredditpinterestlinkedintumblrmail

Civilian Gun Ownership Statistics in the United States

Written By:
Thursday, August 1st, 2013

Civilian Gun Ownership Statistics in the United StatesCivilian Gun Ownership Statistics in the United States

Many people wonder about the flow of guns in the United States when compared with other industrialized countries. In the United States, there are two pillars of gun control: registration of weapons and licensing for gun owners. The US is basically the only country throughout the developed world that doesn’t license owners throughout the board. Since it is just about the only one, it can be difficult to compare the US with other countries because those same rules and regulations simply do not exist elsewhere. Canada and New Zealand are two other countries that don’t register guns across the board. They tend to register semi-automatics and handguns, but not shotguns and rifles.

Out of all the countries in the world, only the United States and Yemen consider owning a firearm a basic right for civilians. Yemen has recently begun clamping down on civilians owning guns. In the US, some people equate registering a gun equal to that of the government overreaching their boundaries. Governments are able to use licensing lists and registration to head out and make sure no one is resisting their views. Another downfall to registration is the fact that it focuses on those who follow the law and are not the problem. The ones who are continually breaking the law and causing problems are the ones who are not going to register their gun to begin with.

Beyond lax regulations for gun registration, the United States stands out in the crowd because of the number of guns found in the country. Estimates indicate there are 270 million civilians who own a gun, which equals 88.9 firearms for every 100 people. India ranks second in terms of the number of handguns they have with 46 million in the hands of civilians. That equals out to be four firearms for every 100 individuals.

When you consider that the United States has roughly 4.5 percent of the population throughout the entire world, it contains around 40 percent of the firearms for civilians throughout the entire Earth. It is not that the United States is a violent society by any means, but rather one that practices emergency medicine and performs research about the prevention and underlying nature related to gun violence. In the United States, the rate or violence is similar to Canada, Australia and Western Europe. The United States tends to stand out amongst all of the other countries because of its homicide rates.

They consider the homicide directly related to the presence of guns. Even though it is not clear that guns are responsible for causing acts of violence, they can clearly change the outcome along the way. There are other countries that have homicide rates close to that of the US or worse, but they are not a model for public safety by any means. In the United States, there were 10,300 homicides from firearms back in 2009, while Mexico had 8,804 and Columbia had 12,808 during the same years.

When you take into account the population in the countries, the United States rate of deaths by firearms was 10.2 for every 10,000 people. Firearm deaths can include anything from an accident, suicide or homicide. Finland was the next closest developed country with a rate of 4.47 for every 100,000 individuals, which is less than half of what the rate is here in the United States. Canada only had 2.5 deaths for every 100,000 people and the United Kingdom was even less with only 0.25 per every 100,000 individuals.

Even though everyone talks about violence associated with guns, it is the violence itself that is the problem and not the guns. People have killed each other since the times of Cain and Abel and they are not going to stop anytime soon. Bad guys that are looking to kill will not have a problem finding a gun. When it comes to violent offenders, the restrictions for purchasing guns could be more difficult than what they are currently.

When you think about the massacre in Connecticut and the revival throughout the United States about the debate on guns, the entire conversation has been dominated by those who want to take things to the extreme. The rest of the country ends up falling through the cracks and stuck in the middle somewhere. In terms of the general population, gun owners and others included are supportive about stricter background checks for those who are looking to purchase a firearm.

If the government were to expand upon the reasons why people were not allowed to purchase guns, that may help reduce the amount of gun violence within a couple years. For example, looking at the individual’s history of violence or alcohol abuse can prove to be an insight into what the future holds in store for them. Taking the time to think about our relationship with firearms may prove beneficial to the entire country. It is important that we start doing things that are going to work and stop putting off making the necessary changes to help everyone feel safe.

Consider Some of the Following Statistics About Firearms

  •  Every year, guns are used 80 times more to help protect a life than they are to take a life. People are using a firearm as a means of defending themselves against someone who means to do them harm, which is why so many people are able to escape harm and potential death from a  criminal.
  • In the United States, there are approximately 270 million civilians who own a firearm throughout the entire country. When you consider the tremendous amount of people that live here, the number of guns is prevalent than one might think.
  • Women tend to be the victims of sexual abuse more times than not, which is where a gun can come into play and help protect them from becoming another victim on the notch of society’s belt. Every year, 200,000 women use a firearm to help defend themselves against a sexual predator and escape unharmed.
  • When felons were asked about whether they would approach someone who had a gun, three out of five said they will not approach the situation. Having a gun may be the difference between becoming a victim or winding up beaten, raped or killed. You never know what is going through the head of the criminal, so it is always best to err on the side of caution and protect yourself at all costs.

Recent studies published stated that there is a negative correlation between the amount of violent crimes and the amount of people who own guns in the country. More guns tends to equal less crimes. When people are worried about whether they are going to have a gun pulled on them, they tend to err on the side of caution. Nations that have a stricter law on gun control will end up with a larger rate of murders than those who don’t. Out of the nine European countries that have the least amount of people with guns they have a combined murder rate that is three times higher than the nine European countries with the highest number of people owning guns. The more people that own a gun, the safer the place is going to be. Why do all of the countries keep imposing such extreme sanctions and regulations on people being able to own a gun?

Comparing the United Kingdom with the United States

In the United Kingdom, it is illegal to own a handgun. Since the civilians are not allowed to own guns, why is it that there are 2,034 violent crimes for every 100,000 people? In the United States, there are only 466 violent crimes for the same amount of people. As you can see, owning a gun is not the cause of the problem with all of these violent crimes that take place every year.

Back in 1997, the Labor Party banned handguns from the United Kingdom. At that time, the number of violent attacks skyrocketed by 77 percent to 1.2 million. Every minute two people were the victim of a violent attack. Even though guns may not be allowed, that doesn’t stop people from taking matters into their own hands and going after those that they have an issue with. In the United Kingdom, kitchen knives are being used as a weapon of choice in about half of all stabbings. Doctors have sought to get a ban on all of the long pointed kitchen knives, but criminals are only going to figure out something else to use as their weapon of choice.

In the end, it is not the gun that is the problem in all of these different countries, but rather the violence that brings it all into play. If we can figure out a way of eliminating violence from people, the world will prove to be far better than what it has been for the past few decades.

Facebooktwittergoogle_plusredditpinterestlinkedintumblrmail

Secure Your Perimeter

Written By:
Friday, July 12th, 2013

Secure your perimeter

There are many different ways to achieve perimeter security at your location.  A person must first determine what level of protection is needed. I will be describing a setup used by many business and home owners.  The equipment used will be; security cameras, a dvr, IR illuminators, flashing lights, sirens, access control system, email, sms/text messaging, cell phone, and modem/router, push notification mobile app, guard dogs, remote controlled door for dog kennel, and chain link fence.  This setup is based off the idea you the owner want to be notified that you have a perimeter breach.  I know some items on the list are not too orthodox, but with proper configuration can be used to devastating effect while protecting your valuables.

First the perimeter itself needs to be fenced in. The chain link fence should have a continuous run around the property. Gates should be limited to only two. It is preferably that there is only one entrance to minimize a vehicle from gaining access to the property.

front yard area

In the previous illustration I have two types of fence the front is see through or standard chain link fence. The other is a privacy fence to stop people from seeing into the property.  The fence has two purposes the first is to stop intrusions the second is to create controlled access points.  If we can control where people are going to enter the property we can take steps to ensure that only individuals with authorization are on the property.

The next step is putting the access control system in place. There are many types but for this article I will describe key card access.  Card Access systems are a convenient, versatile, secure and reliable solution to access management and people management.  This system allows access with the use of RFID or radio frequency identification.  At the gate or door there will be a sensor connected to the access control monitor. The person places their card to the sensor and reads the frequency. The system validates users’ card then unlocks the door.  Miniaturization has come a long ways, so it is possible to get fobs instead that are the size of a coin and one eighth inch thick to put on your key ring. Access controls system should be installed on every single door on the premises. Individuals should only be given access to areas that they need to be in. People should not be given access to areas that they do not need to be in to perform their functions.  Should a key card be lost this will limit a possible breach to certain areas instead of the whole complex.

Now let’s add another layer of protection with cameras. On the outside perimeter we need to install cameras. In each corner you will need four cameras for a total of sixteen. These cameras are going to be poll mounted inside the fence line. The poll needs to be at least 8 feet taller than the fence to give a clear field of view, and stopping the corners from turning into blind spots by mounting the cameras on the corners of the fence itself.

camera 1 & 2

Pan tilt zoom cameras will be needed to track movement. Referring back to the first illustration PTZ cameras should be mounted on the peaks of the building. These cameras should have a tour configured to scan the yards. Another feature that pan tilt zoom cameras have that work in conjunction with a regular camera is once the perimeter camera sees motion the PTZ camera can move to a preset location to bring the PTZ into view of the non-ptz camera. Auto tracking will then pick up the target and follow until out of view.   Another feature of the PTZ camera is that it can be set up to move to a preset when an alarm is triggered.  A door, window, or almost any sensor can have an alarm circuit on it. The circuit is either normally closed or normally open depending on the device. When a door opens the sensor transmits the signal to the camera. Then the camera moves to the preset associated with the alarm.  Used in conjunction with access control system you can avoid having another camera to monitor people entering through a door.

camera 3

Infrared illumination is important. Infrared is what lets cameras see in the dark. IR illuminators will need to be installed around the property this will make sure the cameras see everything. Illuminators come in varying shapes. They can look like bullet camera or flood lights.

camera 4

These Illuminators need to be everywhere you have cameras installed.  On the building inside the perimeter the infrared lights should be mounted. For ease of installation they should be mounted underneath the cameras so you can pull all the cable at one time to the mounting location for both camera and illuminator. Since the infrared lights do not need to be on during the day they can be put on timers to come on before dark. The reason to have them come on before dark is to not miss anything during transition from dusk to dark.

We now have the fence up and cameras installed. Also proper illumination now guarantees good picture quality. Surveillance of the entire complex has now been achieved. Still we need extra configuration on the digital video recording unit to secure the perimeter. I will assume that an internet connection and network configuration is already taken care of.   The DVR needs to be configured to be able to send snapshots through email.  Another very new feature that is still in development is text messaging to cell phones.  This way the DVR can notify personal there has been a breach.  Flashing lights and sirens can be triggered to go off through a push of a button on a smart phone app. This will let intruders know that we aware and initializing intruder protocols. Should the intruders linger on the property this is where the guard dogs earn their keep.  Access control is a versatile technology. There is no door made that cannot be integrated with the technology. Integrating the access control with the kennel doors the dogs can be let out remotely or triggered by an alarm event from the DVR.  Set up multiple sirens in different zones so they can be triggered individually. Once the hounds are loose they will go to the area of the noise to investigate.

security dogs

Depending on the guard dogs used is how fast your intruders will be exiting the property. A good pair of German shepherds or Rottweiler’s will ensure the desired effect when the lights and sirens fail to provoke a response from the intruders.

Technology with proper application can be used to the reduce manpower overhead. In this application we have now managed to secure a perimeter using zero man power.  We have now saved thousands if not tens of thousands of dollars by automation and eliminating human errors.

Facebooktwittergoogle_plusredditpinterestlinkedintumblrmail