Posts Tagged ‘ surveillance’



Marijuana Cultivation and Camera Systems

Written By:
Friday, January 24th, 2014

marijuana cultivation

You are probably asking yourself, how do these go together?  The reason being is that most people hear of someone growing marijuana and they think illegal drug dealer, not profitable business.  For the last several decades you were right, but times have changed and so has the industry.  In recent years there has been some dramatic changes in the perception and regulation of marijuana, whether it be for medical marijuana or recreational use marijuana.  In recent years more and more citizens have voted to allow for the use of marijuana in different ways.  As the laws have changed so has the regulations for this industry.

 

One state in recent months that has legalized the recreational use of marijuana has been the state of Washington.  With the legalization of use, also came the legalization of cultivation.  With the cultivation lawmakers have put in place a series of requirements that growers and sellers have to follow in order to be in compliance with state laws.  The following information comes from Washington State Liquor Control Board.

 

(2) Alarm systems. At a minimum, each licensed premises must have a security alarm system on all perimeter entry points and perimeter windows. Motion detectors, pressure switches, duress, panic, and hold-up alarms may also be utilized.

(3) Surveillance system. At a minimum, a complete video surveillance with minimum camera resolution of 640×470 pixel and must be internet protocol (IP) compatible and recording system for controlled areas within the licensed premises and entire perimeter fencing and gates enclosing an outdoor grow operation, to ensure control of the area. The requirements include image acquisition, video recording, management and monitoring hardware and support systems. All recorded images must clearly and accurately display the time and date. Time is to be measured in accordance with the U.S. National Institute Standards and Technology standards.

(a) All controlled access areas, security rooms/areas and all points of ingress/egress to limited access areas, all points of ingress/egress to the exterior of the licensed premises, and all point-of-sale (POS) areas must have fixed camera coverage capable of identifying activity occurring within a minimum of twenty feet of all entry and exit points.

(b) Camera placement shall allow for the clear and certain identification of any individual on the licensed premises.

(c) All entrances and exits to the facility shall be recorded from both indoor and outdoor vantage points, and capable of clearly identifying any activities occurring within the facility or within the grow rooms in low light conditions. The surveillance system storage device must be secured on-site in a lock box, cabinet, closet, or secured in another manner to protect from employee tampering or criminal theft.

(d) All perimeter fencing and gates enclosing an outdoor grow operation must have full video surveillance capable of clearly identifying any activities occurring within twenty feet of the exterior of the perimeter. Any gate or other entry point that is part of the enclosure for an outdoor growing operation must have fixed camera coverage capable of identifying activity occurring within a minimum of twenty feet of the exterior, twenty-four hours a day. A motion detection lighting system may be employed to illuminate the gate area in low light conditions.

(e) Areas where marijuana is grown, cured or manufactured including destroying waste, shall have a camera placement in the room facing the primary entry door, and in adequate fixed positions, at a height which will provide a clear, unobstructed view of the regular activity without a sight blockage from lighting hoods, fixtures, or other equipment, allowing for the clear and certain identification of persons and activities at all times.

(f) All marijuana or marijuana-infused products that are intended to be removed or transported from marijuana producer to marijuana processor and/or marijuana processor to marijuana retailer shall be staged in an area known as the “quarantine” location for a minimum of twenty-four hours. Transport manifest with product information and weights must be affixed to the product. At no time during the quarantine period can the product be handled or moved under any circumstances and is subject to auditing by the liquor control board or designees.

(g) All camera recordings must be continuously recorded twenty-four hours a day. All surveillance recordings must be kept for a minimum of forty-five days on the licensee’s recording device. All videos are subject to inspection by any liquor control board employee or law enforcement officer, and must be copied and provided to the board or law enforcement officer upon request.

 

Alright, now that you see the law lets talk about the systems that will meet these requirements to keep your location in compliance.  Based on the bare minimum requirements, any of Techpro Security DVRs or NVRs will work.  To meet the absolute requirement of 640×470 pixels will put you into any DVR that can record in D1 resolution (704×480).  Since there are no required minimum frames per second stated, you can get away with a Techpro Security Mini Economy DVR .  This unit will record D1 resolution and 7fps (frames per second) on all channels.  It is also accessible for remote viewing, which makes it meet the requirement of IP internet protocol of the recorder.  Based on the 45 days that is being required to be stored and recording 16 cameras at D1 resolution and 7fps, you will need a minimum of a 3TB hard drive.  You can calculate a rough idea of the amount of hard drive space you will need with Security Camera King’s Hard Drive Calculator.  If it was my operation, I would want to have more than the “bare requirements”.   I would do a Techpro Security Ultimate Series DVR ,  the problem with only using the mini is that to record 16 cameras at D1 resolution and 30fps you will need 10TB of hard drive space, and the mini unit will only hold up to 6TBs of hard drive.  I would step up to the Ultimate Full Size, with this unit you can put in up to 8 hard drives or a total of 24TBs of space.  You will also want to upgrade the cameras from a basic OD-CM600IR50-B camera to a minimum of the OD-LX700IR50-W.  Although the basic camera meets the requirements of the law, I am not a “bare requirements” type of person.   Based on the fact that marijuana plants are very sensitive to light, I would shy away from using any camera with greater than a 50 IR distance in any area where growing occurs.  Otherwise you could turn your plants unusable from too much stress.

 

Now if this was my business and my livelihood, I would go all out to protect my investment.   I would use a Techpro Security NVR and Techpro Security IP Cameras.  The reason I would go this route is that the resolution on these cameras are at a minimum of 720p and go up to 1080p.  I don’t know about you, but I want to know exactly what is going on with my investment and know if anything ever happened I would be able to catch the perpetrators.   If I was looking for a system already put together for me I would go with Security Camera Kings pre-built Complete 16 Camera Elite Series NVR Security Camera Surveillance System.  With this configuration you will need to have at least 15TB of hard drive space to stay in compliance.  I would personally put in 18TB to slightly exceed the minimum, because the last thing that I would want to have happen is be even a couple hours short of the 45 day requirement.   Now if I was trying to be a little more conservative on my spending, the next system I would go with would be an analog system with more cameras to give me over coverage, an example would be the COMPLETE 32 CHANNEL DVR ULTIMATE SECURITY CAMERA PACKAGE.  I would at a minimum upgrade the cameras to the OD-LX700IR50-W and add at least 19TB of HDD space.  Now if a pre-built package won’t work for you, there is a really cool option of creating a Custom Built Package, which offers the same discounted products but you can customize the equipment to meet your exact needs.

 

No matter what way you go, you can’t go wrong with a system from Security Camera King, even the base records will meet the requirements of the State of Washington Liquor Control Boards requirements.  The only thing you will want to make sure of is that whatever recorder you go with can hold enough hard drive space, so make sure to use the CCTV Hard Drive Calculator.  The last thing you want to do is fall short on this one requirement and either get fined or worse lose your license.  It has been way too long of a wait to be able to grow and cultivate marijuana.

facebooktwittergoogle_plusredditpinterestlinkedintumblrmail

How to Capture License Plates with Security Cameras

Written By:
Tuesday, November 12th, 2013
Capturing License Plates With CCTV Surveillance Cameras

Using a surveillance camera to capture video footage of the license plates of vehicles that are entering and leaving an area has proven to be an effective way to have a record of the traffic at the location. Law enforcement agencies across this country are making use of this technique more and more commonly. It has already helped them to gather information that has helped them follow vehicles thought to be driven by individuals that were suspected of crimes, even when the officer is nowhere near the vehicle. The data that these cameras provide can be invaluable if a crime takes place, allowing someone to review footage and know who was in the area with certainty. The data collected about these license plates can be more helpful to law enforcement officials when trying to identify a suspect then the highest quality images of a suspect’s face. The installation of security cameras for this function may seem deceptively simple but if it isn’t done correctly you will not get the video that you need. This article will provide with the information that will you to accurately record video footage of license plates every time.

The first consideration that you should look at for licenses plate capture is the location. Finding the right place to record useful video of these small fast moving targets is a key element in the process. The place where you set up for this should be a place where traffic is already controlled in such a way to be beneficial for this process. Someplace where traffic is already forced to stop, such as a stop sign or the gate of a community, is an ideal spot. The entry way of a gated community is probably the best location because it will also be a place where there are fewer lanes of traffic and you will need a dedicated license plate capture camera for every lane of traffic that you’re monitoring, so fewer lanes will require fewer cameras to get the video footage that you want.

The next thing that you should consider for this process is making sure that you have the proper equipment to record the best possible video of the license plates. There are many different security cameras on the market today that offer high quality video, but few are actually designed to record high quality video of a license plate. The cameras that perform this function correctly have to be able to deal with the glare of light bouncing off the reflective surface of the plate, angles that are often challenging, widely varying illumination levels, being able to record video of a moving target that isn’t blurry and they usually have to cope with moderate to long distances. All of these factors, in addition to other location specific issues that haven’t been mentioned, that the camera must deal with are the reasons that you really need to have a surveillance camera that is specifically designed to capture video of license plate despite the difficulties.

Another part of this process that you must account for, in order to do it correctly, is properly monitoring the area where you will be identifying the license plates as well as providing an exterior view of the vehicle. A camera that can capture video of the car or truck and its activity will provide you with some very useful information particularly when you can identify the vehicle’s license plate at the same time. Making sure that you at least have a reasonable high resolution camera for this overview purpose is a very good idea, but it doesn’t need to provide the same type of high quality of video that the license plate camera should. A moderately high quality camera for the overview role will allow you to have a high level of detail in the video shot to help you get an accurate understanding of what type of vehicle the license plate is attached to and how many passengers are in it. This over view camera can also provide other details about the vehicle such as the relative speed that it’s traveling and whether it’s being driven recklessly or not. It’s also a good idea to get a camera for this purpose that has a varifocal lens so that you can adjust it to the camera view that’s needed from the position that’s available for mounting the camera. This type of lens will let you compensate for a reasonable amount of distance from the targeted area and make sure that it’s focused on the exact point that you want.

So now we have established that an overview camera needs to be mounted in such a way that it can view the traffic choke point where you are going to be capturing video of license plates. The next step is to make sure that you have the surveillance camera that will actually be doing the license plate capturing in the right place. The traffic point that you choose for this installation should allow you to know where the target vehicle will stop. The license plate capture will need to be positioned in such a way that it’s field of vision will be focused and the lens will need to be zoomed in to the point that the license plate will take up about sixty percent of the camera’s view. Make sure that you take into account the varying heights of the different types of vehicles that will be traveling through the area. You will need to have one dedicated license plate capturing camera set up this way for each lane of traffic that you wish to monitor.

Once you have these cameras set up in the manner that’s described in this article, you should be ready for monitoring the traffic in the area in great detail. It’s a good idea to test how the camera views will catch the license plates where the vehicles will be stopped and the make the fine tuning adjustments in order to guarantee that you will be getting the video that you desire.

facebooktwittergoogle_plusredditpinterestlinkedintumblrmail

Business Security System

Written By:
Monday, April 30th, 2012

A Guide to Business Security Systems

Business Security SystemAny business must guard against loss due to theft. A century ago, business security primarily consisted of large locks and safes; however, systems are much more complex today. With the advent of ecommerce, business security now includes data encryption and backup. Security systems have progressed into the digital realm, but physical businesses still need to guard against physical threats. For companies with a physical location, there are three basic components to a business security system: access control, alarms and surveillance.

Access Control

Access control is the first line of defense in a business security system. It determines who is allowed access and who is not. The most basic form of access control, which everyone uses both at home and work, is the lock and key. Intruders are barred from entering by locks, while keys allow permitted personnel to pass through easily.

Access control has come a long way since the first key was created. Many businesses rely on digital keys today. The retina scanners FBI agents use in movies is typically beyond a standard business’ security needs. Yet, less sophisticated forms of digital keys are often used. Keys might contain computer chips. Many larger companies swipe card-shaped keys at doorways or enter codes on a keypad.

The mode and expense of access control used in any given business security system will depend upon that specific business’ needs. A small retail store might only need a lock. In contrast, a large corporation might use cards, which can be programmed for different levels of access. A larger company also might use keypads or cards to control parking, whereas a small store does not have that need.

Alarms

No matter how secure a security system’s access control is, there are weak points. Alarms are for when those points are penetrated. They sound when someone gains entry to a place they should not be, thus alerting officials to the intruder, and inducing panic in the intruder. Alarms can be set up to detect burglars and vandals, or an employee who simply used the wrong exit after his shift.

The alarm component of a business security system is often its most extensive part. There are many different pieces and options available for alarms. Understanding the different configurations can help business owners compare different offers and select the best system for their companies. Here are the main elements of an alarm system:

• Control Panel

Every alarm system has a control panel. This is typically located on the roof or in a centrally-located closet. The control panel connects the alarm system on site with its monitoring service.

• Key Pad

Another essential component of an alarm system, key pads allow people onsite to control the alarm system. After being given the proper codes, employees can arm and disarm the system. Most configurations allow employees to secretly activate the alarm, in the event of an emergency.

• Door and Window Contacts

Door and window contacts are the devices used by an alarm system to detect whether an entry point is open or closed. These help employees make sure all the doors and windows are closed at the end of the day, and they will activate the alarm if anyone breaks in by opening a door or window.

• Glass Break Sensors

Door and window contacts are the most common method of detecting intruders, but they are useless against a burglar who enters by breaking a window. A window could be broken, and its contact could never be affected. However, a glass break sensor will detect the sound of breaking glass and activate the alarm. Since these sensors work by detecting sound waves, one can monitor many windows.

• Motion Detectors

Motion detectors are a final line of defense. If properly placed, they will detect anyone moving about inside a building. Almost all intruders will be detected by contacts or sensors. Motion detectors are primarily for anyone who might want to remain inside a building or room after close, then coming out when no one else is present.

• Sirens and Lights

If an alarm system is activated, it will alert the monitoring service. The monitoring service will then alert local authorities, who will Business Security Systemrespond to the call. In the meantime, which might be anywhere from a few seconds to a few minutes, sirens and strobe lights can be used to alert anyone nearby. Sirens and strobe lights are meant to induce panic into any intruder and alert anyone in the vicinity to the potential danger.

The above list contains the components that are standard in most alarm systems. The selections listed below are optional. They will increase the cost of an alarm system, but they also provide additional security. Depending upon a given business’ security needs, these might be wise selections or superfluous expenses.

• Backup System

Alarm systems communicate with their respective monitoring services via a phone line, and intruders often attempt to sever communication by cutting the phone line. If the phone line is cut, a basic alarm system is rendered useless, aside from any sirens or lights. To guard against this, many businesses opt to have a backup system of communication. This can be via a cable line, but using cell phone towers is more common. A cellular connection cannot be cut, so these are the most secure backup systems.

• Two-Way Keypads

Once activated, a basic keypad simply alerts the monitoring service, which then sends the responding local authorities. Two-way keypads, however, allow the monitoring service to communicate directly with people on site. This allows the monitoring service to determine if there is an emergency, or if the alarm was triggered accidently. They also can clarify the nature of the emergency and send the appropriate responders.

• Log

A log of when the alarm was armed and disarmed can help business owners and managers monitor illicit employee actions. Logs often include who performed the action, as well as the date and time the action was performed. Business owners can also select an option that will notify a supervisor if the alarm is not armed.

Surveillance

Surveillance is the final component of any business security system. A surveillance system is a configuration of video cameras and recorders, which together monitor the activities that take place. Surveillance systems can be as simple as a single camera, or they can contain many cameras that are actively monitored by staff. There are several aspects of a surveillance system business owners must consider, before selecting cameras and recorders.

• Large Cameras

Large cameras are primarily used to deter theft and vandalism. They are often prominently placed, so people see them. When burglars and vandals see these cameras, they will reconsider their actions. When innocent people notice these large cameras, they will feel more secure.

• Dummy Cameras

Dummy cameras serve the same purpose as large cameras: they deter theft and vandalism, while increasing the sense of security. However, these cameras do not actually record. They are merely props. Some businesses add these to their security system, because they provide an inexpensive method of increasing security slightly.

• Small Cameras

Small cameras are usually placed in inconspicuous places. They are less noticeable, and often have a dome that prevents people from knowing which way the camera is pointing. These are primarily used for evidence after a vandalism or theft. If they are intended for this purpose, business owners must make sure they can provide a high quality picture.

• Image Quality

Several factors influence the quality of a camera’s image. Is a color image needed, or is a grayscale picture acceptable? Will the camera be recording only in a lit area, or does it need to function at night? Is a high resolution needed for zooming, or are broad, low-resolution images adequate? The purpose of the camera will determine the quality of the image that is required.

• Recorder Location

Most businesses have their surveillance system’s recordings kept on site. They are typically stored in a safe-like device, which prevents people from stealing the recordings. Yet, large corporations might want to keep their recordings in a central office. This can help centralize a security system.

• Fixed or Flexible

Depending upon a camera’s location and purpose, a business security system might need a fixed camera or a flexible one. Fixed cameras can only view a specific area. These are typically larger cameras. Smaller cameras, which are used for evidence gathering, however, are often flexible. That is, these cameras can zoom, pan and tilt. In a monitored system, these offer more control and surveillance.

• Monitored

Some businesses choose a monitored system, while others view this as an unnecessary expense. Monitored systems cost more, because a watchman must be paid to monitor the cameras. However, this provides a higher level of security. Monitored systems are primarily used with non-fixed cameras, so the guard can pan and zoom.

After considering all of the components and aspects of a business surveillance system, business owners and managers will be ready to select the configuration that best meets their needs and budget. A security system can be used to provide safety, deter theft and meet insurance requirements. The best business security system will provide access control, have an alarm system and monitor people via a surveillance system.

 

facebooktwittergoogle_plusredditpinterestlinkedintumblrmail

Fake Security Cameras

Written By:
Monday, March 5th, 2012

Deception, as far as security is concerned, plays an important role. Militaries have been deceiving opposing armies for centuries. Pioneers making their way west would routinely place gun barrels out the sides of the Conestoga wagons. This gave the appearance of multiple armed pioneers, when in fact no one was behind the rifle barrels. Bands of marauders, not knowing for sure, would not attack for fear of losing the battle and their lives. Wooden cannons made to appear as if real would be placed on battlefields. The opposing army many times would hesitate, and make a graceful exit from the field of battle. Using fake security cameras employs the same principles of deception that has been used for years.

Creating Doubt

Simply giving a criminal a moment of hesitation can be enough to cause them to move on. The deception must be well staged however. Spotting a camera invokes a visceral reaction in criminals and others up to no good. People that have committed crimes, and ones thinking about it, many times suspect others may be aware of their transgressions. Many call it a guilty conscience. However, it is not guilt from doing wrong. It is fear of being caught. Criminals when they see a camera lens staring at them as they make their way to a window or back door will stop. They immediately wonder if they have been spotted. They also wonder if the camera is high quality enough to identify them in the dark. Most will make a quick exit from the property.

The Ideal Fake Security Camera Is Real Except For

High quality fake cameras are real cameras without the electronic components. The housing is real and the cables are in their proper places. Ideally, you want one that has a red recording light and motion activation. The camera will come equipped with a battery pack that operates the motion sensor and recording light. However, placing a motion activated fake camera in a high traffic area will quickly deplete the battery. For the most part, homes would not have this type of activity. Businesses employing decoys would need to consider this when placing the cameras.

Make It Look Real and People Will Assume It Is Real

Placement and having the correct camera in the right spot is important. The cameras located outside need to be obviously designated for outdoor use. Criminals paying attention might begin to wonder. Use dome cameras at the front door. Real dome cameras conceal where the lens is pointed. People expect to see this type of camera at entrances. They also provide 360 degrees of coverage, and are tamper proof. Cameras placed with no obvious target area will raise questions about their effectiveness. Also, ensure the camera lens is not pointed at the ground, the sides of the structure or pointed straight up.

Play Your Part Well and Others Will Play Theirs

You can call placing fake security cameras a process of elimination. Would be burglars that are serious about maintaining their freedom will make on the spot assessments. Simply by driving by a potential target, a burglar will eliminate that house as a target, if security measures are obvious. The potential payoff is calculated by assessing risk. Like any professional contractor, the cost of the job is estimated by the amount of effort that must be put forward. A plumber, for example, will lose profit if they misjudge the effort and materials needed. A criminal that does this loses their freedom. Your part as a homeowner is to ensure the cameras always have fully charged batteries to operate the motion sensors and lights. Use widow decals and yard signs to warn of video surveillance.

Many Crimes are Crimes of Opportunity

Fake cameras are not just for the exterior of the home or business. You may have simply assumed that an intruder will never see the inside of the home if they leave after spotting cameras around the exterior. As a homeowner, stop and calculate how many people beside family members have been inside your home over the course of days, weeks or even months.

The cable installer is all over the home, they are in the basement, attic and every room inside. They are not professional criminals however. The large screen television or the new laptop may be more appealing than their sense of right or wrong. They overhear a conversation and realize the home will be vacant at a certain time. They plan and they decide to supplement their wages. Then they spot the camera mounted high in the corner with blinking red lights. It is a motion activated one. You as a homeowner have just thwarted a crime.

This is a prime example of why the cameras must be installed as if real. The cable installer, an electrician or any contractor has more mechanical knowledge than the average person does. You may think well they can spot a fake. They can if the fake camera is not installed properly. Quality fake cameras have real cables attached and many even come with AC adapters for use with household current. Mount the cameras in logical places and plug them in if applicable. Make sure the cables are run into the wall if they need to be. Criminals are aware of wireless cameras so the fact that cables are not protruding everywhere does not raise any questions.

However, they may look for a receiver. Make a point to keep the office locked when workers are present, if they need access be there to keep them from looking to closely at things. Have a file cabinet and keep it locked even if it is empty. Locked doors and secured cabinets all maintain the illusion. Individuals see the cameras and then find doors and file drawers locked they soon put the pieces together. This is doing your part as a security conscience homeowner. They have no idea if the receiver is in there. Unless they have access to your computer, they cannot tell if it is the receiver either. This is not to say that professional contractors are dishonest. The truth is many break-ins are done by individuals that have been in the home before, in some cases, more than once.

By no means, is any statement meant to indicate, or give the impression cable installers or any professional contractor is dishonest. The statement is simply to illustrate how many people may have been in a home over a certain period.

You may be thinking that if all of this has to be done why not just go ahead and install real ones. The cost is the reason why. Budgetary constraints are a major factor. The steps you take to maintain the illusion cost you little in dollars. The payoff however, is well worth the effort. The material costs are just a small percentage when compared to having real cameras professionally installed and monitored.

To maintain the deception, it is wise to install the fake security cameras yourself. The local contractor unwittingly may tell their colleagues or partner. Security is about keeping secrets. For example, armored car drivers never use the same route twice in succession. Their manifest will never have an inventory of contents. It is all about maintaining a security profile. The unknown will make intruders move on to the next house.

Criminals Do Not Want To Work Hard So They Spend Time Looking For Easy Targets

Your home says a lot about you, how it is maintained, what the lawn looks like and so forth. Cameras tell intruders you are paying attention. Fake Security CamerasThieves look for people who appear unaware of their surroundings. Toys or tools strewn about the driveway and yard tell people you may not be paying attention. Lack of obvious security is an open invitation. You have heard the term keeping up appearances. It applies to your security profile, as well.

An expensive looking surveillance system loses some of its impact when someone sees a cheaply constructed hollow core front door. The lock is not effective and easily defeated. The home profile as a whole must indicate you are aware of things, and are pro-active when it comes to security.

You have worked hard for your possessions and your family’s safety is the number one priority. It requires some effort to install fake security cameras and you must apply all the window dressing to go along with it. However, by not doing so you have set yourself up for an intrusion. Do not install cameras in trees with no obvious means of power where leaves and branches block the lens. This tells everyone you have thought about security but have only put a half-hearted effort into it. Tinkering around the edges when it comes to security is obvious to criminals. The efforts send a signal you are not serious, and frankly may not have a clue.

Like a Good Lie Good Deception Mixes In the Truth

Professional bodyguards put tremendous effort into deception. They mix the real in with the fake. When driving their client to and from places they use several cars all the same make and model. No one knows which vehicle to target. Anyone with ill intent is confused, overwhelmed and the majority of the time will give up any attempt.

Unlike money, you can have too many cameras, in some instances. Large estates are expected to have cameras in specific locations. Cameras would be mounted at the gatehouse or covering an entrance gate. The cameras would be mounted to screen visitors or capture vehicle license plates. Anyone would expect a large number of cameras to be present. There would be several covering the perimeter, the backyard, pool area and driveway. The cameras even if fake will still give the correct impression. However, having a large number of expensive looking cameras located around a modest dwelling can send the wrong signal.

It is perfectly acceptable to mix fake security cameras in with real ones that capture and record images. Many homeowners want a real camera to be able to see who may be at the front door. However, they realize most burglars gain access from back doors, upstairs windows and so forth. Decoy cameras can be placed in among real ones to increase your home’s security. Once again, place them in logical locations. One must cover the backyard and any doors or windows where anyone could gain entry. Homes having security gates at the end of their driveway would want one there, as well. These are logical locations and no one would question their position.

Parents regardless of economics want a camera to be able to monitor their child’s care while with a babysitter. They have prioritized, and placed the camera where they foresee the highest risk. In this case, fake cameras can be used in other areas of the home for the babysitter’s benefit. The babysitter has in all likelihood, determined the nanny cam is real. Therefore, others mounted high in the corners of certain rooms will be real to them, as well. This goes back to keeping honest people honest. Let them know you are paying attention and aware.

Prevention is the motivation behind fake security cameras. Let people know up front you are watching. No one wants to take the chance of being recorded committing a criminal act or even a very dumb act. Workers in your home when you are away may decide to help themselves to leftovers in the refrigerator. Seeing cameras mounted will stop this type of activity. Nosy neighbors will not snoop while your back is turned. This brings up another point. Do not tell your friends and neighbors. Once you tell a secret, it of course, is no longer a secret.

Part of good deception is being mysterious about certain things. You must be closed mouthed about your security measures. When people are not sure they hesitate, and many times will not follow through with what they intended. You must maintain appearances to have the proper security profile that will protect your family and possessions.

facebooktwittergoogle_plusredditpinterestlinkedintumblrmail

Multicam Surveillance

Written By:
Friday, November 18th, 2011

A security multicam surveillance system can provide the security and peace of mind for most residential or commercial applications.  Huge selections in camera types, video recording technologies and monitoring options have made digital video camera systems the ideal choice for security and surveillance monitoring.

Exactly what is a multicam surveillance and security standalone system?  A multicam surveillance system usually consists of the following components:

  • More than one digital video camera
  • A processor/capture board/and CODEC application
  • A digital video recorder or DVR, and;
  • A monitor if desired

Multicam surveillance cameras for security standalone DVR (Digital Video Recorder) systems are manufactured in two basic types, indoor and outdoor.  Outdoor cameras are usually “weatherproof” meaning they are able to withstand environmental weather conditions like rain, snow, and heat.  Indoor cameras are designed for used in covered environments and do not usually contain the same type of camera enclosure that provides protection from the elements.

Both indoor and outdoor multicam surveillance digital video camera DVR systems can be wired or wireless.  A wireless camera does not require an image transmitting cable to be connected from the camera to the processing unit.  Instead, these cameras transmit their data via built-in antennae to receiver units that are usually located near the processor, DVR, and monitor.  Wireless camera units usually transmit their data on the 2.4 or 5.8 MHz radio band and can provide fairly long line of sight ranges for transmission.

Whether the cameras are indoor/outdoor and wired/wireless they can also be day/night vision or infrared (IR) night vision cameras.

Digital video cameras produce a video image by using one of two different types of electronic sensors, both of which can produce color or black and white video.  Charged Coupled Devices or CCDs and Complimentary Metal-Oxide Semiconductors or CMOSs convert captured light into electrical energy that can be used to create high quality video images.  CCDs and CMOSs can be very sensitive light and create high quality video in very low light conditions, utilizing as little light that is available on moonlit nights for example.  Cameras that use these sensors are usually referred to as day/night vision cameras and although they can operate in very low light condition, some visible light must be available to produce a video image.

There are digital video cameras that can operate in conditions of total darkness.  These cameras are normally called night vision cameras and operate by creating video images from infrared or IR light.  CCDs have the inherent ability to detect IR radiation light which is invisible to the human eye.  A digital video camera for home security standalone dvr system can take advantage of this characteristic by “bathing” the target area with IR light.  Since the light is invisible to the human eye, we cannot see or detect the presence of the IR light.  IR Light Emitting Diodes or LEDs are used to produce the IR light for this purpose.  IR LEDs are placed around the camera lens so they are aimed at the same target area as the camera and illuminate the area to record IR video.  IR images are monochromatic or black and white.

The multicam surveillance and security standalone DVR system is a security camera system that does not require any additional equipment, such as a personal computer to operate.  The cameras transmit their data to a processor or capture device that converts the electronic information sent into a digital video file that can be watched on a monitor and stored on a DVR.  Often COmpression/DECompression (CODEC) programs or wired circuits are used to reduce the size of the digital file while maintaining high quality video images.  This provides for easy storage and portability of the file, allowing large amounts of data to be stored.

The DVR of a multicam surveillance and security standalone DVR system is much like the hard drive on a personal computer.  It is a magnetic storage disk or plate that stores the video in digital file format for later viewing or archival purposes.  Files can even be copied to other mediums and viewed on personal computers or DVD players.

Multicam surveillance security systems can be used to for a variety of applications.  They are great for providing perimeter coverage of a business building or residence for security and surveillance purposes.  They can also be used inside the home or office to detect and recorded unwanted intruders.  In addition they can be used as bay room monitors, nanny monitors, and pet monitors.

facebooktwittergoogle_plusredditpinterestlinkedintumblrmail