Category: About Technology

Security Technology Review for 2017

Technology of 2017

In 2017 there were a number of technology advancements. Faster processors provided higher performance IP cameras that enhanced the security provided by IP camera systems.

Other technology introduced included, long-range PTZ cameras, new biometric door access control readers, and more advanced network attached paging and intercom systems.

Over last year, technology for IP security systems continued to add new features that made it easier to use and improve our safety. This article reviews some of the key technology introductions.

Continue reading “Security Technology Review for 2017”

How to Protect IP Camera System from Cyber Attack

Protecting Your IP Camera from Hacking

IP camera cyber security concept

IP camera systems are supposed to protect us. That is their purpose. However, do we need to protect the camera system?  It turns out that in this brave new world of cyber threats, even our cameras are vulnerable.

There are some things you can do to protect your IP camera system from cyber-attack. Some of them seem obvious, yet many of us have not implemented them. Your IT staff can implement many of these things, but we do have a simple solution that can be installed by almost anyone. Here is a list of things you should do to protect your IP camera system.

IP camera systems are supposed to protect us. That is their purpose. However, do we need to protect the camera system?  It turns out that in this brave new world of cyber threats, even our cameras are vulnerable.

There are some things you can do to protect your IP camera system from cyber-attack. Some of them seem obvious, yet many of us have not implemented them. Your IT staff can implement many of these things, but we do have a simple solution that can be installed by almost anyone. Here is a list of things you should do to protect your IP camera system.

Continue reading “How to Protect IP Camera System from Cyber Attack”

Biometric Door Control Misconceptions

Do You Believe Facial Recognition Readers Store Your Picture?

Biometic reader and flat-disc world

There are many misconceptions about science and technology. One of the misconceptions is that biometric IP door readers store a picture of your fingerprint or face. Another one is that the Earth is a flat disc that rests on top of four elephants, on top of a turtle*.

For clarity, biometric door readers do not store a picture of your fingerprint or face, and the Earth is not flat. This article describes the technology behind biometric door readers.

Continue reading “Biometric Door Control Misconceptions”

Long Range Camera Systems – Custom Vs. Off-the-Shelf

Review of Long-Range Day-Night IP Camera Systems

If you want to detect an object many miles away, you will need a special long-range PTZ camera.  While custom-made cameras are best for very long-range applications, the latest off-the-shelf cameras provide some of the same capability for less money. These long-range PTZ cameras are very cost-effective, and allow you to detect a person almost 4-miles away. They have built-in IR-illumination or an additional thermal imaging camera that allows you to see an object over ½ mile away.  Prices range from less than $3,000 to about $25,000.

If you want to detect an object many miles away, you will need a special long-range PTZ camera.  While custom-made cameras are best for very long-range applications, the latest off-the-shelf cameras provide some of the same capability for less money. These long-range PTZ cameras are very cost-effective, and allow you to detect a person almost 4-miles away. They have built-in IR-illumination or an additional thermal imaging camera that allows you to see an object over ½ mile away.  Prices range from less than $3,000 to about $25,000.

The basic difference between the off-the-shelf cameras and the custom made cameras is their performance. The custom long-range cameras take much longer to build because they use special components.  The custom long-range cameras generally will provide much better operational distance, especially at night.  Custom-made systems can view objects at night that are over 8 miles away. They include very long distance lenses, specialized laser illuminators, special thermal cameras, and very high-performance pan tilt mechanisms.  Off-the-shelf long-range cameras cost less than $25,000, while custom cameras range in price from $50,000 to well over $150,000. Here is a summary of the systems available:

Continue reading “Long Range Camera Systems – Custom Vs. Off-the-Shelf”

How to Ensure Video Chain of Evidence

How Write-Once Storage is Used to Protect Video Evidence From Your Ip Surveillance System

chain of custody evidence tag

One of the objectives of a video security system is to help law enforcement prosecute miscreants. It is important that this digital evidence follow the rules for chain of evidence so it will be acceptable by the courts. It must be treated just like fingerprints, confiscated weapons, and other physical objects that need to be authenticated in court. Ensuring the immutability of digital information can be challenging because a knowledgeable person can modify the evidence if it is not secured. How can we assure that the information has not been edited, deleted, or modified in any way?  This article reviews some of the methods for protecting the video chain of evidence.

Procedures Required

In all cases, defined methods of handling and storing the video data need to be followed. Once an incident occurs, the organization should follow a procedure that protects the video. The first step is to transfer the video evidence to secure storage that can’t be changed.  This can be DVR-R disc or a protected hard drive. Once the video is transferred, it can be provided to law enforcement.

Continue reading “How to Ensure Video Chain of Evidence”

Protecting Your Computer from Malware

How to Protect Your Computer from Ransomware and Other Malware

pirate ship binary code background

What if you didn’t have to worry about ransomware or any other viruses? Unfortunately, cybercrime has become a major problem for the Chief Technology Officer (CTO) who is tasked with protecting the company’s computer systems, as well as the CEO who has to deal with the consequences of an attack. Large corporations such as Merck, Mondelez, Sony and DLA Piper have been infected by malware. Hospitals and organizations around the world have not been spared. It has become a global problem.

There are a number of virus protection programs that attempt to block malware from entering the system, but none of the solutions work all the time.  A good solution is to be more careful with email, but it is hard to control everyone in the organization. An extreme solution is to take the computer off the Internet, but this prevents access to people who need the data.

Continue reading “Protecting Your Computer from Malware”

Detection, Recognition, Identification: The New Criteria

The Real-World Resolution Requirements

I was not sure what to call this article. I first thought it should be titled, “Why The Johnson Criteria is Wrong.”  We use this criterion to predict how far away we can see something using a specific camera and lens.  The criteria define the threshold for detection, recognition, and identification (DRI). The industry has used this criterion since World War II. It has not been updated to reflect today’s technology and resolution requirements.

Detection Recognition Identification
Detection Recognition Identification

Better criteria can help us select the right long-range camera for an application.  It can be used to predict the working distance of long-range thermal and optical camera systems.

Continue reading “Detection, Recognition, Identification: The New Criteria”

Comparison of Security Provided by Door Access Systems

What Is the Most Secure Door Access Control System?

cartoon with many locks on door

How secure are door access control systems?  Pricing can range from less than $100 for a single door to over $1100 per door. What do you get for the money? In some cases, the security level provided can be crucial to your safety.

How can we stay ahead of miscreants that are dedicated to breaking through our security systems?  This article summarizes the various levels of electronic security provided by different door control systems. Level 1 provides the least overall security while level 4 provides the highest level of protection. We compared the cost against the effectiveness of each type of system.

How secure are door access control systems?  Pricing can range from less than $100 for a single door to over $1100 per door. What do you get for the money? In some cases, the security level provided can be crucial to your safety.

How can we stay ahead of miscreants that are dedicated to breaking through our security systems?  This article summarizes the various levels of electronic security provided by different door control systems. Level 1 provides the least overall security while level 4 provides the highest level of protection. We compared the cost against the effectiveness of each type of system.

Continue reading “Comparison of Security Provided by Door Access Systems”

Comparison of Panoramic IP Cameras

How far can you see with an IP panoramic camera?

Panorama Trafalgar Square London
Panoramic Camera View

A panoramic camera provides a very wide unbroken view in all directions. The panoramic view can be achieved using a single sensor or an array of sensors (or cameras). Single-sensor 360-degree or fisheye cameras have been around for many years. The problem with panoramic cameras has always been the lack of detail available at a distance. The latest high-resolution cameras and multi-sensor cameras provide much better resolution. They can be used in standard surveillance applications, as well as situational awareness. I define standard surveillance applications as situations where you want enough resolution to identify people in the view.

This article describes how to determine the viewing distance of different panoramic IP cameras. It compares single-sensor, multi-sensor, and multi-directional IP cameras. Multi-directional cameras are not considered to be true panoramic, but in many cases, can be used in the same applications.

Continue reading “Comparison of Panoramic IP Cameras”

Access Control and Fire Alarm System Integration

How to Integrate Access Control with Fire Alarm Systems

person running exit door illustration
Integration of Access Control and Fire Alarm

Door access control systems control the electric locks. They allow authorized people to enter through the controlled doors. However, what happens in the event of a fire? The access control system could prevent people from escaping or prevent the fire department from entering the building. Many municipalities provide rules for how the fire alarm integrates with the door access system. This article describes how to integrate access control and fire alarm systems.

Continue reading “Access Control and Fire Alarm System Integration”