Video Sur Video Sur rveillance, rveillance, , Video Analyti - - PowerPoint PPT Presentation

video sur video sur rveillance rveillance video analyti
SMART_READER_LITE
LIVE PREVIEW

Video Sur Video Sur rveillance, rveillance, , Video Analyti - - PowerPoint PPT Presentation

Physical Security in Physical Security in a Networked World a Networked World Video Sur Video Sur rveillance, rveillance, , Video Analyti Video Analyti ics, and You. ics, and You. Joshua A. Marpet Q Quadling@datadevastation com


slide-1
SLIDE 1

Physical Security in Physical Security in

Video Sur Video Sur Video Analyti Video Analyti

Q

a Networked World a Networked World

rveillance, rveillance, , ics, and You. ics, and You.

Joshua A. Marpet

Quadling@datadevastation com Quadling@datadevastation.com

slide-2
SLIDE 2

Joshua M

Who is this guy? Josh has done everything. I've been a cop, an Josh has done everything. I ve been a cop, an member, a volunteer fireman, a blacksmith and My passion is the chasm between Information S people don't realize is that there is no difference people don t realize is that there is no difference perform SQL injection on others. So what if on I love breaking into places, and showing the pe bl problem. Quadling@datadevastation.com

Marpet

Infragard/OWASP/HTCIA/FLEA and ASTM Infragard/OWASP/HTCIA/FLEA and ASTM d a horse dentist. No joke. Security and Physical Security. What e Locks are locks I can pick some and

  • e. Locks are locks. I can pick some, and

e's on a web page, and one's on a door? eople who “secured” it, how to fix the

slide-3
SLIDE 3

Video Surv

Prevalence – How often does a camera lo Legality – When can someone record me? Hackability Camera Hacks Camera Hacks Video System Hacks Compression Schemas Video Seizure Lessons

CSI Why I hate the show

CSI – Why I hate the show

veillance

  • ok at me every day?

?

slide-4
SLIDE 4

Prevalence

slide-5
SLIDE 5
slide-6
SLIDE 6

Legality

To help protect your privacy, PowerPoint prevented this external picture from being automatically downloaded. To download and display this picture, click Options in the Message Bar, and then click Enable external content. To help protect your privacy, PowerPoint prevented this external picture from being automatically downloaded. To download and display this picture, click Options in the Message Bar, and then click Enable external content.
slide-7
SLIDE 7
slide-8
SLIDE 8
slide-9
SLIDE 9

Hackability Nanny‐Cam May Leave a Home Exposed Sat Apr 13, 2:55 PM ET By JOHN SCHWARTZ The New York Times Thousands of people who have installed a pop intending to increase the security of their hom unknowingly opened a window on their activit cheap receiver. The wireless video camera, which is heavily ad intended to send its video signal to a nearby b viewed on a computer or a television. But its s h il b ff h h l more than a quarter‐mile away by off‐the‐shel less than $250. pular wireless video camera, mes and offices, have instead ties to anyone equipped with a dvertised on the Internet, is base station, allowing it to be signal can be intercepted from lf l i i i lf electronic equipment costing

slide-10
SLIDE 10

Compression Schemas

H.264 / MPEG-4 AVC H.264 / MPEG 4 AVC Overview H.264 is also known as MEPG-4 AVC. H.264 uses the late technology to provide consistently crisp and clear video fo Pros Pros * H.264 delivers incredible video quality at data rates on video formats * H.264 offers dramatically lower bit rates and better pic H.263+ * It i 2X ti ffi i t th MPEG 4 d fil i * It is 2X times more efficient than MPEG-4. and file siz MPEG-2 Codecs * It is easy to integrate and covers wide range of picture segment. Cons * H.264 requires longer encoding time * It is certainly not constricted and low-bandwidth friend * More Hardware overhead is also one of the limiting fa * Licensing agreements are complicated. Licensing agreements are complicated. MPEG-4 Overview MPEG-4 is a standard currently under development for th networks As such it is more than a single codec and will

  • networks. As such, it is more than a single codec, and will

interactivity. Pros * Good image quality at low data rates Cons * Standard is still being designed est innovations in video compression

  • r the best possible viewing.

ne-fourth to one-half the size of previous cture quality than MPEG-2, MPEG-4 or i 3X ti ll th bl ze is 3X times smaller than comparable e format. Hence used in large application dly actor e delivery of interactive multimedia across l include specifications for audio video and l include specifications for audio, video, and

slide-11
SLIDE 11

Video Surveillance Seizure Lessons: Lesson 1: When involved in an incident like with a lawyer within 3 days to collect video lawsuit. Lesson 2: Get a court order/subpeona for the footage person legal liability mitigation. Lesson 3: Take a picture of the clock on the video sys synchronized.. y Lesson 4: Make sure you get a copy of the player pro Lesson 5: The CSI Effect is real. The CSI Science is ely to go to court, get out there

  • to support your side of the
  • e. This gives a business or

stem, with a clock that is atomic

  • gram.

s not, mostly.

slide-12
SLIDE 12

CSI Effect

slide-13
SLIDE 13

Video a Video a

Reliability – Is it Consistent? Validity – Does it alarm for the correct conditions? Wh t i V y Implementation – How do I get this? Hacking – How do I break it? What is V Interpreta time, or p There are including: Motion De Motion De Facial Re License P Package Line Cros Line Cros People Co Incident A Motion/Tr Currency Smoke an

analytics analytics

? Vid A l ti ? Video Analytics? ation of a video stream, done either in real erformed on a recorded stream. e different types of Video Analytics, etection etection ecognition Plate Recognition Leave Behind ssing (“Trip Wire Detection”) ssing ( Trip-Wire Detection )

  • unting

Alerting rajectory Tracking Checking nd Fire Alerting

slide-14
SLIDE 14

Photomanipulation – a type of Video analytics

slide-15
SLIDE 15
slide-16
SLIDE 16

License Plate Recognition

slide-17
SLIDE 17

Tra Tra People Counting Line-Crossing “Tripwire” ajectory ajectory g

slide-18
SLIDE 18
slide-19
SLIDE 19
slide-20
SLIDE 20
slide-21
SLIDE 21
slide-22
SLIDE 22
slide-23
SLIDE 23
slide-24
SLIDE 24 To help protect your privacy, PowerPoint prevented this external picture from being automatically downloaded. To download and display this picture, click Options in the Message Bar, and then click Enable external content. To help protect your privacy, PowerPoint prevented this external picture from being automatically downloaded. To download and display this picture, click Options in the Message Bar, and then click Enable external content.
slide-25
SLIDE 25 To help protect your privacy, PowerPoint prevented this external picture from being automatically downloaded. To download and display this picture, click Options in the Message Bar, and then click Enable external content. To help protect your privacy, PowerPoint prevented this external picture from being automatically downloaded. To download and display this picture, click Options in the Message Bar, and then click Enable external content.
slide-26
SLIDE 26

1 Cities will have healthier Immune Systems

  • 1. Cities will have healthier Immune Systems
  • 2. City Buildings will respons like living organ
  • 4. Smarter Cities will quench cities thirst for w
  • 5. Cities will respond to a crisis, even before

s nisms. water and save energy receiving an emergency phone call.

slide-27
SLIDE 27

Impleme Impleme

Problems Problems

  • Customers expect it to be a magic bullet,

capable of spotting criminals and terrorists in a single bound. It's not. in a single bound. It s not.

  • Integrators don't realize how much time

and effort it takes to train the system.

  • Total screwup of implementations is

common common.

  • It's fairly sensitive technology, able to be

avoided with a few simple steps.

  • The consequences of adding Video

A l i h k Analytics to the corporate network are not foreseen.

  • The consequences of adding Video

Analytics to the corporate storage San are y p g not foreseen.

entation entation

Suggestions Suggestions

  • Have a manufacturer's representative go
  • ver the requirements with you, and sign
  • ff on them, that the Video Analytics

system will perform to those specs. system will perform to those specs.

  • Use the manufacturer's rep to help with

calibration and installation.

  • Have clearly defined goals for the system.
  • Use a manufacturer's demo system to
  • Use a manufacturer s demo system to

show the client how the system works, and what it cannot do.

  • Train at least one person at the client how

t i t i d lib t th t to maintain and calibrate the system, so you don't get called out to do it many many many times.

  • Demonstrate to the client, and have them

, sign off on the system, after that have tested it with their own people.

slide-28
SLIDE 28

Video Analytics Hacking Non-Techie Hacks

slide-29
SLIDE 29

Video Analytics Tech Hacks

Lots of Video servers run these OS'es, and all IP cameras have RJ 45 ll i t i ht RJ-45, normally going straight to the Corporate Network

slide-30
SLIDE 30

Conclusi

Joshua Marpet dli @d t d t ti quadling@datadevastation.c

  • ns?
  • m