video sur video sur rveillance rveillance video analyti
play

Video Sur Video Sur rveillance, rveillance, , Video Analyti - PowerPoint PPT Presentation

Physical Security in Physical Security in a Networked World a Networked World Video Sur Video Sur rveillance, rveillance, , Video Analyti Video Analyti ics, and You. ics, and You. Joshua A. Marpet Q Quadling@datadevastation com


  1. Physical Security in Physical Security in a Networked World a Networked World Video Sur Video Sur rveillance, rveillance, , Video Analyti Video Analyti ics, and You. ics, and You. Joshua A. Marpet Q Quadling@datadevastation com Quadling@datadevastation.com

  2. Joshua M Marpet Who is this guy? Josh has done everything. I've been a cop, an Josh has done everything. I ve been a cop, an Infragard/OWASP/HTCIA/FLEA and ASTM Infragard/OWASP/HTCIA/FLEA and ASTM member, a volunteer fireman, a blacksmith and d a horse dentist. No joke. My passion is the chasm between Information S Security and Physical Security. What people don't realize is that there is no difference people don t realize is that there is no difference e e. Locks are locks. I can pick some, and Locks are locks I can pick some and perform SQL injection on others. So what if on e's on a web page, and one's on a door? I love breaking into places, and showing the pe eople who “secured” it, how to fix the problem. bl Quadling@datadevastation.com

  3. Video Surv veillance � Prevalence – How often does a camera lo ook at me every day? � Legality – When can someone record me? ? � Hackability � Camera Hacks � Camera Hacks � Video System Hacks � Compression Schemas � Video Seizure Lessons � CSI – Why I hate the show CSI Why I hate the show

  4. Prevalence

  5. Legality To help protect your privacy, PowerPoint prevented this external picture from being automatically downloaded. To download and display this picture, click Options in the Message Bar, and then click Enable external content. To help protect your privacy, PowerPoint prevented this external picture from being automatically downloaded. To download and display this picture, click Options in the Message Bar, and then click Enable external content.

  6. Hackability Nanny ‐ Cam May Leave a Home Exposed Sat Apr 13, 2:55 PM ET By JOHN SCHWARTZ The New York Times Thousands of people who have installed a pop pular wireless video camera, intending to increase the security of their hom mes and offices, have instead unknowingly opened a window on their activit ties to anyone equipped with a cheap receiver. The wireless video camera, which is heavily ad dvertised on the Internet, is intended to send its video signal to a nearby b base station, allowing it to be viewed on a computer or a television. But its s signal can be intercepted from more than a quarter ‐ mile away by off ‐ the ‐ shel h il b ff h h l lf l lf electronic equipment costing i i i less than $250.

  7. Compression Schemas H.264 / MPEG 4 AVC H.264 / MPEG-4 AVC Overview H.264 is also known as MEPG-4 AVC. H.264 uses the late est innovations in video compression technology to provide consistently crisp and clear video fo or the best possible viewing. Pros Pros * H.264 delivers incredible video quality at data rates on ne-fourth to one-half the size of previous video formats * H.264 offers dramatically lower bit rates and better pic cture quality than MPEG-2, MPEG-4 or H.263+ * It is 2X times more efficient than MPEG-4. and file siz * It i 2X ti ffi i t th MPEG 4 d fil i ze is 3X times smaller than comparable i 3X ti ll th bl MPEG-2 Codecs * It is easy to integrate and covers wide range of picture e format. Hence used in large application segment. Cons * H.264 requires longer encoding time * It is certainly not constricted and low-bandwidth friend dly * More Hardware overhead is also one of the limiting fa actor * Licensing agreements are complicated. Licensing agreements are complicated. MPEG-4 Overview MPEG-4 is a standard currently under development for th e delivery of interactive multimedia across networks As such it is more than a single codec and will networks. As such, it is more than a single codec, and will l include specifications for audio video and l include specifications for audio, video, and interactivity. Pros * Good image quality at low data rates Cons * Standard is still being designed

  8. Video Surveillance Seizure Lessons: Lesson 1: When involved in an incident like ely to go to court, get out there with a lawyer within 3 days to collect video o to support your side of the lawsuit. Lesson 2: Get a court order/subpeona for the footage e. This gives a business or person legal liability mitigation. Lesson 3: Take a picture of the clock on the video sys stem, with a clock that is atomic synchronized.. y Lesson 4: Make sure you get a copy of the player pro ogram. Lesson 5: The CSI Effect is real. The CSI Science is s not, mostly.

  9. CSI Effect

  10. Video a Video a analytics analytics Reliability – Is it Consistent? Validity – Does it alarm for the correct conditions? y ? Implementation – How do I get this? Hacking – How do I break it? Wh t i V What is V Video Analytics? Vid A l ti ? Interpreta ation of a video stream, done either in real time, or p erformed on a recorded stream. There are e different types of Video Analytics, including: Motion De Motion De etection etection Facial Re ecognition License P Plate Recognition Package Leave Behind Line Cros Line Cros ssing (“Trip Wire Detection”) ssing ( Trip-Wire Detection ) People Co ounting Incident A Alerting Motion/Tr rajectory Tracking Currency Checking Smoke an nd Fire Alerting

  11. Photomanipulation – a type of Video analytics

  12. License Plate Recognition

  13. Tra Tra ajectory ajectory People Counting g Line-Crossing “Tripwire”

  14. To help protect your privacy, PowerPoint prevented this external picture from being automatically downloaded. To download and display this picture, click Options in the Message Bar, and then click Enable external content. To help protect your privacy, PowerPoint prevented this external picture from being automatically downloaded. To download and display this picture, click Options in the Message Bar, and then click Enable external content.

  15. To help protect your privacy, PowerPoint prevented this external picture from being automatically downloaded. To download and display this picture, click Options in the Message Bar, and then click Enable external content. To help protect your privacy, PowerPoint prevented this external picture from being automatically downloaded. To download and display this picture, click Options in the Message Bar, and then click Enable external content.

  16. 1 Cities will have healthier Immune Systems 1. Cities will have healthier Immune Systems s 2. City Buildings will respons like living organ nisms. 4. Smarter Cities will quench cities thirst for w water and save energy 5. Cities will respond to a crisis, even before receiving an emergency phone call.

  17. Impleme Impleme entation entation Problems Problems • Customers expect it to be a magic bullet, Suggestions Suggestions capable of spotting criminals and terrorists in a single bound. It's not. in a single bound. It s not. • Have a manufacturer's representative go • Integrators don't realize how much time over the requirements with you, and sign and effort it takes to train the system. off on them, that the Video Analytics • Total screwup of implementations is system will perform to those specs. system will perform to those specs. common. common • Use the manufacturer's rep to help with • It's fairly sensitive technology, able to be calibration and installation. avoided with a few simple steps. • Have clearly defined goals for the system. • The consequences of adding Video • Use a manufacturer s demo system to • Use a manufacturer's demo system to Analytics to the corporate network are not A l i h k show the client how the system works, and foreseen. what it cannot do. • The consequences of adding Video • Train at least one person at the client how Analytics to the corporate storage San are y p g to maintain and calibrate the system, so t i t i d lib t th t not foreseen. you don't get called out to do it many many many times. • Demonstrate to the client, and have them , sign off on the system, after that have tested it with their own people.

  18. Video Analytics Hacking Non-Techie Hacks

  19. Video Analytics Tech Hacks Lots of Video servers run these OS'es, and all IP cameras have RJ 45 RJ-45, normally going straight ll i t i ht to the Corporate Network

  20. Conclusi ons? Joshua Marpet quadling@datadevastation.c dli @d t d t ti om

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend