Jump to content
Security Installer Community

Search the Community

Showing results for tags 'arc'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Main Public Area
    • Site News, Events, and Feedback
    • Introduce Yourself
    • Name And Shame Area
    • Product / Service News
    • Members Lounge (Public)
    • Guest Forum
    • FORUM TRADE MEMBERSHIP
    • Regulations & Standards
    • Misc Area
    • UK Security Installers by regional Police Force
    • Collectors And Vintage Security & Fire Parts
  • Global Section
    • Security Job Requests and Vacancies
    • Equipment Reviews
    • General Security & Fire Queries
    • !!..DIY Installers..!!
    • Electrics
    • Inspectorate Queries
    • UK Security Sub-Contractors
    • User Manuals
    • Security Horror Stories
    • Setting-up Business Queries
    • Trade ADT Only Engineer Forums
  • CCTV & Access Control Area
    • CCTV & Access Control
    • Trade Access Control
    • Trade CCTV Forums
  • Fire Area
    • General Fire Alarm Queries
    • Trade Fire Forum
    • Restricted Trade Fire Forum
  • Intruder Alarm Section
    • Control Panels (Public)
    • Detector Queries (Public)
    • Home / Building Automation (public)
    • Trade Only Area
  • Telecoms & I.T. Forum
    • General Telecom Queries
    • Networks
    • Computing etc
    • Mobile Devices
  • Trade Security Resources
    • Security Intruder Manufacturers
  • BSIA Commitees
    • SSS TC1
    • SSSTC
    • Regulation Drafts
  • Communal Trade`s Forums
    • Members Lounge
    • Trade Member Listings
    • Security News
    • Installers & Engineers Forum
    • Getting Approved..?
    • Rules and Regulations
    • Health & Safety
    • Basic Electronics
    • Trade Job Vacancies & Queries.
    • Equipment Wanted....
    • Engineer Manuals
    • The SWAP's Shop
  • Trade - Intruder Forums
  • Trade ACCESS & CCTV
  • Trade Fire Alarm Forums

Categories

  • Applications
  • Documents
  • Documents (Trade Members Only)
  • Engineer / Installation Manuals, Training & Application
    • Access Control
    • CCTV
    • Fire
    • Intruder Alarms
    • Training
  • User Manuals
    • Access Control
    • Fire
    • Intruder Alarms
  • Sales Brochures
    • CSL Dualcom
    • Honeywell
    • Texecom
    • Web Way One

Blogs

  • Service Engineer's Blog
  • Service Engineer's Blog
  • arfur mo's Blog
  • therealmophead's Blog
  • jb-eye's Blog
  • jb-eye's Blog NICEIC making up charges for certs
  • jameswilson's Blog
  • Smoke Screen's Blog
  • Jim's Blog
  • The Messenger
  • Electronic Security & Technology
  • digitalwitness' Blog
  • Operational Security & Management
  • The Scantronic & Menvier Tat Blog

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Location

Found 6 results

  1. Can any members please post their experiences with 3rd party remote monitoring companies? In particular, does anyone have experience of QVIS monitoring?
  2. Hello, I am trying to activate phone call in Pyronix Enforcer 32-WE. I have tried putting my phone number instead of ARC, my phone is ringing well when alarm is triggered but nothing happens when I take the call(no message).I read that ARC messages are DTMF tone, so, How can I have notification on my mobile phone when alarm triggering ? Another one question, Can I call to Enforcer from a phone to activate my alarm or deactive it remotely ? Thanks.
  3. Unmanned Aerial Vehicles Some press exposure was given recently to the news that Secom are actively looking to utilise ‘drones’ for the private security market on a rental basis. [1] This appears to relate to the American market with the rental price given in dollars, yet is the UK market also ready to consider the possibilities? The usage of drones, also referred to as Unmanned Aerial Vehicles (‘UAVs’), in the military sector has been known about and discussed widely for quite a while now. However, the typical lapse into commercial operations is beginning to take place quite quickly now and with the addition of Chinese CCTV market into the mix along with a thriving amateur hobbyist community (thankfully both non-weaponised for now) we are now able to consider the application of this technology in a serious manner in relation to the UK electronic security industry. [2] Scope Drones generally come many forms, it seems though that two main types are established at the moment in the commercial and civilian markets – ‘Multicopter’ types which are devices with several rotors designed to assist in direct and immediate flight and the more traditional aircraft types similar to model planes. Drones are defined as “an aircraft without a human pilot on board. Its flight is either controlled autonomously by computers in the vehicle, or under the remote control of a pilot on the ground or in another vehicle” This also leaves open the possibility of a drone definition as an unmanned aircraft under the control of a pilot in a remote location. ARCs & UAVs – A good match? There are some restrictions in the utilisation of drones in the UK. The Civil Aviation Authority (CAA) states that drones can be flown without a pilot's licence as long as they meet the following criteria: They must weigh less than 20 kilograms Remain below a height of 122 metres Remain within visual line of sight of the pilot Remain within 500m of the pilot Only be flown away from populated areas and airports Pilots must also be able to take over manual control if required Permission must be sought from the CAA [3] [4] This would seem to prevent the deployment of drones by remote centres but how would this affect an Alarm Receiving Centre ('ARC') with trained and licensed pilots with drones utilised under regulatory control for protection of a building? What about site based rooftop drones, which have a single application following an activation of flying directly upwards, transmitting footage from an aerial viewpoint before descending to recharge again? Protection in the event of a fire or duress situation could be more effectively managed perhaps with aerial thermal imaging and CCTV. Would manual PTZ control of such devices and utilisation of 4G for transmission purposes open up a new avenue for protection of property? Would we, in this scenario, eventually be petitioned by the police to take things a step further and follow suspects away from the property whilst they are en route so as to assist in a successful arrest? The use of two way audio in combination with a flyover by a drone device could be a powerful tool to deter would be burglars from a property. With a carefully managed marketing exercise to demonstrate effective results (similar to the smartwater approach) we could as an industry add another difficult to overcome layer of protection causing less well prepared miscreants to be caught and/or identified more effectively. Considerations There are some caveats to consider of course as with any new technology. Weather restrictions – wind shear, storms affecting flight Fog and other visibility issues restricting vision – much as with tradtional CCTV Recharging the UAV – Contact based charging solutions are now viable however Communications – The usage of robust 4G and 5G solutions should resolve this Auditing – On board encrypted SD cards should assist here Security of control – An important issue which I will describe below in more depth Health & Safety – Any such vehicle could potentially cause an accident or harm if lost Privacy – As always privacy concerns would have to be addressed and respected [5] [6] On the issue of security of control I would like to point out that where control of a Drone is intercepted by a third party we must be able prove that such action has taken place. There ought to be mandatory requirements regarding the security of access in line with current standards relating to all other security equipment in use. Though the application may be different the same level of care ought to be considered. This leaves us with some more questions to ask and discuss with regards the impact on and usage of UAVs within our sector: Would you consider implementing this technology? Do our current standards suitably allow for this technology to be utilised? Is it appropriate for ARCs to implement licensed pilots for this purpose? Would installers consider implementing these devices in specific installations? Does an aerial viewpoint offer advantages over properly sited CCTV? Should individual ARCs be licensed to pilot security UAVs? Would a single RVRC specialising in remotely controlled UAVs be a better approach than many RVRCs/ARCs offering individual solutions? As always, please feel free to discuss, sharing your thoughts and views on this subject… References: [1] – Engadget.com – Secom offers a private security drone (December 2012) [2] – Wired.co.uk – Here come the drones… (July 2012) [3] – Civil Aviation Authority – Policy for Light UAV Systems (May 2004) [4] – Civil Aviation Authority – CAP722 Guidance (August 2012) [5] – Global Research – Civil liberties and the CAA (December 2011) [6] – Youtube – BBC coverage of increased drone usage (Decembe 2012)
  4. Ghost in the machine... With around three quarters of remotely accessible CCTV systems allowing intruders free access to invade privacy and compromise entire corporate computer networks, is it time to say 'enough is enough' to manufacturers and insist upon firmware changes to improve security control? This is not isolated to consumer level CCTV platforms only. Many 'professional' DVRs & NVRs are installed with default administrator accounts unchanged or additional accounts created and system owners given control over the default account (which they then fail to change). This means that anyone who is able to connect to the unit remotely can simply enter the default username & password (which can be found within seconds through a simple google search in almost all cases) and then have access to the system as completely as if they were standing in front of the unit. To compound matters further CCTV systems are rarely secured to only allow specific IP addresses to connect to them and at the same time they broadcast their presence through banner information given out to any device that queries the unit (This means it is easy to find such devices in the wild). In ~80% of installations the default passwords remain in place for the first three months. This drops to an average of ~70% after three months as some systems are made more secure by their removal. This still leaves vast numbers of units out there which can be listed by country / ISP / city, or date of installation and more which are openly accessible to any IP address. Some examples: AVTech - Over 420,000 units exposed - (14,000 in Great Britain / 12,000 in America) Hikvision - Over 710,000 units broadcasting - (10,000 in Great Britain / 16,000 in America) Dedicated Micros - Over 18,000 units detected - (8,000 in Great Britain / 7,000 in America) You might be thinking, so what, it's just CCTV - what's the worst that can happen? It should be remembered at all times that modern DVRs are in effect computers in most cases. Usually based on linux these machines are carrying out a specific task but can be put to use for other non DVR activity with ease. Each compromised DVR is in effect an open computer allowing anyone and everyone access to a corporate network potentially. If security of the DVR is poor then it is possible that network security within a corporation is equally lax. Last year a CCTV module was added to a tool called Metasploit, widely used in the blackhat community this tool allows users to attack a DVR, testing default access and brute forcing passwords. The fact that CCTV systems are often the weakest point of entry on a network is not lost on attackers and those who seek to maliciously access systems. Whose fault is it really?... It can sometimes be difficult to pin down exactly where the fault lies as there is a blurring of responsibilities in some contractual agreements. A professional installer may fit a DVR and put in place a secure username and password combination for remote management or viewing by a remote RVRC or ARC. They may also advise the system owner to put in place ACL (Access control lists) so that only authorised IP addresses are allowed to connect to the device as well as giving advice on blocking netbios responses and port forwarding. However, if a user insists on being able to access the device remotely and chooses to keep the simple to remember default account and not to implement such measures then the machine can remain vulnerable. Often the company responsible for installing, maintaining or monitoring the system does not have control over the network used by the device for transmission. Even if the password is changed there exist a large number of exploits on known DVRs and in many cases these and similar exploits can be applied to other DVRs as the programming code is sometimes not as secure as it ought to be. The CCTV hardware sector has been under intense price pressure in recent years and with a downward spiralling price index it has been common to see a reduction in the number of developers and code writers employed by some companies which could potentially increase the risk of security holes remaining in a product. In the event that a breach receives widespread mainstream media coverage it does not just reflect badly upon an end user themselves as the security industry on the whole would receive bad press even if not at fault. How do we fix it?... In part this may require some contract review to ensure that clear definitions are in place by all businesses as to the responsibility that both they and the client hold. Clear understanding must be given as to the potential risks and good practise should be recommended in securing the unit. Perhaps a move towards mobile broadband and IPv6 will mean that we can take back control of securing the communication channel? We must however tackle the issue of default user accounts existing in the first place. There is no need to have such accounts any more. Even if such accounts could be made unique to each device it would be an improvement, but in an ideal world the units would prompt for a unique username and password combination on first powering up with an option to default the unit only by an physical action on the unit itself in some secure manner. Dedicated Micros units for example come configured with up to five seperate default accounts of which three have admin level access and allow full control over a unit. Are your engineering teams ensuring that all of these accounts are removed? I recently asked the technical support staff at several DVR manufacturers why they still use default accounts despite the huge risks involved when they are regularly left in place? I was repeatedly advised that it made their job much easier when providing remote support to users and engineers. Newer Axis cameras feature the technique of forcing a password change on first access and it is much more secure as a result. We should be hammering the doors of manufacturers to ask them to indtroduce this approach in their new firmware revisions (no hardware change should be required in most cases). We should also be encouraging the standards to push towards a more robust approach to handling default accounts. Manufacturers often boast of how much value is protected by their devices (it's a safe boast that does not reveal how many units they sold) - It is this same value that is potentially at risk. The next time you are presented with new CCTV equipment or a new manufacturer, ensure that you ask them how they ensure that their products remain secure as it is your reputation at stake. Action to be taken: Installers Check contractual agreements Ensure engineers trained in best practise Audit existing installations Verify guidance given to end users Ensure firmware is updated regularly Manufacturers Remove generic default accounts Deploy an effective mechanism for security Check existing exploits to ensure none affect your units Keep up to date with new exploits Notify your clients when you discover older firmware is at risk Maintain a 'risk register' of some kind for trade members to be aware of potential risks End Users Protect their own networks by blocking Netbios Allow access only to specific IP addresses Change / Remove default accounts!! Use secure passwords (6 Characters or more / Alphanumeric / Mixed case) Ensure that internal communications to and from the device are restricted
  5.   Bigger = Better? Many barriers currently exist for businesses which are planning to run their own Alarm Receiving Centre (ARC). In the coming months we could potentially see some of those barriers crumble and a whole new way of doing business materialise.     Winners & Losers Traditionally setting up an ARC from scratch has been an expensive and time consuming process, which can rely upon expertise in the field to implement and is surrounded by very little shared information or open resources (ARCs for Dummies is not out yet). Existing ARCs face to lose out if more competition enters the fray and yet at the same time suppliers could benefit if more new business is generated.   Barriers So what exactly are the barriers to setting up a modern ARC? Building / Structure Buildings and structures must comply with specific requirements of the standards Equipment / Hardware In some cases specialist equipment may be required Communication Networks From voice communications to PSTN to IP via fibre links and all flavours in between AE Platforms Software packages used to monitor remote system Licensing / Accreditation Strict standards must be met in order to escalate calls to authorities Employees Skilled and capable staff are needed (You can automate some of this process but not all - yet Processes & Procedures You can have all of the above but without the correct procedures they will fall over Investment A large amount of money must be spent before you can earn a penny back If you think of any others please add them in a reply...     What's so 'Super' about that?... These and I am sure other points which I have likely overlooked, all make that first step of implementing an ARC a tough proposal. Given an ever improving core broadband network, with rapidly reducing prices and a growth in 4G wireless IP communication, can we now consider another approach though? ARCs usually build in a certain amount of spare capacity at any given time; this is good practice and is recommended at all times. Could some of this spare capacity be utilised to allow an ARC to operate as a 'Super ARC' by receiving and processing signals on behalf of a client ARC and relaying these processed alarms and signals back to them for handling? Why even go to another ARC? Could suppliers of alarm handling software packages not offer their own hosted 'Super ARC' platform? Maybe signalling providers could operate their own Super ARC to encourage more startups or extend reach? Why would a user choose to go to an ARC outsourcing to a Super ARC? Well, maybe they prefer the personal service offered by the smaller ARC but want the assurance of the capacity of the larger ARC. This could give rise to a stepping stone approach to bringing an ARC online, streamlining costs whilst allowing processes and procedures to be ironed out. The current standards would not lend to such a proposal, however the incoming standards allow a much less restricted approach and this type of centralised cloud based processing of signals is going to become a reality in many industries. Current latency and bandwidth restrictions will simply not exist in the same way in future.   Questions, questions... As usual we can end up with more questions than answers so I would like to ask you all to consider the following: 1. What problems would you foresee with such an approach? 2. Would you use an ARC which outsourced it's platform in this way? 3. Would you want to host services on behalf of a.n.other ARC? 4. What pros and cons do you see with this type of solution? 5. Is more ARCs a good thing or a bad thing? As always, please feel free to discuss, debate or disagree...
  6. Crossing of paths... Alarm Transmission Systems (ATS) are increasingly adding capabilities that would traditionally have been performed by dedicated devices, for example CCTV verification. At the same time Control and Indicating Equipment (CIE, or control panels in plain English) feature built in IP communication functionality and are giving us access to Home Automation integration and more. This type of blurring of what would previously have been clear and distinct roles that equipment played is becoming much more common and is set to extend even further in the future. We are already in a position where individual cameras and detectors of all types can communicate directly with the software at an Alarm Receiving Centre (ARC) without utilising at ATS if they so wished. Installers are being empowered with the ability to not only connect instantly to a remote CIE to analyse a potential fault, but to be in a position to connect directly to a detector or camera or any other component of a system to amend settings, re-enable or even repurpose a generic multi-purpose device to enable the maximum potential protection for clients at all times. This type of convergence leads to some fantastic opportunities and will mean that the next few years will certainly be interesting. It will also however, mean that those whom are writing the standards to which we each adhere, will have to write them without constraints on the form of equipment utilised in some cases. A very tough ask of them when they are trying to give reasonably specific guidance. Confusion or cohesion? Given this merging of functions and the seemingly inevitable move towards every component being addressable where does that leave our suppliers? Will there be a place for specialised equipment if the same function is provided to the same standard in an integrated manner by another supplier? Does this lead to an eventual move away from processing of alarms by dedicated CIE at the protected property to instead provide processing 'in the cloud' at the ARC or any other centralised location? Will instant and thorough control of remote devices by installers lead to a change in business models when attendance is much reduced? Does dedicated equipment improve the structure of the overall system or benefit us in another way? Will ATS suppliers be bypassed or will they 'lead the revolution'? Will we see less competition as a result or more? As always, please feel free to discuss, sharing your thoughts and views on this subject…
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.