CCTV/IP Surveillancesystem Against Terrorism & Theft
Sign in

CCTV/IP Surveillancesystem against terrorism & Theft

Security Surveillance plays a vital role. Almost all the situations in present days require a complete security & safety plan. Whether a public or private place it is mandatory to plan securities to avoid/eliminate the calamity.

The security plan must be considered depending on the functions & criticality of locations with detailed information of intrusion detection, video assessment, fire detection access control and actions to be taken by surveillance systems depending on the events. As today’s surveillance system is capable enough to react with pre assigned functions when an event occurs.
Vital locations and functions must be monitored using wired and wireless backup communications. Remote connectivity and data backup at the central/remote are the essentials to be considered in situations of present days.

The worldwide increase in terror and theft has become driving force in explosion of CCTV/IP surveillance systems to protect lives and assets.

In recent attacks on TAJ and Oberoi hotels brought about a jump and a complete re-evaluation of the personnel and asset security requirements to safe-guard a facility. To meet this new threat, video security has taken on the lead role in protecting personnel and assets. Today every state-of-the-art security system must include video as a key component to provide the “remote eyes” for security, fire, and safety.

Attacks on TAJ & OBEROI Hotels, has dramatized the importance of reliable communications and remote visualization of images via remote video cameras. Many lives were saved (and lost) as a consequence of the voice, video, alarm, and fire equipment in place and in use at the time of the fateful attack

The availability of operational wired and wireless two-way communication between command and control headquarters and responders (police, fire, emergency) played a crucial role in life and death. The availability (or absence) at command posts of real-time video images at crucial locations in the hotels during the attack and evacuation contributed to the action taken by command personnel during the tragedy. The use (or absence) of wireless transmission from the remote video cameras in the hotels clearly had an impact on the number of survivors and casualties.

If redundant, backup and IP surveillance solutions were present, the police head quarter might given a full control of the situation and helped in evacuation of survivors and reduce in casualties
IT would be a great help for the police/military to take control of the situation if the cameras were running at different locations on wireless backups which could definitely reduced a casualties and helped out the operation to be cleared in a short time.

Cameras with night vision with a power back in association with wi-fi were present then it might be easy to control the scene and track the victims. By monitoring them the police either outside of the hotel can guide commandos to help evacuating victims or even easily trace & attack terrorists.
Nobody knows where and when this type of situations occurs it is mandatory to plan a surveillance system depending upon the importance of locations.

The function and combination of video into safety and security systems has come of mature as a reliable, cost-effective means for assessing and responding to terrorist attacks and other life- threatening situations. Video is an effective means for decrease in crimes and protecting assets and for prosecuting offenders.

Security personnel today have the responsibility for comprehensive security and safety systems in which video often plays the key role. With today’s increase in labor costs and the need for each security officer to provide more functionality, video more than ever before is earning its place as a cost-effective means for improving security and safety while reducing security budgets.

Video offers the greatest potential benefit when integrated with other sensing systems and used to view remote areas. Video provides the “eyes” for many security devices and functions such as:
(1) Motion detectors, Fire sensors smoke detector & alarms,
(2) Watching for presence /absence of personnel in a defined area,
(3) Evacuation of personnel—determining route for evacuation, access (emergency or intruder) to determine response, respond, and monitor response. When combined with fire and smoke detectors, CCTV/IP cameras in inaccessible areas can be used to give advance warning of a fire.
Technologies Which makes difference when integrated properly.
1) The usage of IP Cameras on network: - This would essentially mean that the images captured can be easily shared on net and would aid in remote viewing. Consider the recent attacks on the crucial landmarks of the country’s financial capital. Had the hotels be equipped with the above facilities, many lives could have been saved. The terrorists had ensured that the central monitoring room (CMR) shouldn’t be accessed. To ensure this, they had put smoke canisters/ tear gas shells in the CMR. When our commandos tried for vigilance they couldn’t view anything as the room was badly filled up with the gas. Now, had there been the usage of IP cameras, the commander-in-chief and other operational super commanders sitting at the Police control room could have easily accessed the cameras despite the CMR being filled up with the smoke. That would mean the position of the terrorists and the kind of ammunition they carried. It would also mean evacuation of the innocent hostages from the safest route and saving of a lot of lives of the hostages and commandos.

2) Night Vision devices: - These devices were there with the commandos and with the terrorists or so is it believed so. But, the latest cameras are equipped with this function. So, even though the lights were put off by the miscreants, we still would have been able to see them and would have an update on their location from time to time.

3) GPS: - These new aged technologies have aided in the directions. These devices could have been coupled with the existing Wi-Fi network of the hotel and the video images coupled with it can bring the entire position of the anti-social elements on the hand held devices. Can you imagine what wonders that could have done for our commandos?

4) RFID/Wi-Fi tags: - The new aged tag can be used for giving the identification to the staff and guests. There are memory chips integrated on to them with details such as the codes and the access level where in they are allowed to venture into. So, not just anyone and everyone entering the hotel can go up to 6th floor at Taj where in the VVIP are stationed. Not even by lift. The access criteria can be set via proper software’s with administrative controls only. So, somebody who has just come in to have a coffee at Shamiana could only have entry to café and not to the lobby at the floors, despite sneaking the eyes of the security

Video is the critical link in the overall security of a facility but organizations must develop a complete security planby integrating with the differrent technologies rather than adopt piecemeal protection measures. To optimize use of video technology, the practitioner and end user must understand all of its aspects—from light sources video monitors to intelligent video systems and recorders. The capabilities and limitations of video during daytime and nighttime operation. IP and Networking and communications must also be understood
start_blog_img