Tải bản đầy đủ (.pdf) (673 trang)

cctv surveillance analog and digital video practices and technology

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (19.84 MB, 673 trang )

CCTV Surveillance
This page intentionally left blank
CCTV Surveillance
Analog and Digital Video
Practices and Technology
Second Edition
by Herman Kruegle
AMSTERDAM

BOSTON

HEIDELBERG

LONDON

NEW YORK

OXFORD
PARIS

SAN DIEGO

SAN FRANCISCO

SINGAPORE

SYDNEY

TOKYO
Butterworth–Heinemann is an imprint of Elsevier


Senior Acquisitions Editor: Mark Listewnik
Assistant Editor: Kelly Weaver
Marketing Manager: Christian Nolin
Project Manager: Jeff Freeland
Cover Designer: Eric DeCicco
Compositor: Integra Software Services Pvt. Ltd.
Cover Printer: Phoenix Color Corp.
Text Printer/Binder: The Maple-Vail Book Manufacturing Group
Elsevier Butterworth–Heinemann
30 Corporate Drive, Suite 400, Burlington, MA 01803, USA
Linacre House, Jordan Hill, Oxford OX2 8DP, UK
Copyright © 2007, Elsevier, Inc. All rights reserved.
Exceptions: Copyright for many of the photos is not held by the publisher. Please see the
Photo Credits section, on the next page, for copyright information on these photos.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in
any form or by any means, electronic, mechanical, photocopying, recording, or otherwise,
without the prior written permission of the publisher.
Permissions may be sought directly from Elsevier’s Science & Technology Rights
Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333,
e-mail: You may also complete your request on-line
via the Elsevier homepage (), by selecting “Support & Contact”
then “Copyright and Permission” and then “Obtaining Permissions.”
Recognizing the importance of preserving what has been written, Elsevier prints its books on
acid-free paper whenever possible.
Library of Congress Cataloging-in-Publication Data
Kruegle, Herman.
CCTV surveillance : analog and digital video practices and technology / Herman Kruegle—2nd ed.
p. cm.
ISBN-13: 978-0-7506-7768-4 (casebound :alk. paper)
ISBN-10: 0-7506-7768-6 (casebound :alk. paper) 1. Closed-circuit television—Design and construction.

2. Television in security systems. I. Title.
TK6680.K78 2005
621.389’28—dc22
2005022280
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library.
ISBN-13: 978-0-7506-7768-4
ISBN-10: 0-7506-7768-6
For information on all Butterworth–Heinemann publications
visit our Web site at www.books.elsevier.com
Printed in the United States of America
060708091011 10987654321
Working together to grow
libraries in developing countries
www.elsevier.com | www.bookaid.org | www.sabre.org
Photo Credits
The publisher and author would like to thank the listed manufacturers for the photographs used in the figures.
Accele Electronics 8-9A, 8-9B
Allan Broadband 25-14A
American Dynamics 12-1, 17-1E
Avida 2-7C, 2-7E, 2-7G, 2-7H, 2-16A, 2-16B, 2-17A, 2-17B, 2-17C, 2-17D, 2-17E,
2-17F, 4-18A, 4-27C, 4-27D, 4-27E, 4-30, 4-33A, 4-33B, 4-36, 4-37, 4-38, 4-40,
15-2A, 15-2C, 15-8A, 15-8C, 15-10B, 15-12, 15-15A, 15-15B, 16-7, 18-5A,
18-6A, 18-6B, 18-7, 18-10, 18-11A, 18-11B, 18-14A, 18-14B, 18-20A, 18-23D,
18-24, 19-22A, 19-22B, 21-2A, 21-2B, 21-4A, 21-4B, 21-4C, 22-4A, 22-4C, 22-5,
22-10B, 22-10C, 22-23A, 22-23B, 22-25, 22-26, 22-27
Axis Communications 5-14B, 7-28A, 7-34A, 7-34B, 7-35A, 7-35B
CBC America 15-9A
Canon USA 4-14A
Casio USA 7-36A

Cohu, Inc. 2-10A, 2-10F
Controp USA 17-24
COP-USA 18-19B
Dell Star 6-35A
D-Link 7-36B
Digispec 13-8A
FM Systems 25-13B
Global Solar 23-11A, 23-11C
Gossen 25-15A
Greenlee 25-21A, 25-21B
Gyrozoom 4-14B
Hitachi 2-26D, 17-22A
Honeywell Security 9-12C, 15-2D, 15-7D, 15-10D, 15-13, 22-10B
ICU 13-8C, 13-8D
IFS/GE Security 6-28, 6-30
Ikegami Electronics (U.S.A. Inc.) 2-10C, 4-38, 8-5A
Integral Tech 7-36C
Intellicom 25-22A, 25-22B
International Fiber Systems 6-28, 6-30
Ipix 2-15B
Instrumentation Tech Systems 16-6A, 16-6B
Keithley 25-14B
Leader Instruments 25-1A, 25-2A, 25-2B, 25-2C, 25-6A, 25-10, 25-11
Lowering Systems 14-8C, 14-8D
Mace 15-10C
Mannix 25-15B
Marshall 8-16A
Mitsubishi 2-28A, 10-1
NVT 6-9A, 6-9B
Omniscope 2-15A

Panasonic Security Systems Cover image (bottom), 2-10B, 2-26A, 2-26C, 2-27B, 2-27C, 5-14A, 8-9D, 14-4B,
14-5B, 14-6A, 15-2B, 17-2, 18-20B, 20-4A, 20-4B, 20-5B
Parkut 22-26, 22-27
Pelco 14-5C, 15-7C, 15-14B, 15-17, 17-1A, 17-1C, 17-11B
Pentax 2-7A, 2-14, 4-12A
Radiant 13-8B
Rainbow 4-12B, 4-19, 4-22A, 4-22B
RF-Links 18-25B
Remote Video Surveillance 9-12B
Sanyo Security Products Cover image (middle right), 2-27A, 5-14C, 8-5B, 8-9C, 9-12A, 14-1A, 15-6C,
15-6D, 15-10A, 17-1D
Sagebrush Technology 17-14
Selectronic 8-10A
Semco 6-38C
SOHOware 7-10
Sony Electronics 4-26, 4-31, 5-22, 7-28B, 14-1B, 14-4A, 17-22B
Smarter Systems 23-13
Tektronix 25-1B, 25-1C, 25-6B, 25-13A
Thorlabs 25-17
Trango 6-35B, 6-35C
Uni-Solar Ovonic 23-11B
Vicon 2-26B, 2-30A, 2-30C, 14-3, 14-5A, 14-5D, 14-6B, 15-1A, 15-1B, 15-5, 15-6A,
15-6B, 15-9B, 15-11, 15-14A, 15-14C, 15-19B, 17-1B, 17-10A, 17-11A
Videolarm 2-29E, 14-7A, 14-7B, 14-7C, 14-8A, 14-8B, 15-7A, 15-8B, 15-8D, 15-9C, 15-14D,
15-19A, 17-13, 17-15A, 17-15B, 22-4B
Watec 18-19A, 18-19C
Winsted 20-2A, 20-2B, 20-3A, 20-3B
For Carol
This page intentionally left blank
Contents

Foreword xi
Preface xiii
Acknowledgments xv
Part 1 Chapter 1 Video’s Critical Role in the Security Plan 1
Chapter 2 Video Technology Overview 13
Part 2 Chapter 3 Natural and Artificial Lighting 47
Chapter 4 Lenses and Optics 71
Chapter 5 Cameras—Analog, Digital, and Internet 109
Chapter 6 Analog Video, Voice, and Control Signal Transmission 145
Chapter 7 Digital Transmission—Video, Communications, Control 199
Chapter 8 Analog Monitors and Digital Displays 251
Chapter 9 Analog, Digital Video Recorders 275
Chapter 10 Hard Copy Video Printers 305
Chapter 11 Video Switchers 321
Chapter 12 Quads and Multiplexers 341
Chapter 13 Video Motion Detectors 353
Chapter 14 Dome Cameras 373
Chapter 15 Integrated Cameras, Camera Housings, and Accessories 387
Chapter 16 Electronic Video Image Splitting, Reversal, and Annotation 405
Chapter 17 Camera Pan/Tilt Mechanisms 415
Chapter 18 Covert Video Surveillance 445
Chapter 19 Low-Light-Level Cameras, Thermal Infrared Imagers 469
Chapter 20 Control Room/Console Design 497
Chapter 21 Rapid Deployment Video Systems 507
Chapter 22 Applications and Solutions—Sample Scenarios 513
Chapter 23 System Power Sources 553
Chapter 24 Video-Security Systems Integration 577
Chapter 25 Video System Test Equipment 583
Chapter 26 Video Check List 601
Chapter 27 Education, Standards, Certification 605

Chapter 28 New Video Technology 609
Glossary 615
Bibliography 639
Index 643
ix
This page intentionally left blank
Foreword
A few years ago I had the privilege of addressing a Congres-
sional Subcommittee on Technology and Procurement
Policy, chaired by Congressman Tom Davis. In addition
to examining GSA’s efforts to secure federal buildings,
the Subcommittee was interested in hearing and learn-
ing about new physical security technology. When I leaf
through the pages of this book, I again realize the enor-
mity of the task undertaken by the Subcommittee, the
necessity for doing so, and the importance of this type of
information to not only security professionals, but now to
IT professionals as well.
Closed circuit television (CCTV) and other related video
security and surveillance technology has advanced fur-
ther and faster in the period from 2001 to 2005 than in
any prior comparable time period. IP cameras, mapping,
servers, platforms, LANs, WANs, and VPNs, wireless, dig-
ital migration, algorithms, etc. are all converging along
with other related security system technologies such as
access control, life safety, intrusion alarms, etc. with the
intent to configure fully integrated systems. This is the
new direction for the security industry as digital technol-
ogy has become pervasive across all product lines, opening
the door to more software-oriented control platforms on

the enterprise level.
So who is the better person to chronicle, explain, and
put these terms and technology into perspective than
Herman Kruegle, one of the industry’s foremost experts
on video surveillance and related technologies. I have
had the privilege of knowing and working with Herman
for many years. He is a consummate professional who
has the innate ability to explain the technical aspects of
this emerging technology in a manner we can all under-
stand and put into practice. Herman’s first book, CCTV
Surveillance – Video Practices and Technology, is considered,
by most of us in the industry, to be the bible of CCTV, and
I fully expect this revised edition will rise to even greater
popularity.
In the pages following, readers will find concise and
intelligent descriptions of the analog and digital video
practices and technology we have all grown up with. But
more important, Herman has included, in this revised edi-
tion, his explanation of the newest audio/video informa-
tion technology (AV/IT) developments, products utilizing
the technology and applications for same. Security pro-
fessionals, system integrators, architects and engineers, IT
managers, or end users who are looking for a resource
to help them navigate this complex field of IP Video
Security will not be disappointed. The material is well
researched and thoughtfully laid out to help insure the
reader’s understanding and to hopefully allow them to go
on to designing, installing, and using digital video surveil-
lance to its fullest capacity.
Frank Abram

xi
This page intentionally left blank
Preface
Following the same philosophy contained in the first edi-
tion, the second edition is written for and contains infor-
mation valuable to the end-user as well as the technical
practitioner. Each chapter begins with an overview and
then presents equipment available with their characteris-
tics, features, and application.
The first edition of CCTV Surveillance in 1995 asked
the question “why write a CCTV surveillance book?”. At
that time, analog CCTV had progressed from a vacuum
tube to a solid state technology that provided reliable,
longlife small cameras produced at prices affordable for
most security applications.
A decade later, significant advances have been made in
camera sensors, computers, and digital transmission tech-
nology to warrant a complete review of CCTV’s role in
the security industry. The migration from legacy analog
components to digital technology and the emergence of
the Internet have accelerated the utilization of Internet
protocol (IP) video and remote monitoring in security.
The internet has permitted the widespread interconnec-
tion of other technologies including intrusion and fire and
intrusion alarm systems, access control, and other commu-
nications and control.
The ease of interconnection afforded by digital trans-
mission of video and other pertinent security data any-
where in a facility, local environment or globally, engen-
ders a new meaning to video transmission and remote

viewing.
The explosion of high-capacity magnetic disk, solid
state, and optical data storage memories has permitted
the generation of new products including digital video
recorders (DVR) and data compression algorithms to com-
press and store video images and replace the time-honored
magnetic video cassette recorder (VCR).
In this second edition of CCTV Surveillance, I have
attempted to add these new technologies to the “non-
changing” basic technologies covered in the first edition.
Physics does not change—only the technology and prod-
ucts do.
This new revised edition of CCTV Surveillance includes
the new digital video technology and contains eight new
chapters:
Chapter 7 Digital Transmission, Video,
Communications and Control
Chapter 10 Hard Copy Video Printers
Chapter 12 Quads and Multiplexers
Chapter 14 Dome Cameras
Chapter 20 Control Room/Console Design
Chapter 21 Rapid Deployment Video Systems
Chapter 24 Video-Security Systems Integration
Chapter 25 Video System Test Equipment
Chapter 7—Wired and wireless digital transmission rep-
resents possibly the most significant technology advance-
ment in the video security industry. It makes use of the
Internet and intranets for remote video, data, and audio
communication over existing hard wire communication
links. Chapter 7 includes an analysis of digital wireless

video transmission using the family of 802.11x protocol
spread spectrum technology (SST). Prior to 1995–98 the
Internet was not available for commercial use and remote
video monitoring and control was accomplished primar-
ily over existing telephone lines or expensive satellite
links with limited functionality. Ease of installation, cam-
era addressing, and identification using IP cameras has
opened a new vista in video transmission and remote mon-
itoring.
Chapter 10—This chapter describes the new technolog-
ical advances made in hard-copy printers that improve the
quality and reduce the cost of monochrome and color
video printouts. The advances in ink-jet and laser printer
technologies using inexpensive, large solid state memories
and high resolution linear CCD imagers have been driven
by the consumer and business markets, and have given the
security industry access to low-cost, color, hard copy prints
rivaling photographic resolution and quality.
Chapter 12—While available in 1995, multiplexers have
taken on new importance because of the significant
xiii
xiv Preface
increase in the number of cameras used in a typical secu-
rity installation and their ability to be integrated into DVRs
that were not available five years ago.
Chapter 14—Dome cameras are now everywhere in
security systems. In 1995 they were used primarily in
selected locations: casinos, department stores, supermar-
kets, malls, and in outdoor parking lot applications. The
public at large has accepted their presence almost every-

where. Domes are easy to install and can be small and
aesthetic. Dome cameras are adjustable in pointing direc-
tion (manual or motorized, pan and tilt), and many have
motorized zoom lenses to change the camera field of view
(FOV). The use of small dome cameras has exploded
because of significant cost reduction and sophistication of
pointing and zooming capabilities. Fast pan/tilt camera
modules with remote control via analog or digital commu-
nications over two-wire or wireless communication links
are reasons for their popularity.
Chapter 20—Consoles and Control Rooms have become
more complex and require more design attention for their
successful implementation. This chapter analyzes the con-
sole and security control room with regard to lighting,
monitor locations, operator control placement, and the
other human factors required for guard efficiency and
comfort.
Chapter 21—There has always been a requirement for
a transportable Rapid Deployment Security (RDS) systems
having video and alarm intrusion equipment for protect-
ing personnel and assets. The Post-911 era with real terror
threats has initiated the need for RDS equipment to pro-
tect military, government, business, and other personnel
on travel. The majority of these systems consist of alarm
intrusion and analog or digital video viewing system. These
RDS systems are carried from one location to another and
deployed quickly to set up an alarm perimeter and real-
time video monitoring and recording. Analog or digital
transmission allows local or remote monitoring. After use,
the RDS equipment is disassembled and stored in its carry-

ing case, ready for another deployment. The much smaller
size of the video and alarm equipment has accelerated its
use and acceptance.
Chapter 22—The Video Applications chapter has been
updated and expanded to include digital video applica-
tions including the combination of legacy analog and IP
cameras. One video monitoring application uses on-site
local networks and a second application uses the Inter-
net and IP cameras, signal routers, and servers for remote
site video monitoring. Security applications require com-
plete integration of communication, video, alarm, access
control, and fire to provide monitoring by the local secu-
rity force, and corporate executives at a local or remote
site(s). The integration of these security functions pro-
vides the safety and security necessary to protect personnel
and assets at any facility.
Chapter 25—Installation and maintenance of video
equipment requires the use of video and computer test
equipment. Prior to the widespread use of digital technol-
ogy in security systems, a limited range of test equipment
was used. Now with the many computer interfaces and
Internet protocols and connection to the Internet, more
sophisticated test equipment and some knowledge of soft-
ware and computer programming is necessary. Parameters
to be tested and monitored include: (a) video signal level
and quality; (b) control data signals for pan, tilt, zoom,
focus; and (c) digital signal protocols for multiplexers, IP
cameras, signal routers and servers, DVRs, etc.
Acknowledgments
Over the years I have had opportunities to speak with

many individuals who provided technical insight in video
technology and electro-optics. I particularly appreciate the
discussions with Stanley Dolin and Lee Gallagher, on the
subjects of optics, the physics of lighting, lenses, and opti-
cal sensors. I found very helpful the technical discussions
on cameras with Frank Abram, Sanyo Security Products,
and Victor Houk. I thank Dr. Gerald Herskowitz, Stevens
Institute of Technology for contributing to the fiber-optic
section in Chapter 6 and reviewing other sections on
video transmission. I thank Robert Wimmer and Fredrick
Nilsson for their excellent technical articles in security
journals, company publications, as well as technical sem-
inars on many aspects of video security. Thanks to Char-
lie Pierce for his interest in my book over the years and
enthusiasm and excellence in presenting stimulating edu-
cational video seminars. Eric Kruegle, Avida Inc., con-
tributed his expertise on various aspects of digital video. In
particular I appreciate his help in wired and wireless video
transmission, compression, and encryption in Chapter 7.
Eric was also instrumental in keeping my computer alive,
and I thank him for rescuing me late at night from missing
files and software surprises.
I acknowledge the initial encouragement of Kevin Kopp
and editorial advice of Greg Franklin at Butterworth (now
Elsevier) during the formative stages of the first edition of
CCTV Surveillance in 1995. I thank all staff at Elsevier for
bringing out this second edition successfully: Pam Chester
for her assistance in the formulation of this edition, Mark
Listewnik for his constant encouragement, professional
suggestions, and diligence in bringing this large project

to a successful conclusion, Jeff Freeland for providing the
meticulous final editing and effort in completing this large
endeavor.
I gratefully acknowledge the dedication, patience, and
skill of my wife, Carol, in assisting in the preparation of
this book.
I would like to thank the manufacturers for the use of
the many photographs that illustrate the components used
in video security applications. Each of them contribute to
the education of the security professional and assist the
consultant, systems integrator, and end user in designing
and implementing the best security system possible.
xv
This page intentionally left blank
PART I
Chapter 1
Video’s Critical Role in the Security Plan
CONTENTS
1.1 Protection of Assets
1.1.1 Overview
1.1.2 Background
1.2 The Role of Video in Asset Protection
1.2.1 Video as Part of the Emergency and
Disaster Plan
1.2.1.1 Protecting Life and Minimizing
Injury
1.2.1.2 Reducing Exposure of Physical Assets
and Optimizing Loss Control
1.2.1.3 Restoring Normal Operations
Quickly

1.2.1.4 Documenting an Emergency
1.2.1.5 Emergency Shutdown and
Restoration
1.2.1.6 Testing the Plan
1.2.1.7 Standby Power and Communications
1.2.2 Security Investigations
1.2.3 Safety
1.2.4 The Role of the Guard
1.2.5 Employee Training and Education
1.3 Synergy through Integration
1.3.1 Integrated Functions
1.3.2 System Hardware
1.4 Video’s Role and Its Applications
1.4.1 Video System Solutions
1.4.2 Overt vs. Covert Video
1.4.3 Security Surveillance Applications
1.4.4 Safety Applications
1.4.5 Video Access Control
1.5 The Bottom Line
1.1 PROTECTION OF ASSETS
The protection of personnel and assets is a manage-
ment function. Three key factors governing the planning
of an assets protection program are: (1) an adequate
plan designed to prevent losses from occurring, (2) ade-
quate countermeasures to limit unpreventable losses, and
(3) support of the protection plan by top management.
1.1.1 Overview
Most situations today require a complete safety/security
plan. The plan should contain requirements for intrusion
detection, video assessment, fire detection, access control,

and full two-way communication. Critical functions and
locations must be monitored using wired and wireless
backup communications.
The most significant driving force behind the explosion
in the use of closed-circuit television (CCTV) has been the
worldwide increase in theft and terrorism and the com-
mensurate concern and need to protect personnel and
assets. The terrorist attack on September 11, 2001, brought
about a quantum jump and a complete reevaluation of the
personnel and asset security requirements to safe-guard a
facility. To meet this new threat, video security has taken
on the lead role in protecting personnel and assets. Today
every state-of-the-art security system must include video as
a key component to provide the “remote eyes” for security,
fire, and safety.
The fateful day of September 11, 2001, has dramatized
the importance of reliable communications and remote
visualization of images via remote video cameras. Many
lives were saved (and lost) as a consequence of the voice,
video, alarm, and fire equipment in place and in use at the
time of the fateful attack on the World Trade Center in
New York. The availability of operational wired and wireless
two-way communication between command and control
headquarters and responders (police, fire, emergency)
played a crucial role in life and death. The availability
(or absence) at command posts of real-time video images
1
2 CCTV Surveillance
at crucial locations in the Twin Towers during the attack
and evacuation contributed to the action taken by com-

mand personnel during the tragedy. The use (or absence)
of wireless transmission from the remote video cameras in
the Twin Towers clearly had an impact on the number of
survivors and casualties.
During the 1990s, video components (cameras,
recorders, monitors, etc.) technology matured from the
legacy analog to a digital imaging technology and became
compatible with computers and now forms an essential
part of the security solution. In the late 1990s, digi-
tal cameras were introduced into the consumer market,
thereby significantly reducing price and as a result found
widespread use in the security industry. Simultaneously,
powerful microprocessors, large hard disk computer mem-
ory storage, and random access memory (RAM) became
available from the personal computer/laptop industry,
thereby providing the computing power necessary to con-
trol, view, record, and play back digital CCTV cameras in
the security system.
The home run came with the availability and explosive
acceptance and use of the Internet (and intranet) as a
new means of long distance two-way communication of
voice, data, and most importantly video. For over a decade
the long distance transmission of video was limited to slow
telephone transmission of video images—snap-shots (slow-
scan video). The use of dedicated high speed (expen-
sive) land lines or expensive satellite communications was
limited to government and large-clientele users. Now the
Internet provides near-live (near real-time) video transmis-
sion communications over an inexpensive, easily accessible
worldwide transmission network.

The application and integration of video into safety and
security systems has come of age as a reliable, cost-effective
means for assessing and responding to terrorist attacks
and other life-threatening situations. Video is an effective
means for deterring crimes and protecting assets and for
apprehending and prosecuting offenders.
Security personnel today have the responsibility for mul-
tifaceted security and safety systems in which video often
plays the key role. With today’s increasing labor costs and
the need for each security officer to provide more func-
tionality, video more than ever before is earning its place
as a cost-effective means for improving security and safety
while reducing security budgets.
Loss of assets and time due to theft is a growing can-
cer on our society that eats away at the profits of every
organization or business, be it government, retail, service,
or manufacturing. The size of the organization makes no
difference to the thief. The larger the organization, the
more the theft occurs and the greater the opportunity for
losses. The more valuable the product, the greater the
temptation for a thief to steal it. A properly designed and
applied video system can be an extremely profitable invest-
ment for an institution to cut losses. The prime objective
of the video system should not be the apprehension of
thieves but rather the deterrence of crime through secu-
rity. A successful thief needs privacy—a video system can
deny that privacy.
As a security by-product, video has emerged as an effec-
tive training tool for managers and security personnel.
Every installation/establishment should have a security

plan in place prior to an incident. Video-based training
is easy to implement using the abundance of inexpen-
sive camcorders and playback equipment available and
the commercial video production training video services
available. The use of training videos results in standard-
ized procedures and improved employee efficiency and
productivity.
The public at large has accepted the use of video systems
in most public facilities. Video is being applied to reduce
asset losses and increase corporate profits and bottom
line. Many case histories show that after the installation of
video, shoplifting and employee thefts drop sharply. The
number of thefts cannot be counted exactly but shrinkage
can be measured. It has been shown that video is an effec-
tive psychological deterrent to crime and an effective tool
for criminal prosecution.
Theft is not only the unauthorized removal of valuable
property but also the removal of information, such as com-
puter software, CDs, magnetic tape and disks, optical disks,
microfilm, and hard copy. Video surveillance systems pro-
vide a means for successfully deterringsuchthieveryand/or
detecting or apprehending offenders. The use of video pre-
vents the destruction of property, vandalizing buildings,
defacing elevator interiors, painting graffiti on art objects
and facilities, stealing computers, and demolishing furni-
ture or other valuable equipment. Video offers the greatest
potential benefit when integrated with other sensing sys-
tems and used to view remote areas. Video provides the
“eyes” for many security devices and functions such as:
(1) fire sensors: smoke detector alarms, (2) watching for

presence (or absence) of personnel in an area, (3) evac-
uation of personnel—determining route for evacuation,
access (emergency or intruder) to determine response,
respond, and monitor response. When combined with fire
and smoke detectors, CCTV cameras in inaccessible areas
can be used to give advance warning of a fire.
Video is the critical link in the overall security of a
facility but organizations must develop a complete security
plan rather than adopt piecemeal protection measures.
To optimize use of video technology, the practitioner and
end user must understand all of its aspects—from light
sources to video monitors and recorders. The capabilities
and limitations of video during daytime and nighttime
operation must also be understood.
1.1.2 Background
Throughout history, humans have valued their own life
and the lives of their loved ones above all else. Next
Video’s Critical Role in the Security Plan 3
in value has been their property. Over the centuries
many techniques have been developed to protect prop-
erty against invaders or aggressors threatening to take or
destroy it.
In the past as in the present, manufacturing, industrial,
and government organizations have hired “watchmen” to
protect their facilities. These private security personnel
wearing uniforms and using equipment much like the
police do are hired to prevent crime and bodily harm,
and deter or prevent theft on the premises. The very early
guard companies were Pinkerton’s and Burns. Contract
protection organizations were hired to safeguard their

employees and assets in emergency and personal threat
situations.
A significant increase in guard use came with the start of
World War II. Many guards were employed to secure indus-
trial work sites manufacturing military equipment and
doing classified work, and to guard government facilities.
Private corporations obtained such protection through
contract agencies to guard classified facilities and work.
In the early 1960s, as electronic technology advanced,
alarm systems and video were introduced. Radio Corpo-
ration of America (RCA), Motorola, and General Electric
were the pioneering companies that began manufacturing
vacuum-tube television cameras for the security industry.
The use of video cameras during the 1960s and 1970s grew
rapidly because of increased reliability, lower cost, and
technological improvements in the tube-type camera tech-
nology. In the 1980s growth continued at a more modest
level with further improvements in functions and availabil-
ity of other accessories for video security systems.
The most significant advance in video technology dur-
ing the 1980s was the invention and introduction of the
solid-state video camera. By the early 1990s the solid-state
camera using the charged coupled device (CCD) image
sensor was the choice for new security installations and
was rapidly replacing the tube cameras. In the past, the
camera—in particular, the vidicon tube sensor—was the
critical component in the video system. The camera deter-
mined the overall performance and quality of visual intel-
ligence obtainable from the security system. The vidicon
tube was the weakest link in the system and was sub-

ject to degradation with age and usage. The complexity
and variability of the image tube and its analog electri-
cal nature made it less reliable than the other solid-state
components. Performance varied considerably between
different camera models and camera manufacturers, and
as a function of temperature and age. By contrast, the
solid-state CCD sensor and newer metal oxide semicon-
ductor (MOS) and complimentary MOS (CMOS) sensor
cameras have long life and are stable over all operating
conditions. Another factor in the explosive use of video
in security systems has been the rapid improvement in
equipment capability at affordable prices. This has been
the result of the widespread use of solid-state camcorders
by consumers (lower manufacturing costs), and the avail-
ability of low-cost video cassette recorders (VCRs), digital
video recorders (DVRs), and personal computer (PC)-
based equipment.
The 1990s saw the integration of computer technology
with video security technology. All components were solid
state. Digital video technology needed large-scale digital
memories to manipulate and store video images and the
computer industry had them. To achieve satisfactory video
image transmission and storage, the video signal had to be
“compressed” to transmit it over the existing narrowband
phone line networks. The video-computer industry already
had compression for broadcast, industrial, and govern-
ment requirements. The video industry needed a fast and
low-cost means to transmit the video images to remote
locations and the US government’s Defense Advanced
Research Projects Agency (DARPA) had already devel-

oped the Internet, the predecessor of the World Wide
Web (WWW). The Internet (and intranet) communica-
tions channels and the WWW now provide this extraordi-
nary worldwide ability to transmit and receive video and
audio, and communicate and control data anywhere.
1.2 THE ROLE OF VIDEO IN ASSET PROTECTION
Video provides multiple functions in the overall security
plan. It provides the function of asset protection by moni-
toring location of assets and activity in their location. It is
used to detect unwanted entry into a facility beginning at
a perimeter location and following an unauthorized per-
son throughout a facility. Figure 1-1 shows a typical single
site video system using either legacy analog or digital, or
a combination of both technologies.
In a perimeter protection role, video is used with
intrusion-detection alarm devices as well as video motion
detection to alert the guard at the security console that
an intrusion has occurred. If an intrusion occurs, multi-
ple CCTV cameras located throughout the facility follow
the intruder so that there is a proper response by guard
personnel or designated employees. Management must
determine whether specific guard reaction is required and
what the response will be.
Video monitoring allows the guard to be more effec-
tive, but it also improves security by permitting the camera
scene to be transmitted to other control centers or per-
sonnel. The video image can be documented with a VCR,
DVR, and/or printed out on a hard copy video printer.
The video system for the multiple site application is best
implemented using a combination of analog/digital or an

all-digital solution (Figure 1-2).
Local site installations already using analog video cam-
eras, monitors, etc. can be retained and integrated with
new digital Internet Protocal (IP) cameras, local area net-
works (LANs), intranets, and the Internet to facilitate
remote site video monitoring. The digital transmission
4 CCTV Surveillance
G
SECURITY ROOM
CCTV MONITORS/RECORDERS
AUDIO COMMUNICATIONS
COMMAND AND CONTROL
PERIMETER
PARKING LOT
SURVEILLANCE
LOBBY
SURVEILLANCE
LOADING DOCK
SURVEILLANCE
INTRUDER
PATH
FACILITY
ENTRANCE
FENCE LINE
SURVEILLANCE
PARKING LOT
PERIMETER
FIGURE 1-1 Single site video security system
network provides two-way communications of audio and
controls and excellent video image transmission to remote

sites. The digital signals can be encrypted to prevent
eavesdropping by unauthorized outside personnel. Using
a digital signal backbone allows adding additional cam-
eras to the network or changing their configuration in the
system.
In the relatively short history of CCTV and video there
have been great innovations in the permanent record-
ing of video images. These new technologies have been
brought about by the consumer demand for video cam-
corders, the television broadcast industry, and government
requirements for military and aerospace hardware and
software. One result of these requirements was the devel-
opment of the VCR and DVR. The ability to record video
images provided the video security industry with a new
dimension, i.e. going beyond real-time camera surveil-
lance. The availability of VCR and DVR technology result-
ing from the consumer market has made possible the
excellent time-lapse VCRs and large storage PC-based DVR
systems. These technologies provide permanent documen-
tation of the video images in analog (magnetic tape) and
digital (solid state and hard disk drive) storage media.
The use of time-lapse recorders, computer hard disks and
video printers give management the tools to present hard
evidence for criminal prosecution. This ability to provide
a permanent record of evidence is of prime importance
to personnel responsible for providing security.
Prior to the mid-1990s the CCTV security industry pri-
marily used monochrome solid-state cameras. In the 1990s
the widespread use of color camcorders in the video con-
sumer market accelerated the availability of these reliable,

stable, long-life cameras for the security industry. While
monochrome cameras are still specified in low light level
(LLL) and nighttime security applications, color is now
the norm in most security applications. The increased
sensitivity and resolution of color cameras and the signif-
icant decrease in cost of color cameras have resulted in
their widespread use. Many monochrome cameras being
used for LLL applications are being augmented with active
infrared (IR) illuminators. Also coming into use is a new
generation of passive monochrome thermal IR imaging
cameras that detect the differences in temperature of objects
in the scene, compared to the scene background. These
cameras operate in total darkness. There has also been an
explosion in the use of covert video surveillance through
the use of small, inexpensive color cameras.
The development of smaller solid-state cameras has
resulted in a decrease in the size of ancillary video equip-
ment. Camera lenses, dome cameras, housings, pan/tilt
Video’s Critical Role in the Security Plan 5
SITE 1
ANALOG
CAMERA(S)
DIGITAL IP
CAMERA(S)
SERVER
* COMPRESSED DIGITAL VIDEO
(MJPEG, MPEG-2, MPEG-4).
** SUFFICIENT STORAGE TO SUPPORT ALL
SITES WITH SECURITY AUTHENTICATION.
RAID LEVEL 5 CONTROLLER FOR

EXPANDED STORAGE CAPACITY.
NETWORK**
VIDEO
RECORDER
SITE 2
CAMERA(S)
DIGITAL IP
CAMERA(S)
ANALOG
*
*
KEYBOARD
ALARM INPUT/
OUTPUT DEVICES
ROUTER
DOMES
CAMERAS
MONITORING STATION
ANALOG
CAMERA(S)
DIGITAL IP
CAMERA(S)
SERVER
ROUTER
ROUTER
*
KEYBOARD
KEYBOARD
LOCAL AREA NETWORK (LAN)
WIDE AREA NETWORK (WAN)

WIRELESS (WiFi)
INTERNET
INTRANET
*
SERVER
BNCRJ45
RJ45
BNC
BNC
RJ45
FIGURE 1-2 Multiple site system using analog/digital video
mechanisms, and brackets are smaller in size and weight
resulting in lower costs and providing more aesthetic
installations. The small cameras and lenses satisfy covert
video applications and are easy to conceal.
The potential importance of color in surveillance appli-
cations can be illustrated very clearly: turn off the color
on a television monitor to make it a monochrome scene.
It is obvious how much information is lost when the col-
ors in the scene change to shades of gray. Objects that
were easily identified in the color scene become difficult
to identify in the monochrome scene. It is much easier to
pick out a person with a red shirt in the color image than
in a monochrome image.
The security industry has long recognized the value of
color to enhance personnel and article identification in
video surveillance and access control. One reason why
we can identify subjects more easily in color is that we
are used to seeing color, both in the real world and on
our TV at home. When we see a monochrome scene we

have to make an additional effort to recognize certain
information (besides the actual missing colors) thereby
decreasing the intelligence available. Color provides more
accurate identification of personnel and objects and leads
to a higher degree of apprehension and conviction of
criminals.
1.2.1 Video as Part of the Emergency
and Disaster Plan
Every organization regardless of size should have an emer-
gency and disaster control plan that includes video as a
critical component. Depending on the organization an
anti-terrorist plan should take highest priority. Part of the
plan should be a procedure for succession of personnel
in the event one or more members of top management
are unavailable when disaster strikes. In large organiza-
tions the plan should include the designation of alternate
headquarters if possible, a safe document-storage facility,
and remote (off-site if possible) video operations capabil-
ity. The plan must provide for medical aid and assure the
welfare of all employees in the organization. Using video
as a source of information, there should be a method to
alert employees in the event of a dangerous condition
and a plan to provide for quick police and emergency
response. There should be an emergency shutdown plan
6 CCTV Surveillance
and restoration procedures with designated employees act-
ing as leaders. There should be CCTV cameras stationed
along evacuation routes and instructions for practice tests.
The evacuation plan should be prepared in advance and
tested.

A logical and effective disaster control plan should do
the following:

Define emergencies and disasters that could occur as
they relate to the particular organization.

Establish an organization and specific tasks with person-
nel designated to carry out the plan immediately before,
during, and immediately following a disaster.

Establish a method for utilizing the organization’s
resources, in particular video, to analyze the disaster
situation and bring to bear all available resources.

Recognize a plan to change from normal operations
into and out of the disaster emergency mode as soon as
possible.
Video plays a very important role in any emergency,
disaster and anti-terrorist plan:

Video helps protect human life by enabling security or
safety officials to see remote locations and view first hand
what is happening, where it is happening, what is most
critical, and what areas must be attended to first.

Aids in minimizing personal injury by permitting
“remote eyes” to get to those people who require imme-
diate attention, or to send personnel to the area being
hit hardest to remove them from the area, or to bring
in equipment to protect them.


Video reduces the exposure of physical assets to oncom-
ing disaster, such as fire or flood, and prevents or at
least assesses document removal (of assets) by intruders
or any unauthorized personnel.

Video documents the equipment and assets that were in
place prior to the disaster, recording them on VCR, DVR
or storage on an enterprise network to be compared
to the remaining assets after the disaster has occurred.
It also documents personnel and their activities before,
during, and after an incident.

Probably more so than any other part of a security sys-
tem, video will aid management and the security force
in minimizing any disaster or emergency. It is useful in
restoring an organization to normal operation by deter-
mining that no additional emergencies are in progress
and that procedures and traffic flow are normal in those
restored areas.
1.2.1.1 Protecting Life and Minimizing Injury
Through the intelligence gathered from the video sys-
tem, security and disaster control personnel should move
all personnel to places of safety and shelter. Personnel
assigned to disaster control and remaining in a threatened
area should be protected by using video to monitor their
safety, and the access and egress at these locations. By such
monitoring, advance notice is available to provide a means
of support and assistance for those persons if injured, and
personnel that must be rescued or relieved.

1.2.1.2 Reducing Exposure of Physical Assets
and Optimizing Loss Control
Assets should bestoredor secured properlybefore an emer-
gencysothattheywillbelessvulnerabletotheftorloss.Video
is an important tool for continually monitoring safe areas
during and after a disaster to ensure that the material is not
removed.In anemergencyor disaster,thewell-documented
plan will call for specific personnel to locate highly valued
assets, secure them, and evacuate personnel.
1.2.1.3 Restoring Normal Operations Quickly
After an emergency situation has been brought under
control, security personnel can monitor and maintain the
security of assets and help determine that employees are
safe and have returned to their normal work routine.
1.2.1.4 Documenting an Emergency
For purposes of: (1) future planning, (2) liability and
insurance, and (3) evaluation by management and secu-
rity personnel, video coverage of critical areas and oper-
ations during an emergency is an excellent tool and can
reduce financial losses significantly. Video recordings of
assets lost or stolen or personnel injured or killed can sup-
port a company’s claim that it was not negligent and that
it initiated a prudent emergency and disaster plan prior to
the event. Although video can provide crucial documen-
tation of an event, it should be supplemented with high-
resolution photographs of specific instances or events.
If perimeter fences or walls were destroyed or dam-
aged in a disaster, video can help prevent and document
intrusion or looting by employees, spectators, or other
outsiders.

1.2.1.5 Emergency Shutdown and Restoration
In the overall disaster plan, shutting down equipment
such as machinery, utilities, processes, and so on, must be
considered. If furnaces, gas generators, electrical power
equipment, boilers, high-pressure air or oil systems, chem-
ical equipment, or rapidly rotating machinery could cause
damage if left unattended they should be shut down as
soon as possible. Again, video surveillance can be crucial
to determine if the equipment has been shut down prop-
erly, if personnel must enter the area to do so, or if it must
be shut down by other means.
Video’s Critical Role in the Security Plan 7
1.2.1.6 Testing the Plan
While a good emergency plan is essential, it should not
be tested for the first time in an actual disaster situation.
Deficiencies are always discovered during testing. Also, a
test serves to train the personnel who will carry out the
plan if necessary. Video can help evaluate the plan to
identify shortcomings and show personnel what they did
right and wrong. Through such peer review a practical
and efficient plan can be put in place to minimize losses
to the organization.
1.2.1.7 Standby Power and Communications
During any emergency or disaster, primary power and
communications between locations will probably be dis-
rupted. Therefore, a standby power-generation system
should be provided for emergency monitoring and
response. This standby power comprised of a backup gas-
powered generator or an uninterruptible power supply
with DC batteries to extend backup operation time will

keep emergency lighting, communications, and strategic
video equipment online as needed. Most installations use
a power sensing device that monitors the normal supply
of power at various locations. When the device senses that
power has been lost, the various backup equipments auto-
matically switch to the emergency power source.
A prudent security plan anticipating an emergency will
include a means to power vital, audio, video, and other sen-
sor equipment to ensure its operation during the event.
Since emergency video and audio communications must
be maintained over remote distances, alternative commu-
nication pathways should be supplied in the form of either
auxiliary hard-wired cable (copper wire or fiber optics) or a
wireless (RF, microwave, infrared) transmission system. It is
usually practicaltoprovide abackup pathto onlythe critical
cameras, not all of them. The standby generator supply-
ing power to the video, safety, and emergency equipment
must be sized properly. For equipment that normally oper-
ates on 120 volt AC, inverters are used to convert the low
voltage from the backup DC batteries (typically 12 or 24
volts DC) to the required 120 volts AC (or 230 volts AC).
1.2.2 Security Investigations
Security investigators have used video very successfully with
respect to safeguarding company assets and preventing
theft, negligence, outside intrusion, and so on. By using
small, low-cost, covert CCTV (hidden camera and lens), it
is easy to positively identify a person or to document an
event without being noticed. Better video image quality,
smaller lenses and cameras, wireless video transmission,
and easier installation and removal of such equipment

have led to this high success. Many lenses and cameras that
can be hidden in rooms, hallways, or stationary objects are
available today. Equipment to provide such surveillance is
available for indoor or outdoor locations in bright sunlight
or in no light (IR-illuminated or thermal cameras).
1.2.3 Safety
Closed circuit television equipment is installed not always
for security reasons alone but also for safety purposes as
well. Security personnel can be alerted to unsafe practices
or accidents that require immediate attention. An attentive
guard can use CCTV cameras distributed throughout a
facility in stairwells, loading docks, around machinery, etc.
to observe and immediately document any safety violations
or incidents.
1.2.4 The Role of the Guard
Security guards are employed to protect plant assets and
personnel. Security and corporate management are aware
that guards are only one element of an organization’s
complete security plan. As such, the cost to implement the
guard force and its ability to protect assets and personnel
are analyzed in relation to the costs and roles of other
technological security solutions. In this respect video has
much to contribute: increased security for relatively low
capital investment and low operating cost, as compared
with a guard. Guards using video can increase the security
coverage or protection of a facility. Alternatively, installing
new CCTV equipment enables guards to monitor remote
sites, allowing guard count and security costs to be reduced
significantly.
1.2.5 Employee Training and Education

Video can be used as a powerful training tool. It is used
widely in education and the training of security personnel
because it can demonstrate lessons and examples vividly
to the trainee. In this post-9/11 era, security personnel
should receive professional training by all means including
real video footage. Video is an important tool for the secu-
rity trainer. Example procedures of all types can be shown
conveniently in a short time period, and with instructions
given during the presentation. Videotaped real-life situa-
tions (not simulations or performances) can demonstrate
the consequences of mis-applied procedures and the ben-
efits of proper planning and execution by trained and
knowledgeable personnel.
Every organization can supplement live training with
either professional training videos or actual scenes from
their own video system, demonstrating good and poor
practices as well as proper guard reaction in real cases
of intrusion, unacceptable employee behavior, and so on.
Such internal video systems can also be used in training
8 CCTV Surveillance
exercises: trainees may take part in videotaped simulations,
which are later critiqued by their supervisor. Trainees can
then observe their own actions to find ways to improve
and become more effective. Finally, such internal video
systems are very important tools during rehearsals or tests
of an emergency or disaster plan. After the run-through,
all team members can monitor their own reactions, and
managers or other professionals can critique them.
1.3 SYNERGY THROUGH INTEGRATION
Video equipment is most effective when integrated with

other security hardware and procedures to form a coher-
ent security system. When video is combined with the
other security sensors the total security system is more than
the individual subsystems. Synergy obtains when video
assessment is combined with intrusion and motion alarm
sensors, electronic access control, fire alarms, communi-
cations, and security guard personnel (Figure 1-3).
1.3.1 Integrated Functions
Functionally the integrated security system is designed as
a coordinated combination of equipment, personnel, and
procedures that: (a) uses each component in a way that
enhances the use of every other component and (b) opti-
mally achieves the system’s stated objective.
In designing a security system, each element’s poten-
tial contribution to loss prevention, asset protection, or
personnel safety must be considered. The security plan
must specify as a minimum: (a) where and when unusual
behavior should be detected, (b) what the response should
be, and (c) how it should be reported and recorded. If
the intruder has violated a barrier or fence the intrusion-
detection system should be able to determine that a
person—not an animal, bird, insect, leaf, or other object—
passed through the barrier. Video provides the most pos-
itive means for establishing this information. This breech
in security must then be communicated by some means to
security personnel so that a reaction force has sufficient
information to permit an appropriate response.
In another scenario, if material is being removed by
an unauthorized person in an interior location, a video
surveillance system activated by a video motion detector

(VMD) alarm should alert a guard and transmit the video
information to security personnel for appropriate action.
In both cases a guard force would be dispatched and the
event recorded on a VCR, DVR or network storage and/or
printed as hard copy for guard response, documentation,
and prosecution.
In summary, it is the combination of sensors, commu-
nication channels, monitoring displays, documentation
equipment and a guard force that provides the synergy to
maximize the security function. The integration of video,
intrusion-detection alarms, access control, and security
guards increases the overall security asset protection and
employee safety at a facility.
1.3.2 System Hardware
Since a complete video security system may be assembled
from components manufactured by different companies,
INTEGRATED
SECURITY SYSTEM
ACCESS
CONTROL
• ELECTRONIC
• VIDEO
• BIOMETRIC
ALARMS:
• FIRE
• SAFETY
INTRUSION
DETECTION
VIDEO
SURVEILLANCE

COMMUNICATIONS
SECURITY
PERSONNEL
INTEGRATED SECURITY SYSTEM SYNERGY:
• MAXIMIZE ASSET AND PERSONNEL PROTECTION
• OPTIMIZE RECOVERY PLAN
• PROVIDE DISASTER CONTROL
FIGURE 1-3 Integrated security system

×