← Back to Articles

Pros and cons of having your cameras smashed

While the wide-known «Camover» campaign was an active advocate of vandalizing video security cams, enhanced video analytics will automatically notify you when cameras are tampered withLarge-scale video surveillance systems, ones of corporate level, utilize hundreds, even thousands of cameras. In such conditions it’s hard to keep tabs on whether all cameras are always online, or if the video surveillance system is functioning well.

That’s when automated video analytics of the so-called sabotage detectors come in especially handy – notifying operators and administrators about the threat or a criminal act in progress.

First victims of vandalizing are usually cameras themselves. Criminals try their best not to be filmed (that’s why it’s essential to project their placement right in the first place) and, if that’s hard, tend to eliminate the threat.

Vandalizing or breaking the cameras is the most frequent offenders’ choice. This might not be the cheapest scenario for video surveillance system’s owners, but on the plus side, operators will detect that camera was disabled that very instant, and take urgent measures. However, this is not the case for VSS that run for years and years without human supervision: not only is equipment damaged, valuables stolen, without any evidence of who did it, but also videos of other episodes can go missing before it is detected that the system isn’t working.

Enhanced video analytics in video surveillance systems detect when cameras are being tampered with, criminals vandalizing the guarded property. Another scenario includes more tech-savvy criminals who cut the cords for the cameras, for example, Ethernet wire where the camera stops sending its stream and the image freezes. Camera itself is not vandalized which is a plus, but on the other hand, the last received frame of such “frozen” cameras would hang on the display like it’s all good for a long time, without giving away that the cams have been tampered with, allowing wrongdoers operate from the comfort of a blind spot and then leave the scene unnoticed with their loot.

Best case, from the point of view of video surveillance system’s owners, would be if the camera is turned – simply pointed in another direction, blinded with a flash of light (for example, with car’ headlights) or obscured, for example, with a piece of cloth or a bag. The only damage here is what the criminals will take from the guarded site while the cameras are not watching. Technically, cameras are fine – they are monitoring a site all right, but not the site they should. If there are many cameras to monitor, operators may miss this little change and, consequently, miss the criminal act that was going on right under their nose, just like in a classic spy movie. No records and no evidence to prosecute.

State-of-the-art video surveillance software have embedded video analytics that notify all authorized personnel not only when motion is detected in the field of view of cameras. They will also send alerts about cameras being tampered with – sudden changes in camera’s image (too bright or too dark), angle, lost connection or “freezes”. Moreover, enhanced video analytics systems will even let operators and/or administrators know when the “health” of the whole system is at stake: free disk space or RAM running out, database changes or incorrect server restart is detected. Notifications are available in the form of your choice, from emails to SMS and to a sound alarm.

Sabotage detector in Xeoma

Starting from 15.3.30, Xeoma offers not just edge-cutting on-screen diagnostics but also the “Problems Detector” module. Video analytics behind this sabotage detector provide automatic notifications of the form of choice when camera are being tampered with or when system’s “health” is involved.

Enhanced video analytics, flexible configuration and modular structure help you set up the system to give notifications for certain cameras when you want them. For example, you could send a notification to the system administrator when signal from one camera is lost but when it’s another camera – guarding the safe – trigger an alarm at once. Several types of notifications can be connected to the same camera.

Connect the needed destination modules to the «Problems Detector» to protect camera from vandalizing

Error messages are also shown on-screen. With the right font size you will not miss Xeoma’s warnings:

Sabotage detector will spot when cameras are being tampered with and display corresponding warnings. Other notifications depend on your choice

You can also check availability of network resources (modem, website, etc). Enter the address of a network resource (for example, IP address) and interval of availability check.

To check access to a network resource, enter the address of a network resource and interval of availability check

“Problem Detector” can also save information to a log file:

Thanks to sophisticated video analytics, Xeoma's sabotage detector can also save info about events into the log files - from vandalizing the cameras to disk space running out

The log file is named ProblemsDetector.log. It can be found in the Logs folder in Xeoma’s folder.

16 April 2015