When you decide to install home security cameras, where you place your cameras and how you use your footage is important to consider. For maximum protection, it is recommended to monitor common areas as well as possible points of entrance. While home surveillance is not banned, there are a few things to keep in mind to avoid breaking the law.
Home Surveillance Concerns
Within your home, you do have the right to record without informing others, but there are very large exceptions to this rule. First, any area where a “reasonable expectation of privacy” is assumed is off limits. For example, if your home security cameras are monitoring your front yard and possibly the sidewalk and street, your expectation of privacy in these areas is low. On the other hand, bathrooms and bedrooms, where you may be in a state of undress, have a high expectation of privacy, and, thus, are prohibited.
Second, if your cameras enable audio recording, you may want to brush up on wiretapping laws. While these vary slightly from state to state, federal statutes allow audio recording so long as one of the two parties consents. This basically means that you, as the recorder, may know and give consent without informing the other party. However, some states, including California, require dual consent, meaning both parties must be aware and agree to be recorded.
In regards to recording burglars, any trespassers forfeit any expectation of privacy in your home. You may record the person, submit the footage to police, and use your video in court.
For cameras that run non-stop and record audio, you will want to warn any person that is allowed access to your home that these cameras are there and running, otherwise you may run the risk of breaking wiretapping laws. These people include family members, guests/visitors, delivery persons or installers.
The Consent Conundrum
You may now be wondering how you can lawfully gain dual consent. Will verbal consent or a surveillance sticker in the window suffice, or should you have every guest fill out a consent form upon entering? Unfortunately, consent for audio recordings must be given in written form. It is a common misconception that window decals or yard signs are sufficient means to gain consent, as it is expected for visitors to see and recognize them.
However, in a home setting, there may be an exception to the rule. With home cameras, it boils down to what you do, or intend to do, with your recordings. If you don’t do anything with the recording, it is likely that no one will know or care – no harm, no foul.
If you do something with the recording, things change. For example, say a celebrity is a guest in your home and now you have footage of this celebrity hanging out in your home. While selling this footage to a gossip magazine for profit may seem enticing, you will be breaking the law. First, consent was never given from this celebrity. Second, you cannot use a recording for commercial gain without the subject’s consent.
In regards to wiretapping, a possible solution is to simply turn off audio recording if your devices permit. However, why turn off a service that you have paid for? While thieves are usually fairly quiet while they work, using audio recording for eavesdropping may be beneficial (but puts forth yet another ethical dilemma).
Uses For Recordings
Let’s say you record someone in your home plotting a crime, or admitting to committing a crime. Most states allow you to use the recording to prevent a crime or prove that one was committed.
However, if the recording does not involve a crime and you decide to post it on YouTube or a social media site, you could be engaging in illegal activity. Using a recording for exploitive or commercial purposes (as in the previous celebrity example) may be misappropriation if not all parties consent. As a reminder, laws vary from state to state so please look into your own state’s laws.
Also, even within your own home, recording with the intention of blackmail is illegal.
Law enforcement has the right to ask for your home surveillance if they suspect illegal activity, and a warrant will likely be necessary. However, since most recordings are stored in the cloud, they may be able to go straight to the provider and obtain the footage, bypassing your permission to access.
What Should You Do?
To err on the side of caution, be sure that everyone entering your home is aware that the cameras are there, and avoid placing them in areas where privacy is expected. If you wish to withhold the information, so long as you do not do anything with the footage, you should be fine.
However, there are other reasons to be careful with the privacy of your security cameras. While you may not have the intention to do bad things, hackers may be able to access your cameras and broadcast your feed. To protect yourself and your guests, it is advised to take reasonable security precautions (ex. strong passwords, maintain security Wi-Fi network), and take the ethical high road when using new technology.
Have any other tips or experiences to share? Connect with us on Facebook, Google+, Twitter, LinkedIn, and Pinterest.
Choose from our quality security cameras and surveillance equipment to protect your home or business. Shop our stock online or call 1-888-203-6294 today!
To better understand the current surveillance industry, you should know a little history. Without going into great detail, here are some important milestones of the video surveillance industry from the past decade.
Ten years ago, SD analog cameras and DVRs reigned supreme. While video management software and IP cameras were available, they had yet to become a mainstream solution.
Also around this time, some megapixel cameras were offered. They only supported MJPEG encoding (which made storage and transmission of these more expensive), but they boasted better quality than analog cameras.
And still in the early stages, but a topic of interest, were analytics, which had limited deployment during this time.
Around 2008-2012, IP cameras got a boost from the adoption of H.264 for megapixel cameras. Because IP camera usage was up, VMS software followed suit. The benefits of this upgrade were clear, making it easier for consumers to understand and accept the price increase.
As megapixel and IP cameras grew in popularity, interest in connecting cameras to the cloud was rising. While the dream was to eliminate any on-site recording and maintenance, bandwidth limitations and poor cloud VMS killed the dream.
In 2011, video analytics remained off the radar thanks to performance problems, unhappy customers, and ObjectVideo suing the industry. Even today, analytics are still slowly crawling out of the hole.
In the next few years, edge storage promised the elimination of NVRs and recorder appliances since the storage and software would be housed within the IP camera. Unfortunately, reliability issues deterred early adopters, and the introduction of inexpensive recorder appliances pushed edge storage to the back burner. Rather than becoming a main solution, edge storage was more commonly employed to provide redundancy for higher-end applications.
WDR & Low Light Conditions
Over time, surveillance camera technology has improved to better accommodate low light environments. Before, WDR (wide dynamic range) cameras, which automatically adjusted to harsh lighting conditions, were expensive and limited in availability. Low light performance was generally poor, and even worse in MP cameras (WDR in these were relatively non-existent). Today, the enhancements in quality are evident.
Smart CODECs
Smart CODECs dynamically adapt compression and I frame interval to scene conditions, which ultimately reduces bandwidth requirements and offsets the need to move to H.265. Within recent years, we have seen a rise in this technology. Moving forward, broad support of Smart CODECs will eventually drive down storage costs and remote network challenges.
HD Analog
For more than a decade, IP was the only practical way to deliver MP/HD, however the introduction of HD Analog has successfully killed off SD analog. HD analog uses coaxial cable for transmissions and has dominated sales for homes and small businesses. Some argue that it is just a temporary fix, while others say it will expand features and options to become a mainstay.
Cybersecurity
Cybersecurity has only recently become a major topic in video surveillance, however, many still brush it off. Though recent events have spurred concerns (ex. Sony hacking, Hikvision hacks, Axis’ major exploit), most users perceive a low risk of cybersecurity. As our systems become more connected, we can only hope that cybersecurity is better addressed and taken seriously among manufacturers and consumers alike.
Chinese Manufacturers
Chinese manufacturers have grown as contenders, with their earlier deployments showing poor quality and performance. However, over time, their products have improved and yet still maintain relatively low pricing. These manufacturers were originally OEM suppliers to Western brands, but recent years have shown their branded sales increase in the West.
Drive Down Costs
It seems manufacturers are in a current race to offer the lowest prices (whether to gain share or stay afloat) and consumers seem to be driving this shift. With numerous DIY and simple home solutions, we will see where the video surveillance industry is headed next.
What are your predictions for the future of video surveillance? Share your thoughts with us on Facebook, Google+, Twitter, LinkedIn, and Pinterest.
To shop our selection of security camera equipment and packages, please visit SecurityCamExpert.com. For questions about our products and installation services, or to schedule a free* site survey, please call 1-888-203-6294.
Businesses often turn to video surveillance to enhance security. In recent years, it has become a more feasible option for small businesses to employ cloud-based video surveillance due to lower costs and easy maintenance.
While some swear by the cloud, others are hesitant and worry about its security. If you are considering moving your video surveillance management to the cloud, you should get a better understanding of how it will work and how you can ensure that your data stays safe. Take these measures to ensure that your cloud-based video surveillance is as secure as it can get.
Is Your Hardware Secure?
Before you even think about cloud security, you must make sure that the equipment you have is free from security vulnerabilities. Do your homework and research different vendors’ reputation and history. Once you find a vendor you trust, make sure that your equipment is up-to-date with the proper software installed and in use. Maintain security by keeping your firmware current and using strong passwords. If your vendor has any other recommended best practices, be sure to follow them.
Vendor-Defined Cloud
Because the definition of “cloud” can vary from vendor to vendor, make sure you know exactly what your vendor is offering. When it comes to cloud service for video surveillance, you should be provided with camera management and data storage in the cloud. Your media infrastructure and value-added services should be managed in the cloud as well. Beware of vendors who advertise a cloud service, but really only offer remote access to a local device. This can be beneficial, but is limited in comparison to real cloud services.
Learn More About The Cloud & Data Center
If your cloud provider’s solutions are rooted on well-known cloud servers such as Amazon, Microsoft, or Google, you can rest assured that their general security is adequate. However, if they are using their own proprietary data center, you may want to proceed with caution. While there are secure clouds out there, you don’t know for sure how secure theirs is.
It is much easier to track a well-known cloud provider’s track record. For example, the Amazon AWS data center is supporting some of the largest internet services in the world. Their data storage environment is designed to limit the loss of data objects and is set for “encrypted at rest” which means it is stored encrypted in the cloud.
Camera To Cloud Connection
You should always understand how your system works. When it comes to your cloud-based video surveillance, you should know how your camera connects to the cloud. There are three different types of connections:
When it comes to your cloud solution, we will deal with the first two options only. If you prefer no network configuration required, your available options will be limited, but viable. Some vendors offer a solution to configure your cloud cameras with no network configuration, while others have built-in direct connections for your camera to the cloud.
Beyond that, any other cloud solution is likely a P2P solution, which tends to be less reliable than other options, so be sure to research your camera and cloud vendors.
The other option is to configure your own network to permit access to your own device from the internet. This is technically called “port forwarding” and, if done correctly, can be completely legitimate and safe way to configure your cameras. If you choose this route, here are some tips to boost security.
Implement these measures and work with your network or IT person and you have an adequate way to configure your cloud video surveillance system. You will avoid any black box P2P connections while opening up a huge list of cameras you can use for cloud surveillance.
Cloud To User Connection
Now that everything is in order, find out how the cloud makes your data available to you through its web or mobile apps. All your data and video is under their control, therefore the traffic from the cloud to your web browser or mobile app should be strongly authenticated with username and password and encrypted in transit using TLS, including standard web traffic and video streams.
While other limitations may occur (ex. bandwidth capacity), security concerns should not hold you back from cloud-based video surveillance. As evidenced, there are smart ways to keep your cloud video surveillance safe and secure. If done correctly, cloud-based video surveillance can offer a better solution than local storage solutions.
Does your business employ cloud-based surveillance? Share any tips or advice with us and your peers on Facebook, Google+, Twitter, LinkedIn, and Pinterest.
For a wide range of network IP security cameras, CCTV surveillance packages, and more, please visit SecurityCamExpert.com. If you have any questions and would like to speak to a representative, please call 1-888-203-6294.
Despite how it may be depicted on television or movie screens, reviewing surveillance footage to find evidence is a lengthy process. Sifting through hours, sometimes days, of footage is costly, time consuming, and, when done by humans, is rarely effective. Luckily, advanced technologies can save the day.
Originally, CCTV video footage was used to monitor retail stores or businesses to prevent theft, damage, or employee misconduct, and provide evidence if something were to happen. If nothing occurred, the storage would be overwritten because space was limited and the footage proved useless.
These days, storage capacity has increased and new data processing techniques make this footage extremely useful. The accessibility of recording devices with advanced features is changing the value of videos. And thanks to machine learning and video analytics, surveillance footage can be sorted and evaluated in a timely manner.
Video Analytics
Rather than wasting time and resources having humans evaluate footage, video analytics can take care of it. Video analytics is the process of extracting pertinent information from video footage. It basically works like image analytics, but goes a step further.
Image analytics can look at a still image to find patterns, anomalies, and identify faces. Video analytics can do the same, plus measure and track behaviors. Because of this, video analytics has a promising future within different industries.
The Use Of Video Analytics
Because this technology is great for identification, behavior analysis, and situational awareness, various businesses and industries can benefit greatly. Video analytics allows business owners to evaluate who visits their stores, identify peak hours, analyze customer behavior, and more. This gives businesses insight into how they can improve customer service and which deals or displays attract more customers. These types of insights can also benefit the marketing departments, as they can better understand customer demographic and tailor ads to those groups.
Video analytics can even be applied for security and law enforcement. Since body cameras for police are becoming widely adopted, these produce lots of video footage. Video analytics could make the recordings useful by adding rich tagging and indexing, making it easier to search through footage. Parsing through certain time periods and identifying persons with specific characteristics can help to develop leads and even recognize and predict different patterns.
For airports, stadiums and other major event and transportation venues, video analytics can evaluate footage and help to relieve congestion and lines. By monitoring these venues, more workers can be deployed to decrease wait times and improve customer service.
Video-Based Predictive Analytics
While still in the early stages, a new algorithm, as reported by MIT, allows a computer to predict human actions and interactions based on behaviors seconds before the action. The outlook for this algorithm is promising. As it develops, computers could eventually be taught to predict when a crime or injury may take place.
And as artificial intelligence (AI) and robotics become more feasible in our everyday lives, this type of machine learning and predictive analytics will be necessary for robots to interact with humans naturally.
An excellent example of these video analytics in action is Veenome for marketing. Its YouTube analytics tool helps advertisers choose which videos are better suited for them to display ads. Another example is Prozone for sports analytics. By analyzing video footage of the field, players’ stats can be recorded and more effective plays can be planned and executed.
These video-based predictive analytics can also help with decision-making in industries such as aviation, air traffic control, ship navigation, power plant operation, and emergency services. Accidents and crimes can be prevented, thus, potentially saving lives.
Video Gray Area
Of course, as it goes with all surveillance, privacy concerns arise. Currently, analytics where data collection does not require consent is still a gray area. Until laws are in place to protect the public as well as businesses, companies should consider employing video analytics ethically, with respect and privacy to the data and its consumers alike.
Want to share your thoughts on video analytics and its application in the real world? Connect with us on Facebook, Google+, Twitter, LinkedIn, and Pinterest.
To find an excellent array of quality security cameras and surveillance equipment at affordable prices, please visit SecurityCamExpert.com. If you have any questions or want to learn more about our services and equipment, please call 1-888-203-6294.
While different types of biometric technology (ex. iris scanners, facial recognition) have been in the news, talk of artificial intelligence (AI), namely scene recognition, has mostly evaded the spotlight. If you are not familiar with scene recognition, it is basically a form of artificial intelligence that allows a device to categorize the features and objects in a photo or video much like our brains would. The process is comparable to the way Google Now or Siri comprehend voice commands, but with visual content instead.
To put the complexity of scene recognition technology into perspective, think about the many ways we can pronounce words and still be understood by a person or device. These possibilities seem minimal in comparison to the different shapes and positions a cat can assume and still be recognized as a cat, for example. This is just one of the many reasons why creating a scene recognition algorithm has been a long time coming. However, we are getting closer to its inception.
The first hints at this come in the form of the Nest Aware feature of the Nest Outdoor Camera. This feature can distinguish between humans and other things, such as a deer or butterfly or other natural phenomena, which may cause movement in a scene. This shows that cameras have the potential to sort useless parts of surveillance footage.
Security cameras with scene recognition could be very beneficial in different settings and scenarios. For example, scene recognition cameras could identify if a robber has entered your home, or, if you are keeping an eye on an elderly loved one remotely, you could be alerted if he or she has fallen. Because this technology takes motion detection much further, it can change the security and surveillance camera industry for the better.
Until scene recognition is more developed and refined, we likely won’t be hearing too much about it. Also, for those wary about surveillance already, having AI within the home may not be as comforting as it may be to others.
What are your thoughts on scene recognition? Would you employ a security camera with scene recognition? Share your thoughts with us on Facebook, Google+, Twitter, LinkedIn, and Pinterest!
Shop our selection of affordable security cameras, CCTV surveillance packages, and more at SecurityCamExpert.com. Call 1-888-203-6294 to inquire about site surveys and installations services.
Installing a surveillance system in your home or business can provide you with a sense of security. However, if you do not properly secure your system, cyber criminals can gain access to your video feeds.
Aside from an unnerving invasion of privacy, unauthorized access to your surveillance video can help criminals study the area, identify where important property is located, figure out traffic patterns, sabotage systems, deny access to feeds, and much more.
Because IP security camera systems connect to LAN networks, extra precautions are necessary to safeguard your system from attacks. Breaches are usually due to human error, negligence, and misconfigurations, and can often be prevented. The following are common vulnerabilities and ways to protect your surveillance system.
Weak Passwords
Default usernames and passwords are common with most IP based security cameras. They are used to set up your system and accounts for remote access. Too often, people fail to change these passwords, or choose simple passwords, making it easy for strangers to access feeds.
Be sure to set strong passwords, use good password management or user certificates in lieu of passwords. You may want to consider changing your password periodically as well.
Poor Deployment
Avoid enabling unused services as it can leave your system vulnerable to attacks. For example, cyber criminals could install malicious applications and scripts using file transfer protocol (FTP) or an app platform from an untrusted developer.
Minimize your risk by disabling any unused services and installing only trusted apps.
Unclear Roles
Sometimes organizations fail to define who has access to different aspects of the surveillance system, possibly leading to confusion and employees with unnecessary access. For example, it may be unclear as to who is responsible for reviewing security measures to ensure proper protocol is being followed.
For IT departments, it is recommended to only allow users access to the resources they need to perform their job.
Software Bugs
Bugs and flaws in software codes can put your devices at risk. Luckily, you can do your part to prevent this.
Always keep your cameras, equipment, and software up-to-date with the latest firmware to ensure that bugs will not pose a threat. Vendors often post public common vulnerabilities and exposure reports which provide solutions for users.
Physical Installation Problems
Whether it is your cameras, wiring, or other infrastructure, poor installation can leave your system at risk.
Cameras should be installed out of reach to avoid any possible tampering or vandalism, but at a proper angle to view people and objects clearly.
Poor Physical Protection Of Equipment (Cabling, Servers, Gear)
If your cabling, server, or other surveillance equipment is not properly protected, your system is at risk for poor, intermittent performance. A small kink or damage to a cable can interfere with signal, causing disruption in your feed or even power failure.
Appropriate housing to protect your equipment from severe weather or extreme heat is available and is recommended for use if you are in an area susceptible to these conditions.
Poor Maintenance
Routine maintenance is ever important to ensure that your system is and will continue to function properly.
A preventative maintenance program should include a checklist of issues to look for in order to avoid small issues that can turn into big problems (ex. damaged/loose cameras and equipment, exposed, loose, or damaged cabling, dirt/moisture on camera lenses). This will allow the owner to become accustomed to the system and more aware when something seems different or wrong (ex. possible signs of tampering).
Flaws In Standard Network Protocols
Most network surveillance systems use standard network protocols (ex. FTP, TCP/IP), however, weaknesses or flaws in these protocols can expose surveillance data to attacks.
For video streams sent over the network, the latest advanced encryption methods should be used.
Failure To Align Hardware/Software On The Network With IT Policy
If your hardware or software does not meet your IT organization’s network security policy, there will be security issues. For example, third-party software or apps are often poorly supported or lack security patches which make them vulnerable to security breaches. Thus, your IT department will not be happy.
Enforcing a strong IT policy is imperative for any business.
How do you protect your surveillance system from cyber and physical attacks? Share your best tips with your peers on Facebook, Google+, Twitter, LinkedIn, and Pinterest!
Find a great selection of security cameras including IP surveillance cameras, CCTV security camera packages, and more at SecurityCamExpert.com. For more information, please call 1-888-203-6294.
Facial recognition and biometric technology is being applied more often in different environments. For example, Facebook makes it easier for you to tag your friends in photos by using facial recognition technology. Some smartphones even allow you to use a fingerprint password to unlock your phone. Aside from these examples, facial recognition technology is also being used within some law enforcement agencies.
San Diego Law Enforcement has been using facial recognition technology since 2013, when it began as a research and development project funded by the National Institute of Justice. The Tactical Identification System (TACIDS) was comprised of 134 devices distributed among 67 certified law enforcement personnel. Today, it’s up to 433 devices among 991 personnel.
These devices are usually tablets or smartphones that have access to the Automated Regional Justice Information System (ARJIS) App. If an officer feels that an individual is being dishonest about his identity, or if the officer would like to determine whether or not the individual is a threat, he or she would use the device to take a photo. This photo is then sent to ARJIS’ Facial Recognition Platform (FRP) via text. The FRP produces a lineup of possible matches based on a biometric algorithm and sends it to the officer. The officer reviews the lineup, selects a match, and resubmits it to the ARJIS web server to pull the individual’s records. This process normally takes days, but can be accessed within minutes thanks to this advanced system.
Concerns have been raised by citizens, mainly focused on consent for photos and privacy issues. However, if any officer suspects an individual of being involved in a crime, he does not need to ask for consent. Also, the San Diego Association of Governments (SANDAG) assures that the photos that are submitted to the ARJIS FRP are not stored anywhere. Any of the photos taken on the devices must be deleted, whether or not a match was found. Furthermore, the photos are only compared to the sheriff’s department booking database, so if a person has not been booked at a county jail, then a match will not be found. SANDAG confirmed that ARJIS only has access to images of individuals arrested in San Diego County.
While this technology is mainly used by the San Diego Police Department, every law enforcement agency in San Diego has access to it. This includes the San Diego Unified School District, San Diego State University, and UC San Diego.
The main purpose of this tool is to improve policing techniques while better serving and protecting the people. What are your thoughts on the use of this technology by law enforcement? Share with us on Facebook, Google+, and Twitter. You can also connect with us on Vine and Pinterest.
Shop our selection of CCTV surveillance equipment and security cameras online or call 1-888-203-6294 to speak with us directly.
More and more people are turning to security systems to protect their homes. This is a smart decision, as security cameras will help you feel at ease whether you are in your home or on vacation. Unfortunately, when shopping for a security system, you may find that there are companies that seem genuine, but do not have the customer’s best interest at heart.
If you are thinking of investing in a home security system, here are some helpful tips to make sure you get the best deal on what you are looking for.
Consider your budget and what features are absolutely necessary and which you could live without. Credible businesses will work with you to build a home security system to suit your wants, needs and budget. You can ask for input or recommendations from friends, family, or even your home or renters insurance carrier.
Contact at least three companies before making a decision. This way you can compare prices and service, and ask important questions (ex. proper licensing, background checks for employees). This will also give you time to check reviews or do additional research before committing to a company.
If you have a budget, see what companies can offer for that price. Or you can compare prices from different businesses on a similar system. When getting quotes and prices, be sure ask about any other fees that may apply, for example, monthly monitoring fees or installation charges. It is also wise to consult with your insurance agent since home security systems may qualify you for a discount on homeowner’s premiums.
As with any contract, be sure that you fully understand it before signing. Know how long it will last, what it covers, terminations fees, etc. If your system is going to be monitored, those contracts typically last 2-5 years. Before you sign on to a long term contract, be sure to ask the major, important questions. For example, what happens if you are dissatisfied with the services provided? Is it possible to cancel the contract? As the consumer, what are your rights if the company is acquired by another company?
When shopping around, keep an eye out for these red flags:
Often times, trustworthy companies will give you time to think through the deal and make your decision. But if a seller is trying to pressure you into going with their company, don’t give in until you have done the proper research.
While some companies offer competitive prices, others may offer unbelievable deals that seem too good to be true. Most of the time, they are. In this case, “you get what you pay for” rings true. Whether it is defective equipment or a poor installation job, this is something to keep in mind when making your final decision.
If you cannot get a positive identification for your salesperson or the company, you may want to question using their services. Also, beware of sellers with no ties to their community. This could mean they might pull a disappearing act after mediocre services have been rendered and payments have been made.
It is always wise to check with the Better Business Bureau for any complaints or reviews about the company. If there have been complaints, you can see how the company handled the situation, giving you a better idea of the customer service you can expect.
Do you have any other shopping tips? Share them with us on Facebook, Google+, and Twitter. You can also find us on Pinterest and Vine.
Visit SecurityCamExpert.com to browse great deals on our quality stock of security cameras, CCTV surveillance packages, and more. Call 1-888-203-6294 to learn more about our equipment and services.
Drones, or unmanned aerial vehicles (UAV), are aircrafts without human pilots on board. They can be preprogrammed or piloted remotely. Their use spans from surveillance to search and rescue to firefighting to recreation. Before you purchase a drone, there are a few things you need to know.
Drones are made in three grades: Consumer Grade, Prosumer Grade, and Commercial Grade.
Consumer Grade Drones
These are best for beginners, as you can get a quad copter, possibly with a camera and micro SD card, for under $300. These are smaller than average, with a range of about 100 ft plus 10 minute flying time. These are great for practice and, until you have really mastered flying it, you can expect to crash more than once. You will find that you must do extra work for tasks that could be automated.
Prosumer Grade
These drones are in the $300-$1,500 price range, and you can tell the difference. With these, you will find longer lasting batteries, farther range, computer automation to stabilize them in the air, built-in HD cameras with increased storage space, plus improved controllers. The controllers may have built-in video or have the ability to sync with your devices.
Drones with GPS fall within this grade and can offer excellent and practical benefits. If you adventurous or active, you may want to record your excursions. These drones can follow you when you partake in things like water skiing or snowboarding. They can even sense a low battery and will automatically bring the drone back down for a safe landing. Another added bonus: these drones will prevent you from flying within 5 miles of an airport, thus keeping you out of trouble for the most part.
Commercial Grade
These are the truly specialized kind of drones. For example, these are the ones that will herd sheep, deliver your pizza, or even guide a lost student around campus. You may have seen them, or viewed an exceptional aerial view when watching your favorite football team. Commercial drones are gaining popularity in Hollywood as well. While they are used for filming, the paparazzi have also used them in an attempt to get exclusive shots of the stars.
Accessories
You will want to invest in accessories to keep your drone safe. If your drone doesn’t come with a case, you can find cases on the market that are great for travelling (think backpack or suitcase types) and even cases with molded foam for increased protection. Extra batteries and extra blades are good to have on hand just in case.
Registration
The FAA (Federal Aviation Administration) is now requiring drones to be registered (thanks to some people who flew them where they shouldn’t have). Luckily, a $5 fee is good for 3 years, and covers all your drones, if you have more than one.
Do you own a drone or have you toyed with one before? Would you invest in your own? Share your thoughts with us on Facebook, Google+, Twitter, and Pinterest. You can also find us on Vine.
Shop our selection of CCTV surveillance equipment and security cameras online at SecurityCamExpert.com or give us a call at 1-888-203-6294.
Drones can be very beneficial when it comes to surveillance. Also known as unmanned aerial vehicles, drones provide benefits such as decreased risks, relatively lower costs, the ability to house advanced technologies, and more.
Because of this, Transport Canada is looking to employ a drone to patrol the Canadian Arctic. They are looking to enhance their efforts in monitoring things such as ice and oil spills. Currently, three manned airplanes are handling the job – one over each the Atlantic and the Pacific, and the third based in Ottawa for the Arctic.
With manned aircraft, the need for a qualified pilot on board can limit flight times, and some areas are simply too difficult and dangerous for the pilot to access.
Drones, however, are compact, can last longer, and can also reach more difficult areas. Without having to wait for skilled personnel, drones are flexible when it comes to flight and coverage times. They can also be modified with the appropriate technologies and devices for more comprehensive and effective surveillance.
The ideal drone would possess sensors, ground control equipment, and satellite communications, along with maintenance support including spare parts. The drone would need the capabilities to identify and track oil slicks, icebergs, whales, and foreign fishing vessels, to name a few. The necessary range would be at least 6,500km, and it would need to be able to track its target for at least six hours.
A likely candidate would be the Northrop Grumman Global Hawk, valued at about $300 million per new aircraft. The U.S. military already actively uses these Global Hawks.
We have yet to see if Transport Canada’s wishes come to fruition. Do you think drones would be a more efficient way to patrol the seas? Share your thoughts with us on Facebook, Google+, Twitter, or Pinterest. You can also find us on Vine.
Visit SecurityCamExpert.com to browse our stock of security cameras, CCTV surveillance equipment, and more. Call 1-888-203-6294 to inquire about our products or installations services.