SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Build Your Own Surveillance System


    How Free and Open Source Software Can
    Protect You

    Joel Avery
    February 2010
    © 2010 All Rights Reserved
Background

   Like most things, it started small
   Someone was letting their dog use my garden
    as an open pit toilet
   Nearby dog owners all denied responsibility
   Why exactly people let dogs do this in
    someone's flower bed is beyond me as dog can
    pretty go anywhere, including easier to clean
    places like pavement
Catch Them In The Act

   Clearly, I needed irrefutable evidence of the
    dog in action and the owner in inaction
   I'm too young to just hide and wait for it to
    happen
   Even then, it would be good to have (time
    stamped) pictures in case things get ugly
   I needed a surveillance system, but spending
    $1000 on garden defence seemed silly
   And, a fence around the front garden would be
    ugly
Computers Are Meant to Serve Man

   As an IT consultant, it seemed that a computer
    could solve this problem
   Initial investigation showed that I'd still need to
    lay out cash for software if I were to do this in
    Windows
   Attention then turned to an old computer upon
    which I had installed Linux
   Ten minutes of investigation turned up a
    software package that used consecutive
    webcam stills as the basis of motion detection
The Garden System

   The garden monitoring system runs on a white
    box system sold back in the 90s
       AMD K6 processor running at 266 MHz
       256 MB of memory
       2.5 GB of disk space
       1 USB port (no doubt USB 1.0)
       1 100 Mb/s network connection
   Minimal install of Ubuntu 9.10 Linux with an
    NFS client and an SSH server for remote
    access
The Overall System

   The system has spread to other cameras
    monitoring more safety oriented locations such
    as the front door
   All software and captured images are stored on
    a central server on a private wired GE network
    connected to the Internet at 10 Mb/s
   Remote systems capture pictures locally and
    upload them to the central server for review
Configuration

   You can control how many pictures per second
    the system shots and compares
   You can control the tolerance of change and
    mask out frequently changing areas (e.g. a
    road, side walk or wind blown bushes)
   You can control the amount of no activity to
    define boundaries between events
   and much more
   The garden system is shooting at 3 frames per
    second with 15 seconds of no activity defining
    an event boundary
After Installation Extensions

   The pictures are grouped by events
   A couple of summary images from each event
    provide a quick basis of review
   Events with a small number of images are not
    summarized
   Events are rolled up by day and camera
   A central monitoring web site shows an
    interesting image from the last event of each
    camera as well as providing access to streams
    from each camera
Extensions - Continued

   The summary images are uploaded to Flickr!
    for review from remote locations (e.g. while on
    vacation)
   As well, these images are uploaded to the free
    2 GB of online storage that comes with Ubuntu
    (Ubuntu One) since Flickr! has upload limits
   Regular snapshots are also taken and
    uploaded (just to confirm the system is working)
   No sense allowing someone to steal your
    computer which has pictures of them breaking
    into your house
Event Review

   On the local network, the summaries of each
    day's events are reviewed
   If those two images look “interesting”, the entire
    event is reviewed
   The short events are only reviewed looking for
    pictures of wildlife
   Review usually takes less than one minute
    while drinking coffee in the morning
Results

   Even on the ancient computer, the system only
    runs at 10 to 15 percent CPU utilization
   The 256 MB of memory and 2.5 GB of disk are
    ample for Ubuntu in this deployment
   Numerous dog owners have seen pictures of
    their lack of effort at cleaning up
   Lots of other animals like ducks, foxes, and
    turkeys come through the property
For More Information

   Please leave a comment if you would like more
    information or if you would like me to build you
    a similar system (although I will recommend
    more modern hardware)
Copyright Notice

   These slides Copyright in 2010 by Joel Avery
   They are not to be copied or excerpted without
    permission

Weitere ähnliche Inhalte

Ähnlich wie Build Your Own Surveillance System

Ähnlich wie Build Your Own Surveillance System (20)

Anonguide
AnonguideAnonguide
Anonguide
 
Lucidlynxslides
LucidlynxslidesLucidlynxslides
Lucidlynxslides
 
UNIT 2 P8
UNIT 2 P8UNIT 2 P8
UNIT 2 P8
 
System Imager.20051215
System Imager.20051215System Imager.20051215
System Imager.20051215
 
Cs seminar 20071207
Cs seminar 20071207Cs seminar 20071207
Cs seminar 20071207
 
Linux Beginner Guide 2014
Linux Beginner Guide 2014Linux Beginner Guide 2014
Linux Beginner Guide 2014
 
How ubuntu works???
How ubuntu works???How ubuntu works???
How ubuntu works???
 
Ubuntu-Overview
Ubuntu-OverviewUbuntu-Overview
Ubuntu-Overview
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
 
onTune the differences
onTune the differencesonTune the differences
onTune the differences
 
Introduction to Embedded Linux
Introduction to Embedded LinuxIntroduction to Embedded Linux
Introduction to Embedded Linux
 
Ubuntu and Linux Terminal Server Project
Ubuntu and Linux Terminal Server ProjectUbuntu and Linux Terminal Server Project
Ubuntu and Linux Terminal Server Project
 
How to Make a Honeypot Stickier (SSH*)
How to Make a Honeypot Stickier (SSH*)How to Make a Honeypot Stickier (SSH*)
How to Make a Honeypot Stickier (SSH*)
 
Microcontroller mayhem - ECTF & USSS 2011
Microcontroller mayhem - ECTF & USSS 2011Microcontroller mayhem - ECTF & USSS 2011
Microcontroller mayhem - ECTF & USSS 2011
 
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation
 
Hardware pt 2
Hardware pt 2Hardware pt 2
Hardware pt 2
 
Linux
LinuxLinux
Linux
 
.ppt
.ppt.ppt
.ppt
 
LinuxMint Trojan in ISO
LinuxMint Trojan in ISOLinuxMint Trojan in ISO
LinuxMint Trojan in ISO
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 

Kürzlich hochgeladen

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Kürzlich hochgeladen (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Build Your Own Surveillance System

  • 1. Build Your Own Surveillance System How Free and Open Source Software Can Protect You Joel Avery February 2010 © 2010 All Rights Reserved
  • 2. Background  Like most things, it started small  Someone was letting their dog use my garden as an open pit toilet  Nearby dog owners all denied responsibility  Why exactly people let dogs do this in someone's flower bed is beyond me as dog can pretty go anywhere, including easier to clean places like pavement
  • 3. Catch Them In The Act  Clearly, I needed irrefutable evidence of the dog in action and the owner in inaction  I'm too young to just hide and wait for it to happen  Even then, it would be good to have (time stamped) pictures in case things get ugly  I needed a surveillance system, but spending $1000 on garden defence seemed silly  And, a fence around the front garden would be ugly
  • 4. Computers Are Meant to Serve Man  As an IT consultant, it seemed that a computer could solve this problem  Initial investigation showed that I'd still need to lay out cash for software if I were to do this in Windows  Attention then turned to an old computer upon which I had installed Linux  Ten minutes of investigation turned up a software package that used consecutive webcam stills as the basis of motion detection
  • 5. The Garden System  The garden monitoring system runs on a white box system sold back in the 90s  AMD K6 processor running at 266 MHz  256 MB of memory  2.5 GB of disk space  1 USB port (no doubt USB 1.0)  1 100 Mb/s network connection  Minimal install of Ubuntu 9.10 Linux with an NFS client and an SSH server for remote access
  • 6. The Overall System  The system has spread to other cameras monitoring more safety oriented locations such as the front door  All software and captured images are stored on a central server on a private wired GE network connected to the Internet at 10 Mb/s  Remote systems capture pictures locally and upload them to the central server for review
  • 7. Configuration  You can control how many pictures per second the system shots and compares  You can control the tolerance of change and mask out frequently changing areas (e.g. a road, side walk or wind blown bushes)  You can control the amount of no activity to define boundaries between events  and much more  The garden system is shooting at 3 frames per second with 15 seconds of no activity defining an event boundary
  • 8. After Installation Extensions  The pictures are grouped by events  A couple of summary images from each event provide a quick basis of review  Events with a small number of images are not summarized  Events are rolled up by day and camera  A central monitoring web site shows an interesting image from the last event of each camera as well as providing access to streams from each camera
  • 9. Extensions - Continued  The summary images are uploaded to Flickr! for review from remote locations (e.g. while on vacation)  As well, these images are uploaded to the free 2 GB of online storage that comes with Ubuntu (Ubuntu One) since Flickr! has upload limits  Regular snapshots are also taken and uploaded (just to confirm the system is working)  No sense allowing someone to steal your computer which has pictures of them breaking into your house
  • 10. Event Review  On the local network, the summaries of each day's events are reviewed  If those two images look “interesting”, the entire event is reviewed  The short events are only reviewed looking for pictures of wildlife  Review usually takes less than one minute while drinking coffee in the morning
  • 11. Results  Even on the ancient computer, the system only runs at 10 to 15 percent CPU utilization  The 256 MB of memory and 2.5 GB of disk are ample for Ubuntu in this deployment  Numerous dog owners have seen pictures of their lack of effort at cleaning up  Lots of other animals like ducks, foxes, and turkeys come through the property
  • 12. For More Information  Please leave a comment if you would like more information or if you would like me to build you a similar system (although I will recommend more modern hardware)
  • 13. Copyright Notice  These slides Copyright in 2010 by Joel Avery  They are not to be copied or excerpted without permission