SlideShare a Scribd company logo
Build Your Own Surveillance System


    How Free and Open Source Software Can
    Protect You

    Joel Avery
    February 2010
    © 2010 All Rights Reserved
Background

   Like most things, it started small
   Someone was letting their dog use my garden
    as an open pit toilet
   Nearby dog owners all denied responsibility
   Why exactly people let dogs do this in
    someone's flower bed is beyond me as dog can
    pretty go anywhere, including easier to clean
    places like pavement
Catch Them In The Act

   Clearly, I needed irrefutable evidence of the
    dog in action and the owner in inaction
   I'm too young to just hide and wait for it to
    happen
   Even then, it would be good to have (time
    stamped) pictures in case things get ugly
   I needed a surveillance system, but spending
    $1000 on garden defence seemed silly
   And, a fence around the front garden would be
    ugly
Computers Are Meant to Serve Man

   As an IT consultant, it seemed that a computer
    could solve this problem
   Initial investigation showed that I'd still need to
    lay out cash for software if I were to do this in
    Windows
   Attention then turned to an old computer upon
    which I had installed Linux
   Ten minutes of investigation turned up a
    software package that used consecutive
    webcam stills as the basis of motion detection
The Garden System

   The garden monitoring system runs on a white
    box system sold back in the 90s
       AMD K6 processor running at 266 MHz
       256 MB of memory
       2.5 GB of disk space
       1 USB port (no doubt USB 1.0)
       1 100 Mb/s network connection
   Minimal install of Ubuntu 9.10 Linux with an
    NFS client and an SSH server for remote
    access
The Overall System

   The system has spread to other cameras
    monitoring more safety oriented locations such
    as the front door
   All software and captured images are stored on
    a central server on a private wired GE network
    connected to the Internet at 10 Mb/s
   Remote systems capture pictures locally and
    upload them to the central server for review
Configuration

   You can control how many pictures per second
    the system shots and compares
   You can control the tolerance of change and
    mask out frequently changing areas (e.g. a
    road, side walk or wind blown bushes)
   You can control the amount of no activity to
    define boundaries between events
   and much more
   The garden system is shooting at 3 frames per
    second with 15 seconds of no activity defining
    an event boundary
After Installation Extensions

   The pictures are grouped by events
   A couple of summary images from each event
    provide a quick basis of review
   Events with a small number of images are not
    summarized
   Events are rolled up by day and camera
   A central monitoring web site shows an
    interesting image from the last event of each
    camera as well as providing access to streams
    from each camera
Extensions - Continued

   The summary images are uploaded to Flickr!
    for review from remote locations (e.g. while on
    vacation)
   As well, these images are uploaded to the free
    2 GB of online storage that comes with Ubuntu
    (Ubuntu One) since Flickr! has upload limits
   Regular snapshots are also taken and
    uploaded (just to confirm the system is working)
   No sense allowing someone to steal your
    computer which has pictures of them breaking
    into your house
Event Review

   On the local network, the summaries of each
    day's events are reviewed
   If those two images look “interesting”, the entire
    event is reviewed
   The short events are only reviewed looking for
    pictures of wildlife
   Review usually takes less than one minute
    while drinking coffee in the morning
Results

   Even on the ancient computer, the system only
    runs at 10 to 15 percent CPU utilization
   The 256 MB of memory and 2.5 GB of disk are
    ample for Ubuntu in this deployment
   Numerous dog owners have seen pictures of
    their lack of effort at cleaning up
   Lots of other animals like ducks, foxes, and
    turkeys come through the property
For More Information

   Please leave a comment if you would like more
    information or if you would like me to build you
    a similar system (although I will recommend
    more modern hardware)
Copyright Notice

   These slides Copyright in 2010 by Joel Avery
   They are not to be copied or excerpted without
    permission

More Related Content

Similar to Build Your Own Surveillance System

Anonguide
AnonguideAnonguide
Anonguide
Arif Wahyudi
 
Lucidlynxslides
LucidlynxslidesLucidlynxslides
UNIT 2 P8
UNIT 2 P8UNIT 2 P8
UNIT 2 P8
OriginalGSM
 
System Imager.20051215
System Imager.20051215System Imager.20051215
System Imager.20051215
guest95b42b
 
Cs seminar 20071207
Cs seminar 20071207Cs seminar 20071207
Cs seminar 20071207
Todd Deshane
 
Linux Beginner Guide 2014
Linux Beginner Guide 2014Linux Beginner Guide 2014
Linux Beginner Guide 2014
Anthony Le Goff
 
How ubuntu works???
How ubuntu works???How ubuntu works???
How ubuntu works???
Nirma University
 
Ubuntu-Overview
Ubuntu-OverviewUbuntu-Overview
Ubuntu-Overview
Nirma University
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
KunalKewat1
 
onTune the differences
onTune the differencesonTune the differences
onTune the differences
TeemStone Pty Ltd
 
Introduction to Embedded Linux
Introduction to Embedded LinuxIntroduction to Embedded Linux
Introduction to Embedded Linux
Hossain Reja
 
Ubuntu and Linux Terminal Server Project
Ubuntu and Linux Terminal Server ProjectUbuntu and Linux Terminal Server Project
Ubuntu and Linux Terminal Server Project
Sameer Verma
 
How to Make a Honeypot Stickier (SSH*)
How to Make a Honeypot Stickier (SSH*)How to Make a Honeypot Stickier (SSH*)
How to Make a Honeypot Stickier (SSH*)
Jose Hernandez
 
Microcontroller mayhem - ECTF & USSS 2011
Microcontroller mayhem - ECTF & USSS 2011Microcontroller mayhem - ECTF & USSS 2011
Microcontroller mayhem - ECTF & USSS 2011
warezjoe
 
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation
Vipin George
 
Hardware pt 2
Hardware pt 2Hardware pt 2
Hardware pt 2
JoanneFinnigan2
 
Linux
LinuxLinux
Linux
jcklp1
 
.ppt
.ppt.ppt
LinuxMint Trojan in ISO
LinuxMint Trojan in ISOLinuxMint Trojan in ISO
LinuxMint Trojan in ISO
gyflinformciCustomer
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
deaneal
 

Similar to Build Your Own Surveillance System (20)

Anonguide
AnonguideAnonguide
Anonguide
 
Lucidlynxslides
LucidlynxslidesLucidlynxslides
Lucidlynxslides
 
UNIT 2 P8
UNIT 2 P8UNIT 2 P8
UNIT 2 P8
 
System Imager.20051215
System Imager.20051215System Imager.20051215
System Imager.20051215
 
Cs seminar 20071207
Cs seminar 20071207Cs seminar 20071207
Cs seminar 20071207
 
Linux Beginner Guide 2014
Linux Beginner Guide 2014Linux Beginner Guide 2014
Linux Beginner Guide 2014
 
How ubuntu works???
How ubuntu works???How ubuntu works???
How ubuntu works???
 
Ubuntu-Overview
Ubuntu-OverviewUbuntu-Overview
Ubuntu-Overview
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
 
onTune the differences
onTune the differencesonTune the differences
onTune the differences
 
Introduction to Embedded Linux
Introduction to Embedded LinuxIntroduction to Embedded Linux
Introduction to Embedded Linux
 
Ubuntu and Linux Terminal Server Project
Ubuntu and Linux Terminal Server ProjectUbuntu and Linux Terminal Server Project
Ubuntu and Linux Terminal Server Project
 
How to Make a Honeypot Stickier (SSH*)
How to Make a Honeypot Stickier (SSH*)How to Make a Honeypot Stickier (SSH*)
How to Make a Honeypot Stickier (SSH*)
 
Microcontroller mayhem - ECTF & USSS 2011
Microcontroller mayhem - ECTF & USSS 2011Microcontroller mayhem - ECTF & USSS 2011
Microcontroller mayhem - ECTF & USSS 2011
 
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation
 
Hardware pt 2
Hardware pt 2Hardware pt 2
Hardware pt 2
 
Linux
LinuxLinux
Linux
 
.ppt
.ppt.ppt
.ppt
 
LinuxMint Trojan in ISO
LinuxMint Trojan in ISOLinuxMint Trojan in ISO
LinuxMint Trojan in ISO
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 

Recently uploaded

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 

Recently uploaded (20)

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 

Build Your Own Surveillance System

  • 1. Build Your Own Surveillance System How Free and Open Source Software Can Protect You Joel Avery February 2010 © 2010 All Rights Reserved
  • 2. Background  Like most things, it started small  Someone was letting their dog use my garden as an open pit toilet  Nearby dog owners all denied responsibility  Why exactly people let dogs do this in someone's flower bed is beyond me as dog can pretty go anywhere, including easier to clean places like pavement
  • 3. Catch Them In The Act  Clearly, I needed irrefutable evidence of the dog in action and the owner in inaction  I'm too young to just hide and wait for it to happen  Even then, it would be good to have (time stamped) pictures in case things get ugly  I needed a surveillance system, but spending $1000 on garden defence seemed silly  And, a fence around the front garden would be ugly
  • 4. Computers Are Meant to Serve Man  As an IT consultant, it seemed that a computer could solve this problem  Initial investigation showed that I'd still need to lay out cash for software if I were to do this in Windows  Attention then turned to an old computer upon which I had installed Linux  Ten minutes of investigation turned up a software package that used consecutive webcam stills as the basis of motion detection
  • 5. The Garden System  The garden monitoring system runs on a white box system sold back in the 90s  AMD K6 processor running at 266 MHz  256 MB of memory  2.5 GB of disk space  1 USB port (no doubt USB 1.0)  1 100 Mb/s network connection  Minimal install of Ubuntu 9.10 Linux with an NFS client and an SSH server for remote access
  • 6. The Overall System  The system has spread to other cameras monitoring more safety oriented locations such as the front door  All software and captured images are stored on a central server on a private wired GE network connected to the Internet at 10 Mb/s  Remote systems capture pictures locally and upload them to the central server for review
  • 7. Configuration  You can control how many pictures per second the system shots and compares  You can control the tolerance of change and mask out frequently changing areas (e.g. a road, side walk or wind blown bushes)  You can control the amount of no activity to define boundaries between events  and much more  The garden system is shooting at 3 frames per second with 15 seconds of no activity defining an event boundary
  • 8. After Installation Extensions  The pictures are grouped by events  A couple of summary images from each event provide a quick basis of review  Events with a small number of images are not summarized  Events are rolled up by day and camera  A central monitoring web site shows an interesting image from the last event of each camera as well as providing access to streams from each camera
  • 9. Extensions - Continued  The summary images are uploaded to Flickr! for review from remote locations (e.g. while on vacation)  As well, these images are uploaded to the free 2 GB of online storage that comes with Ubuntu (Ubuntu One) since Flickr! has upload limits  Regular snapshots are also taken and uploaded (just to confirm the system is working)  No sense allowing someone to steal your computer which has pictures of them breaking into your house
  • 10. Event Review  On the local network, the summaries of each day's events are reviewed  If those two images look “interesting”, the entire event is reviewed  The short events are only reviewed looking for pictures of wildlife  Review usually takes less than one minute while drinking coffee in the morning
  • 11. Results  Even on the ancient computer, the system only runs at 10 to 15 percent CPU utilization  The 256 MB of memory and 2.5 GB of disk are ample for Ubuntu in this deployment  Numerous dog owners have seen pictures of their lack of effort at cleaning up  Lots of other animals like ducks, foxes, and turkeys come through the property
  • 12. For More Information  Please leave a comment if you would like more information or if you would like me to build you a similar system (although I will recommend more modern hardware)
  • 13. Copyright Notice  These slides Copyright in 2010 by Joel Avery  They are not to be copied or excerpted without permission