About: Insecurity Camera   Sponge Permalink

An Entity of Type : owl:Thing, within Data Space : dbkwik.webdatacommons.org associated with source dataset(s)

Breaking into a secret installation ought to be the hardest thing in the world - even if you can bamboozle the guards and outfox the dogs there's still the thorny problem of the security cameras. Or there ought to be the thorny problem of the security cameras, but it seems that every high-security base, whether it's run by terrorists, the Government or a Diabolical Mastermind, buys its security cameras from the same crummy factory. See also Camera Spoofing, Weak Turret Gun, Snowy Screen of Death, and Useless Security Camera. Contrast Magical Security Cam. Examples of Insecurity Camera include:

AttributesValues
rdfs:label
  • Insecurity Camera
rdfs:comment
  • Breaking into a secret installation ought to be the hardest thing in the world - even if you can bamboozle the guards and outfox the dogs there's still the thorny problem of the security cameras. Or there ought to be the thorny problem of the security cameras, but it seems that every high-security base, whether it's run by terrorists, the Government or a Diabolical Mastermind, buys its security cameras from the same crummy factory. See also Camera Spoofing, Weak Turret Gun, Snowy Screen of Death, and Useless Security Camera. Contrast Magical Security Cam. Examples of Insecurity Camera include:
dcterms:subject
dbkwik:all-the-tro...iPageUsesTemplate
dbkwik:allthetrope...iPageUsesTemplate
abstract
  • Breaking into a secret installation ought to be the hardest thing in the world - even if you can bamboozle the guards and outfox the dogs there's still the thorny problem of the security cameras. Or there ought to be the thorny problem of the security cameras, but it seems that every high-security base, whether it's run by terrorists, the Government or a Diabolical Mastermind, buys its security cameras from the same crummy factory. As a result, the allegedly hi-tech cameras that can identify an intruder the moment he steps into their field of view can be shot, smashed, hacked or otherwise monkeyed with without any alarm being raised. Is it too much to ask to have a security guy watching the screens? Even if they're unbreakable, the spy can still stand directly underneath them without being seen, because they only have a very limited line of vision and - unlike the security cameras in, say, a shopping mall - are not covered to disguise exactly where the camera is looking. These cameras will often oscillate in a slow and predictable pattern, allowing an intruder time to sneak under them, when it would have made more sense for the camera to remain fixed at one angle. And even failing that, the cameras may take several second before they "focus" on the intruder and sound the alarm, making a sound warning the intruder to run for cover as they do so. However, while the manufacturers might not fit failsafes, they do sometimes load the cameras up with all kinds of pointless technological gimmicks, like lights that change colour to show when the camera isn't working, little klaxons that sound when it sees someone or even a little motor that keeps the camera upright so it can drop down dramatically when shot or turned off. Okay, so most of these help the intruder, but let's see you design security cameras every day and see how long it takes before you start putting in pointless bells and whistles. Literally. See also Camera Spoofing, Weak Turret Gun, Snowy Screen of Death, and Useless Security Camera. Contrast Magical Security Cam. Examples of Insecurity Camera include:
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software