Critical control management is essential for quality surveillance

Issue 6 2020 Integrated Solutions

The demand for effective surveillance remains a priority for security and line management involved with the day to day protection of assets.

On a number of occasions, associates within the security industry have expressed their excitement with an imminent project to establish or enhance security control rooms and/or surveillance capabilities.

The excitement is short lived when certain tough questions are posed in the project process. These range from what the return on investment will be, to questioning the capability and purpose of the technical systems. Rightfully so, the investors have a high expectancy of delivery and in many instances perceive that the surveillance systems are the ultimate and only asset protection solution.

Kevin van Zyl.

I would caution that before investing in any form of surveillance or technology, the project should commence with a summary of critical controls. These are controls that are crucial to preventing the event or mitigating the consequences of the event. The absence or failure of a critical control would significantly increase the risk despite the existence of the other controls. In addition, a control that prevents more than one unwanted event or mitigates more than one consequence is normally classified as critical.

These requirements should form part of the project scope, the implementation and delivery expectations. Tactical considerations should be given to:

1. Vulnerability assessments are key

A quality security vulnerability assessment would inform the executive team of the criticality of the location of cameras and relevance to risk. CCTV alone is not the sole source for protection of assets, but aides those responsible for this function if it follows the critical control management process.

When done well, the security vulnerability assessment highlights the critical controls required to mitigate risk.

2. Threats to assets

Equal to the vulnerability assessment is a detailed threat analysis which examines crime and incident patterns. This provides the project manager with accurate information to ensure the location of the system is balanced relative to cost.

3. Observation and the operator

My experience has taught me that operators are often frustrated when the camera footage is not fit for purpose and in fact, unreliable. The surveillance is often installed to monitor, but cannot detect, recognise or identify perpetrators.

4. Risk versus frame rate

In instances where the perpetrator or type of crime in progress is taking place quickly, time lapse rates in the system may compromise evidence. This aspect must be well defined based on the number of cameras and outcomes of the vulnerability assessment.

5. Dedicated personnel or not

Often the surveillance environment is ready for use only to discover that inadequate attention has been paid to the type of methodology and personnel required. Casual surveillance is inadequate in high asset protection environments. The assessment of personnel to ensure the right person for the right job is essential for success.

6. Surveillance regime

Monitoring during critical operational times is key. In addition, many unwanted events are missed if review surveillance is not part of the requirement. Again, a quality vulnerability assessment will inform operational procedures.

7. Operations versus surveillance

Many approaches in the overall protection of assets with closed circuit television embed the camera surveillance in security operations centres. Albeit that this may not be wrong, it is truly not effective surveillance due to all the dilution factors such as alarms, gate control, access/egress and many others.

8. CCTV systems and alerts

Modern video analytics enable dedicated surveillance personnel to see visual alarms, auto-generated text, emergency relays, alarm audit trails and many more.

9. Camera display

Single screens are often split and ‘crowded’ into multiple views. This again dilutes true surveillance and the ability to detect and recognise unwanted events.

10. Retention time

Often a request is made by an investigation team to recover CCTV footage only to find that this is impossible to do. This is usually a retention time issue and unclear technical protocol and procedures for the scale of such retention relevant to the size of the CCTV capability.

11. General considerations

General matters should be built into the project design. These may include but are not limited to export and archive procedures, constraints, legal matters (e.g. PoPI Act, etc.) and future maintenance and the cost thereof.

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Integrated transportation security
Guardian Eye AI & Data Analytics Integrated Solutions Logistics (Industry)
HG Travel installs an AI-powered camera system integrated across 115 vehicles throughout a fleet comprising 160 vehicles of different sizes, along with predictive and self-monitoring tools to track tyre condition, fuel consumption and theft, and overall vehicle maintenance.

Embracing next-generation surveillance for safer cities
Surveillance Integrated Solutions AI & Data Analytics
With the South African government highlighting the importance of building smart cities by integrating advanced technologies to make them more resilient and liveable, the role of next-generation network video and surveillance technologies cannot be ignored.

Gallagher Security releases Command Centre v9
Gallagher News & Events Access Control & Identity Management Integrated Solutions
Richer features, greater integrations, with the release of Gallagher Security’s Command Centre v9 security site management software designed to integrate seamlessly with various systems and hardware.

Zero Trust in 2024
Mantis Security Integrated Solutions IoT & Automation
The rapid development of artificial intelligence (AI) applications and uses in 2024 will profoundly impact security operations and AI-driven analytics, which can enhance threat detection, anomaly identification and predictive maintenance.

Integrating farming and security solutions for productivity
Security BIS Agriculture (Industry) Integrated Solutions
Security challenges are a harsh reality in South Africa, particularly for those in remote areas. Sadly, recurring rural crimes like farm attacks and livestock theft are part of the farming community’s lives.

Optimise operations in healthcare
Cathexis Technologies Integrated Solutions
Hospitals can see thousands of people gathering daily to provide medical care, seek help, visit loved ones, or undertake essential support or administrative work. Protecting everyone is critical to maintaining a safe environment.

Hikvision unveils range of network speakers
Hikvision South Africa Integrated Solutions
Hikvision has recently unveiled its latest audio product line, featuring various advanced network speakers. Each product is designed to meet different application needs, ensuring flexibility and adaptability across numerous environments.

HDR multi-camera solution for autonomous mobility
IoT & Automation Integrated Solutions
e-con Systems has launched the STURDeCAM31, a small form factor camera that has been engineered to make autonomous mobility safer by ensuring reliable and superior imaging quality even in challenging outdoor lighting conditions.

Integrating control rooms and response
WatchManager Integrated Solutions Residential Estate (Industry)
Control rooms have become a standard in large estates, and remote control rooms are finding a home even in smaller estates due to cost efficiencies and the increasing reliability of analytics and artificial intelligence.