Critical control management is essential for quality surveillance

Issue 6 2020 Integrated Solutions

The demand for effective surveillance remains a priority for security and line management involved with the day to day protection of assets.

On a number of occasions, associates within the security industry have expressed their excitement with an imminent project to establish or enhance security control rooms and/or surveillance capabilities.

The excitement is short lived when certain tough questions are posed in the project process. These range from what the return on investment will be, to questioning the capability and purpose of the technical systems. Rightfully so, the investors have a high expectancy of delivery and in many instances perceive that the surveillance systems are the ultimate and only asset protection solution.


Kevin van Zyl.

I would caution that before investing in any form of surveillance or technology, the project should commence with a summary of critical controls. These are controls that are crucial to preventing the event or mitigating the consequences of the event. The absence or failure of a critical control would significantly increase the risk despite the existence of the other controls. In addition, a control that prevents more than one unwanted event or mitigates more than one consequence is normally classified as critical.

These requirements should form part of the project scope, the implementation and delivery expectations. Tactical considerations should be given to:

1. Vulnerability assessments are key

A quality security vulnerability assessment would inform the executive team of the criticality of the location of cameras and relevance to risk. CCTV alone is not the sole source for protection of assets, but aides those responsible for this function if it follows the critical control management process.

When done well, the security vulnerability assessment highlights the critical controls required to mitigate risk.

2. Threats to assets

Equal to the vulnerability assessment is a detailed threat analysis which examines crime and incident patterns. This provides the project manager with accurate information to ensure the location of the system is balanced relative to cost.

3. Observation and the operator

My experience has taught me that operators are often frustrated when the camera footage is not fit for purpose and in fact, unreliable. The surveillance is often installed to monitor, but cannot detect, recognise or identify perpetrators.

4. Risk versus frame rate

In instances where the perpetrator or type of crime in progress is taking place quickly, time lapse rates in the system may compromise evidence. This aspect must be well defined based on the number of cameras and outcomes of the vulnerability assessment.

5. Dedicated personnel or not

Often the surveillance environment is ready for use only to discover that inadequate attention has been paid to the type of methodology and personnel required. Casual surveillance is inadequate in high asset protection environments. The assessment of personnel to ensure the right person for the right job is essential for success.

6. Surveillance regime

Monitoring during critical operational times is key. In addition, many unwanted events are missed if review surveillance is not part of the requirement. Again, a quality vulnerability assessment will inform operational procedures.

7. Operations versus surveillance

Many approaches in the overall protection of assets with closed circuit television embed the camera surveillance in security operations centres. Albeit that this may not be wrong, it is truly not effective surveillance due to all the dilution factors such as alarms, gate control, access/egress and many others.

8. CCTV systems and alerts

Modern video analytics enable dedicated surveillance personnel to see visual alarms, auto-generated text, emergency relays, alarm audit trails and many more.

9. Camera display

Single screens are often split and ‘crowded’ into multiple views. This again dilutes true surveillance and the ability to detect and recognise unwanted events.

10. Retention time

Often a request is made by an investigation team to recover CCTV footage only to find that this is impossible to do. This is usually a retention time issue and unclear technical protocol and procedures for the scale of such retention relevant to the size of the CCTV capability.

11. General considerations

General matters should be built into the project design. These may include but are not limited to export and archive procedures, constraints, legal matters (e.g. PoPI Act, etc.) and future maintenance and the cost thereof.

For more information contact Kevin van Zyl, Horizon Risk Management, +27 76 801 5639, support@horizonrisk.co.za, www.horizonrisk.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Keep your distance with PeopleCounter and DistanceGuard
Issue 6 2020 , Integrated Solutions
Using 2D and 3D LiDAR sensors from SICK, people can easily uphold the recommended minimum distance in public and pre-defined spaces.

Read more...
Critical control management
Issue 5 2020 , Integrated Solutions
The critical control management process is an excellent practical approach to ensure effective controls over potentially catastrophic events.

Read more...
Adjusting to a new reality
Issue 5 2020, Technews Publishing , Integrated Solutions
COVID-19 to accelerate adoption of technology-enabled smart city resilience approaches: robotics, digital twins, and autonomous freight.

Read more...
Remote oversight imperative for smart buildings
Issue 5 2020 , Integrated Solutions
Duran Viera, CEO of Amecor, says one of South Africa’s biggest drivers for smart building development is security.

Read more...
Shaping today’s smart cities
Issue 5 2020, ZKTeco , Integrated Solutions
As our physical and digital worlds become intertwined, the absorption of new technologies in smart cities is inevitable.

Read more...
The evolution of security in residential estates
Residential Estate Security Handbook 2020 , Editor's Choice, Integrated Solutions, Security Services & Risk Management
Two large estates discuss their security processes and the ever-expanding scope of responsibilities they need to fulfil.

Read more...
Home-grown, cloud-based safety and security solutions
Residential Estate Security Handbook 2020 , IT infrastructure, Integrated Solutions
BeSecure has taken security and communications technologies and turned them into what is best described as care and safety solutions for the estate community in South Africa.

Read more...
Integrated security management system
Residential Estate Security Handbook 2020, Protoclea Advanced Image Engineering , Products, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
Phorcas is a security information system developed by Protoclea designed to integrate multiple sub-systems into a powerful crime fighting solution.

Read more...
Your partner in contemporary business continuity
Issue 3 2020 , Integrated Solutions
Horizon Risk Management aims to provide optimum contemporary, but affordable, business continuity techniques for business in South Africa and abroad through stable, durable and incorruptible practices.

Read more...
Financing for the systems integrator
Issue 3 2020, Elvey Security Technologies , Integrated Solutions
Financing your security project through your technology distributor can benefit both the systems integrator and the end user.

Read more...