Who watches the watchers?

October 2015 CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions

For many businesses, security is a grudge purchase. Money gets thrown at solving a security issue, only to later discover holes that can only be plugged with more money. What’s more, the bolt-on services are generally very specific, meaning a bolt-on solution needs to be purchased for each and every hole in the system.

Gareth Cowan, OmniVision Security.
Gareth Cowan, OmniVision Security.

Before committing to any security solution, therefore, companies need to carefully consider, from the outset, what the strengths and weaknesses are of the available solutions, and choose those solutions that are most complementary. A very good example of complementary security solutions is onsite guarding paired with offsite, independent monitoring.

Many companies employ guards to watch over their assets. A guard can be an excellent deterrent, but being human, a guard is subject to issues such as self-preservation, self-interest, boredom and tiredness, with the result that most guards will generally do as little as is required to keep their job. For this reason, most guards cannot be left unsupervised for long periods.

But placing a second guard on-site to supervise the first doesn’t solve the problem, as the supervisor will be subjected to exactly the same temptations as the first. In an attempt to plug this security hole, tagging systems are installed, which act as an independent supervisor that ensures the guards perform the patrol they are contracted to perform. However, a tagging system does nothing to inform on what happens between patrols. The guards might be attentive and alert, or they might be having a 20 minute power-nap.

To solve this issue, many guarding companies now offer supervisory visits to their guarded sites. But this is generally limited to one visit per site, which often occurs around the same time each day or night and therefore becomes relatively predictable. Just like the criminal that waits for the guard to pass by before entering a premises, the guards themselves time their activities around the times they know a supervisor is due to visit. What’s more, these supervisory visits require the guarding company to employ an additional high-grade guard, purchase an additional car, and burn the petrol required to get the supervisor from site to site. At the end of the day, it’s the guarding companies’ clients who pay for all this.

Remote monitoring solution

A far more effective, and cost-effective, method of supervising guards is to do it via remotely monitored CCTV. Most companies using on-site guards also utilise a CCTV system for managerial purposes, which opens the opportunity up for monitoring of guards without any significant additional hardware spend on the part of the company. So there’s no upfront cost.

Also, the guarding company will no longer need to send a supervisor to all their sites each night. So there’s a potential reduction in the guarding fee.

An off-site monitoring station can schedule video check-ups on the guarding station at a frequency desired by the client at a very low incremental cost. So suddenly, hourly supervisory visits are possible, but more importantly, they are done stealthily: the guards do not know when they are being monitored. This raises the bar of ‘minimum effort’ from being attentive when the supervisor arrives to being attentive at all times.

However, just as guards require supervisors, the off-site monitoring company also requires systems in place to ensure its duties are carried out effectively. For the symbiotic relationship between guarding and monitoring to really produce results, the monitoring service needs to include a few key features.

Virtual guarding checks

Firstly, the site checks cannot be left to the discretion of the operator in the control room. Each and every supervisory visit must be scheduled in the monitoring station’s software to automatically present the required actions to the operator.

Secondly, the system must force that operator to carry out those actions without fail. Once an operator has begun processing a site check, they must be prevented from closing out the event before the correct cameras have been viewed for the correct amount of time – which has been predetermined and agreed to by the client.

Thirdly, to prove that the correct actions have been undertaken at the correct times, the monitoring station must also be able to produce a comprehensive audit trail that details each and every action the operator has taken, along with a time stamp for each action. All video viewed by the operator must be recorded off-site and must be viewable by the client on request. Ideally, the operator must also have the ability to broadcast audible announcements on-site, and these announcements must also be recorded and be made available to the client on request. In other words, the monitoring station must make itself fully accountable to the client.

An optimal security package is therefore one that combines the two complementary services of on-site guarding and professional, independent off-site monitoring. By ensuring that technology forms the final backstop of enforcement, where it is used to guide and ensure that the actions of operators are in compliance with the system as designed, the never-ending question of ‘who watches the watchers’ is put to rest and the security system as a whole delivers the expected results.

For more information contact Gareth Cowan, OmniVision Security, +27 (0)21 761 5336, gc@omnivisionsecurity.co.za, www.omnivisionsecurity.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Securing perimeters of secure locations
November 2019, Axis Communications SA, Modular Communications, Hikvision South Africa, Nemtek Electric Fencing Products, Technews Publishing, Stafix , Government and Parastatal (Industry), Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
Hi-Tech Security Solutions asked a number of companies offering perimeter security solutions for their insights into protecting the boundaries of national key points.

Read more...
Drones and cybersecurity?
October 2019 , CCTV, Surveillance & Remote Monitoring
Hacker drones can eavesdrop electronically on conversations, can perform network attacks, or can create fake wireless access points.

Read more...
Body-worn cameras transforming security
October 2019 , CCTV, Surveillance & Remote Monitoring, Security Services & Risk Management
Police Service Northern Ireland now has over 7 000 officers using 2 500 cameras covering approximately 173 000 incidents each year.

Read more...
Camera Selection Guide 2019
CCTV Handbook 2019 , CCTV, Surveillance & Remote Monitoring
The Camera Selection Guide 2019 includes a range of IP, analogue, thermal and speciality cameras aimed at a broad range of surveillance functions.

Read more...
Intelligent analytics and the brains to match
September 2019, Bosch Building Technologies , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
What if the brains behind our security cameras could be trained to improve their cognitive ability to pay attention, learn, and problem-solve according to specific rules and situations?

Read more...
AI-powered autonomous Drone-in-a-Box
September 2019 , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
Organisations in the mining, energy and industrial, oil and gas, ports and terminals sectors can optimise security and business operations, whilst reducing risks and operational costs

Read more...
Cybersecurity for video surveillance systems
September 2019, Mobotix , Cyber Security, CCTV, Surveillance & Remote Monitoring
Video surveillance systems are increasingly accessible over any IP network, which has led to the rise of potential cyberattack.

Read more...
Looking ahead with mobile access technologies
Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher , Access Control & Identity Management, Integrated Solutions
Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...

Read more...
Scalable access solution
Access & Identity Management Handbook 2020 , Access Control & Identity Management, Integrated Solutions
Bosch Building Technologies makes access management simple, scalable and always available with Access Management System 2.0.

Read more...
What are the cybersecurity issues in video surveillance?
November 2019, Axis Communications SA , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Cyber Security
he importance of the data captured by surveillance cameras – and what can be done with it – has led to a new breed of cybercriminals, looking for insights to steal and sell.

Read more...