High performing CCTV operators

July 2016 Editor's Choice, Surveillance

In an Australian government sponsored review some years ago about what factors influenced how good a city CCTV scheme was, the project looked at a number of factors including the technology, the relationships and involvement with police on the ground, and the standard procedures, among other things. The conclusion to the report contained this statement though: “The effectiveness of CCTV may be very dependent on a whole range of issues but in particular the monitoring strategies adopted by camera operators” (Australian Research Council, 2006).

What effectively came out of the research is that where operators have a clear idea of what to look for, have the decision making capabilities to follow through on looking for specific people or activities of interest, and have the ability to recognise the signs of something happening, performance will be greatly improved.

This, for me, is a result of a number of factors:

1. A willingness to do the job and especially a passion to catch people.

2. A situational awareness of the areas being viewed, the layout, activities, people, and likely suspects and risk areas.

3. The use of individual initiative and skills in thinking through target acquisition and monitoring.

4. Visual analysis skills and observation skills to assist in picking up the issues and anomalies in the areas being viewed.

5. Training in what to look for, an understanding of body language, and how crime develops and incidents occur.

6. Clear and defined responses to events, as soon as signs of a developing incident is occurring, and good communication skills to follow this through.

Things like good SOPs, knowledge of the law, understanding of the control systems, and ability to switch to relevant cameras and track people using systems provide a useful base for people to work from. But these activities do not help catch people. It is like having a racing car that is ticking over but can’t be driven anywhere except up and down the driveway.

If I were to interview someone for a position as an operator, the first question I would ask is how many people have you caught before, and follow this up with additional questions like “how recently?” “What signs did you see?” If somebody has demonstrated a willingness to catch people and the ability to do so, it’s likely to happen in the new operation as well.

I’d follow up on the standard selection tools with assessments to check the observation skills, ensure that they have training in how to pick up the body language involved in crime behaviour and look at their communication skills. Communication skills may be an optional extra at times, in that many people who are good at working with systems and observing people are not necessarily very extraverted or good with communication.

All too often we try and manage and structure the process of security or surveillance excessively and in doing so restrict its usefulness. Guards have to follow a precise route to badge at specific check points to show they are working, and in doing so give criminals a predicable route and show the timing of where and when to break in to the premises. The UK police have a 'stop and search' capability where they can stop anyone and search them, but the documentation that has to now get filled in is so onerous that it reduces the chance of this happening. We may define and structure surveillance duties so much that it reduces the potential for initiative and acquisition of the targets we are looking for.

To get the surveillance outcomes we want, we need to empower operators with the skills, training, knowledge, and scope for initiative and independent action to allow them to deliver detection performance. We need to ensure we have the right people for this, and the right rewards – where operators deliver they need to be recognised, and where they don’t deliver the required performance, we need to provide a development strategy to get them to the right point. This involves ensuring they are equipped with the right skills and have the right kind of environment to shine. It also means that we have to have the managers who can facilitate this kind of process.

Dr Craig Donald is a human factors specialist in security and CCTV. He is a director of Leaderware which provides instruments for the selection of CCTV operators, X-ray screeners and other security personnel in major operations around the world. He also runs CCTV Surveillance Skills and Body Language, and Advanced Surveillance Body Language courses for CCTV operators, supervisors and managers internationally, and consults on CCTV management. He can be contacted on +27 (0)11 787 7811 or craig.donald@leaderware.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.