Decreasing liability claims and hijacking with in-cab surveillance

November 2016 Editor's Choice, Surveillance, Transport (Industry)

Fleet and cargo management has typically involved tracking vehicles and cargo using GPS-connected devices. However, monitoring and managing driver behaviour and providing a clear picture of the driver’s environment, also forms a critical part of the equation for transport fleet owners.

Malcolm Rousseau, managing director of Fleet and Time Control (FTC) and subsidiary FleetCam, says that early methods of recording driver behaviour and other basic elements involved the use of tachographs. These devices were replaced by onboard computers in the early 1990s. These were responsible for the electronic collection of data to provide fleet owners with information that included where the vehicle went, its departure and arrival times, and driver behaviour such as driving too fast or stopping too long.

By the late 1990s live vehicle tracking systems via cellular networks enabled fleet owners to see, in real time on a map, the location of the vehicle plus driver behaviour information. This technology allowed for vehicle recovery if the vehicle was stolen, thereby dramatically increasing security.

In 2014, FTC upped the ante with the introduction of the FleetCam range of vehicle surveillance cameras. More compact in design than traditional surveillance cameras, these rugged devices are available in interior dashboard-mounted and exterior versions to provide comprehensive video footage of various elements of the vehicle and driver. Automatic start and stop recording means that recording begins when the vehicle is started, and ends when the vehicle is turned off.

Robust and reliable

Designed specifically for mobile assets the shape and size of the cameras differs substantially from traditional CCTV cameras. Other factors that needed to be considered are the presentation of a high-quality image and the fact that the cameras are constantly in motion as the vehicles travel from one location to another. In addition, the external cameras need to be waterproof and highly robust. They require regular cleaning to ensure complete reliability and image quality delivery. Rousseau says that the company now uses AHD 800 MP NVRs for mobile applications, equivalent to 1080p.

In order to protect both the assets and the driver, the cameras are installed in an unobtrusive position. In certain instances, such as the mining sector, the cameras are mounted in lockable steel security boxes.

Added features of the technology include the ability to simultaneously view the driver, the dashboard instrumentation and the road ahead. “Insurance companies love this technology as it provides objective video footage in the event of an accident, thereby clearly establishing where the fault lies and who is therefore liable for the payment of insurance claims,” says Rousseau. The built-in G-sensor collision alarm automatically alerts fleet controllers and owners for prompt action.

Since most fleet owners frown on their drivers picking up hitchhikers, cameras provide footage when a passenger door is opened and footage of the inside of the cab, alerting the fleet owner to any indiscretions in this regard. Since installing these cameras, fleet owners have noticed a decrease in the number of accidents associated with vehicles stopping to pick up hitchhikers. Similarly, in the event of an attempted or successful hijacking, the driver presses a panic button, which automatically activates the in-cab camera and sends an alert and footage to the fleet owner for response.

External recording

Two additional cameras are typically installed, firstly, in the vicinity of the fuel tank to start recording footage whenever the fuel tank cap is unlocked. This will provide a record of any incidents of illegal fuel siphoning. Secondly, a camera is installed in the vicinity of the cargo doors to provide footage on all goods loaded into and out of the truck. By providing an audit trail of goods, there will be major reductions of en route theft.

All recordings can be stored in cameras for four weeks and for up to three months on the hard drive. Users can also log in remotely via the network to download video clips of selected cameras.

Rousseau points out that the company customises solutions to suit the customer.

For more information contact Fleet and Time Control, +27 (0)21 551 3520, malcolm@ftc4u.co.za, www.ftc4u.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
Securing the smart fleet
Information Security Transport (Industry) Logistics (Industry) IoT & Automation
Contributing around 10 to 12% of South Africa’s GDP, the transport and logistics sector supports almost every part of the country’s economic activity. The stakes for keeping these systems secure are higher than ever before.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.