Leveraging wide-area CCTV evidence

July 2017 Editor's Choice, Surveillance

CCTV coverage across buildings, city blocks, cities and even intercity camera footage is being used increasingly to deal with major crime or terror violations in the UK. I use the term ‘wide-area CCTV’ to describe this.

At a UK CCTV User Group conference in May, a counter-terrorism police office spoke in depth about how CCTV was used to track the killer of an elderly Imam and the bomber of three mosques. Ironically, the night before the presentation was the time of the suicide bombing at the Manchester concert. The same CCTV techniques would have been immediately applied to that case, as the UK police strategy to pursue terrorists at all parts of the social spectrum is based on the same CCTV review strategy.

What stands out about the presentation was the way in which the UK police can systematically make use of CCTV evidence over an extended area, systematically working out the movements of a person over areas and time. Recent subsequent terror events confirmed the effectiveness of their police performance in this regard.

The crime scene is obviously a major area of focus, but the investigation gets expanded to the approach of the suspect to the crime scene as well as leaving. Contrasts in what they are wearing or carrying and the nature of the goods are reviewed. All of these become clues for further CCTV pursuit.

In the case of the Imam murder, CCTV was used to identify the route the person took to the scene, things like buying tickets for the bus, footage waiting for the bus and on the bus to identify the suspect, the subsequent town area that he then moved through after the bus ride, to the route that was taken to the area where he stayed. Shops that he went into were also reviewed, and where he purchased certain components of the bombs were also identified. A similar process with the Manchester suspect was also used, where police quickly released video pictures of where the suspect had purchased items used, even to the clothing that he was wearing when doing so and how it was consistent with the evidence remaining after the bomb blast.

This is not a new thing in the UK, possibly based on the fact that the country has faced one of the most sustained experiences of terrorism in the world. From IRA bombings years ago, and from the 1999 case of the Brixton Bomber, David Copeland who set off three bombs killing three people and injuring many, CCTV has been used systematically by the UK police. In the case of the Brixton Bomber, a bag logo viewed from within a store at the first site was used to define height and clothing, including a cap that was subsequently identified in the second bombing, leading to a positive identification.

It is also not a process that is defined by terrorism. Many town centres in the UK plot out both public and private camera coverage to assist in the tracking and apprehension of crime suspects. While control rooms in town centres in the UK are often relatively understaffed compared to sites in South Africa, for example, the forensic capacity of police to follow up and track suspects is probably the best in the world. Police are analysing the suspects’ activities, associations and potential involvement from days before the incident actually occurred.

This is not limited to the UK. Counties like Australia have followed a similar path, with a project called Blue Iris in Perth city centre where all parties with CCTV cameras in the city centre register camera coverage which can be used for police investigations.

The systematic use of CCTV evidence is aimed not just to identify people at the crime scene, if this is possible, but to follow and build clues around identity, location, and a profile of the person. Ultimate identification of the person may happen in another city based on CCTV tracking follow through. The objective is to identify and make the most of anything about the person, and to building a chain of evidence which is going to be as robust as possible. What it means for criminals or terrorists is that identity, activities and associates may be identified by actions hours or even days before the criminal action. It also means that profiling of suspects is maximised to get every last scrap of information available and leverage this in an investigation.

In the South African scenario, we have a glaring absence of any systematic use of wider CCTV information by almost all parties. One of the common activities by UK police when looking at a crime scene is to immediately start looking for cameras that can be used. While crime site information is generally used and looked at in South Africa, extending to a wider framework of CCTV coverage in the community and other information is typically neglected. This is obviously a manpower intensive operation and certainly not all crimes can be subject to such thorough investigation.

Casinos are possible an exception. Even since using VCRs, casinos systematically reconstruct crime behaviour and actions of suspects on site, potentially creating a narrative of people moving from activity to activity after a major crime or scam. Yet casinos and sites such as shopping centres and major banks operate in an extended community and can work with such communities with mutual benefits in a wide-area surveillance network.

We have seen some use of widespread surveillance gathering such as toll booth stations and cellphone tracking in dealing with crime, but the use of CCTV has typically fallen short. The use of wide-area surveillance promises potential for not just tracking and follow-up after crimes, but used live, offers the potential for forewarning based on things like number plate recognition or facial recognition of known suspects. It offers a major potential tool that can be used to reduce crime, and something to make it very difficult for criminals to hide.

Dr Craig Donald is a human factors specialist in security and CCTV. He is a director of Leaderware which provides instruments for the selection of CCTV operators, X-ray screeners and other security personnel in major operations around the world. He also runs CCTV Surveillance Skills and Body Language, and Advanced Surveillance Body Language courses for CCTV operators, supervisors and managers internationally, and consults on CCTV management. He can be contacted on +27 (0)11 787 7811 or craig.donald@leaderware.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.