Making body-worn cameras work

October 2018 Editor's Choice, CCTV, Surveillance & Remote Monitoring, Integrated Solutions

When body-worn cameras first appeared on the market there was a great deal of enthusiasm from both the private security and public protection sectors. It was hoped that this technology would allow control room operators – whether police or private security – to put eyes on the ground in order to respond to any security or public safety incident more effectively.

It was anticipated that body-worn cameras would provide visual evidence for criminal prosecutions and assist law enforcement officers in criminal investigations. Instead, a set of snags and challenges were revealed, making the technology more of an administrative burden than a much-anticipated cure.

More problems than promises

The thinking behind body-worn cameras is admirable, however, the technology was still too emergent to have the desired effect of putting eyes on the ground in real time, stamping out the opportunity for crime and corruption. Basically, with a camera worn on a person’s chest that records video onto an SD card, the only way for operations managers to receive and view that footage is to wait for the individual to check back in at the control room. In short, the body-worn camera’s true flaw is its lack of real-time accountability, control and susceptibility to tampering.

Think beyond the device

It soon became apparent that hopes of putting eyes on the ground in high-risk or first-responder situations would not materialise with the standalone device package that is the body-worn camera. To strip away its limitations, it becomes necessary to think bigger and smarter than just a device.

Companies have, therefore, started using a cloud-based platform control room where operators can make use of HD video along with location and motion information. By pairing a compact sensory device (the camera with built in microphone and panic buttons) with a unit that is capable of providing power, communications and storage capabilities can create a complete end-to-end video recording and management system all wrapped up as a ‘smart mobile sensor platform’.

Cameras are now small enough to attach to glasses, collars, shirts or even vehicles, making it unobtrusive and ensuring an unobstructed recording view. Advancements in video compression technology and the continuous rollout of mobile connectivity makes it possible to add a GSM SIM card to the mix to support live transmission at D1 resolution.

Make it human-proof

South African security companies, as well as public protection organisations, are in desperate need of effective eyes and ears on the ground. Technology should make it possible to utilise resources and manpower more effectively. In addition, technology companies working on body-worn cameras need to think of ways to improve transparency and enforce accountability wherever applied. However, in order to be effective, the scope for human error must be eliminated as much as possible.

To this end, footage must be encrypted and transmitted live back to the control room, and it is this, along with automatic upload to the VMS when docked, that makes such a technology more reliable. From an evidentiary perspective, high-quality video at HD resolution with full data and identity management makes it easy for investigating officers to maintain the integrity of the evidentiary chain, and this is something that older models of body-worn cameras have not been able to do.

If new technology is introduced, law enforcement officers will become obliged to self-correct corrupt behaviour because there’s someone watching them in real time and they’re no longer able to tamper with their recording device. This is the technology that private security companies and first response teams alike are waiting for – a complete solution from camera to final downloaded recordings in a fully managed platform.

For more information contact Graphic Image Technologies, +27 11 483 0333, laurence@git.co.za, www.git.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

How encryption can protect sensitive data
Issue 6 2020 , Editor's Choice
Here’s how encryption can help keep your data safe from prying eyes – even if your device is stolen or your cloud account is hacked.

Read more...
More than just compliance
Issue 6 2020, IACT-Africa , Editor's Choice
SA is one year away from the Protection of Personal Information Act (POPIA) D-Day.

Read more...
Security risk mitigation on a budget
Issue 6 2020 , Editor's Choice
Security estates often fall well short in terms of adequate protection when being assessed by an independent, experienced threat, risk and vulnerability assessor.

Read more...
Digital means managing your risk
Issue 6 2020, AVeS Cyber Security , Editor's Choice
Digital transformation in mining companies has become a business imperative to drive efficiencies, optimise competitiveness and reduce risks associated with human error.

Read more...
Face recognition and temperature measurement
Issue 6 2020, Suprema , Editor's Choice
Purpose built for FaceStation 2, Suprema’s new thermal camera enhances safety by measuring skin temperature.

Read more...
What, how and why of security
Issue 6 2020, Alwinco , Editor's Choice
As a security advisor, it’s a continuous challenge to change the existing perceptions of CEOs/MDs and nowadays the procurement departments.

Read more...
A life jacket for buildings
Issue 6 2020 , Editor's Choice
The EAV is a purpose-designed vest which provides the user with on-demand air supply and other safety gear to help them escape from hazardous incidents.

Read more...
Overview of contactless identification technologies
Issue 6 2020, Suprema , Editor's Choice
A guide to two of the best available contactless identity confirmation technologies, along with some tips on choosing the right one.

Read more...
Key criteria in the selection of CCTV control room operators
Issue 5 2020, Leaderware , Editor's Choice
Some people are better at aspects of the job of CCTV operator than others, and some companies put in a lot more effort in choosing their operators than others.

Read more...
Leaders in risk and security: As long as there are people, there will be risk
Issue 5 2020, iFacts, Technews Publishing , Editor's Choice
Jenny Reid is a self-made success, focusing on people, the risks they create and the potential they have.

Read more...