classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


How the types of surveillance impact on control room and workstation design
April 2017, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring

People often speak about CCTV surveillance as a relatively simple thing. In a sense, installing a control room and cameras is seen as a one size fits all process. However, there are many aspects to surveillance which impact on the infrastructure, control room design, monitor configuration, controls, and people and training that are needed for delivering performance.

The sites or areas, situations, targets, camera profiles, and information usage will all impact on the type of surveillance done. The types of crime and manner in which they are carried out will define what needs to be looked for, and the type of camera would also change how things should be displayed.

The use of thermal cameras introduces additional complexity in some aspects. Even the range of a camera can impact on what is displayed and needs to be identified on monitors. In some cases, video analytics may be used effectively, while in others it may produce excessive false alarms and detract from effective performance. I’ve highlighted a few surveillance types below to highlight how what is being viewed can influence the workstation design and types of equipment being used.

Types of surveillance

Presence

Presence relates to whether a particular object or person exists in a place where it shouldn’t be. This is usually related to time, but can also involve types of areas.

Camera patrols is one aspect of this where the operator switches camera on one screen, or systematically views a set of screens for any presence. In CCTV traffic monitoring, congestion and illegal use of roadways is relatively clear and violations are easy to spot. A car in a bus lane, for example, is difficult to miss if you are monitoring the screens and they have been laid out effectively. Use of blank screen technology where motion detection is used and screens are activated is another example of this. Viewing and classification of presence issues is relatively simple and the size of the camera image displayed can be relatively small.

Movement and positioning

The detection of movement or positioning becomes slightly more complex than mere presence. For example, movement of people towards a fence line rather than along it. Also, stopping of movement at particular points which are known risk areas.

People waiting near high risk or vulnerable areas where subsequent actions may be directed at such areas. People moving in a pattern which indicates that they may be looking at a way through or over a perimeter area rather than moving past in a conventional way.

Times of day have a big implication in this respect, and use of thermal or infrared cameras for detection at night or use of conventional cameras in lit up areas are common applications. Video analytics for such activities needs to be relatively complex. It is not just movement detection, but directional movement, or even lack of movement from people staying still in a particular area.

In many of these cases, having larger camera images on large screens or having dedicated monitors are necessary. Some anticipation and interpretation are necessary in viewing such behaviour, and early detection can allow a prediction of what is to come.

General behaviour

General behaviour of people such as movement in a plant, on a street, access points for estates, or shopping area that is useful in that deviations from more obvious behaviour highlight that something is going on. Problem situations characterised by bunching of people, delays in processing of vehicles, obvious movement away from threats, and blatant crime situations like armed robberies stand out in this scenario.

Similarly, where timing is changed, or speed of movement is different, such incidents can be detected. Screen displays should be of a sufficient size to observe general behaviour, although it needs to be considered that predication of crime behaviour is sometimes difficult when observing general behaviour.

Crime behaviour

Behaviour linked to a particular type of crime, for example shoplifting, or theft of gold bearing material, usually requires some closer viewing of people. This requires a view of the person and surroundings in order to observe the behaviour and put it in context. The general body language of an individual needs to be observed in this context.

The screen display size should allow for this. The surveillance approach in the City of Cape Town provides a good example of this where a spotter in the control room identifies potentially suspicious activity in an area, and then hands this off to an operator who then views the suspect more closely on a dedicated monitor.

Subtle crime behaviour

Crime characterised by small and subtle behaviours in a working place or town centre environment requires close up monitoring of people and a sensitivity to small and subtle body language. Something like diamond theft, street exchanges of drugs, pick pocketing, food and beverage theft, and some shoplifting examples fall into this category.

There is a need to check hand movement and placement, quick movements and interactions, and specific body clues. Usually, full monitor viewing of suspects is required for detection in these kinds of conditions.

Profiling

Extended viewing of particular suspects requires tracking of people and their activities, interactions, work and personal habits over extended periods. This usually requires dedicated monitors, or in some cases, the use of grouped camera views in order to track people between areas seamlessly.

Use of large screens with a set of clearly viewable camera views is the ideal for these. The ability to use PTZ cameras is also an element of this.

Reviewing

Reviewing of video either takes place when auditing previous surveillance footage, or specifically looking at an event or behaviours that have been identified for closer inspection, or when an incident has been identified. Investigations personnel would also use this approach to examine footage.

Dedicated camera views, if necessary on large screens, need to provide clear views of areas and body language. As in profiling, it may also mean that groups of camera views can be used on a large screen. Given that there is a combination of both crime and subtle crime behaviour being looked at, there should be the possibility of clear views of individual behaviour, including subtle behaviour cues.

Control room and workstation design should therefore be fit for purpose. It is important to clarify exactly what kinds of surveillance you are wanting to do, and you may have several different workstations within the same control room with different functions. The nature of the layout, screens, access to features can all have a significant effect on the success of the type of surveillance work being performed.

Dr Craig Donald is a human factors specialist in security and CCTV. He is a director of Leaderware which provides instruments for the selection of CCTV operators, X-ray screeners and other security personnel in major operations around the world. He also runs CCTV Surveillance Skills and Body Language, and Advanced Surveillance Body Language courses for CCTV operators, supervisors and managers internationally, and consults on CCTV management. He can be contacted on +27 (0)11 787 7811 or craig.donald@leaderware.com


Credit(s)
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Trust but continually verify
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
  • Managing who, what and why
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security
    Today’s access control isn’t only concerned with who has access, but also what has access, why they need it and what they are doing with it.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • Physical and logical convergence is a fact
    November 2018, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
    Convergence, the next buzzword? A dated buzzword? Is convergence ­merely ­integration on steroids? What is convergence?
  • The expanding role of IT in access control
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
    What role is IT playing in the world of physical access control and how far will its role expand in future?
  • Taking augmented identity to the world
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.
  • Tracking biometrics into a brave new digital world
    November 2018, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    The industry is increasingly transitioning from unimodal to more integrated multimodal biometric solutions for more accurate identity verification and faster real-time results.
  • Panasonic’s Face Recognition Server
    November 2018, Panasonic South Africa, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Products
    Panasonic has adopted deep learning technology in its face recognition products that overcomes the difficulties of conventional technologies.
  • A better approach to fingerprint biometrics
    November 2018, This Week's Editor's Pick, Access Control & Identity Management
    Not all optical biometric fingerprint scanners are created equal. The type of sensor used has a powerful impact on speed, accuracy, reliability and portability.
  • Your face tells a story
    November 2018, Technews Publishing, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Government and Parastatal (Industry)
    Facial recognition has advanced to the point where it can be rolled out over large areas and accuracy is no longer a hit-and-miss affair.
  • The right access decisions
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management
    Making the right access control decision depends on what you want secured and how secure it should be.
  • They sure don’t make them like they used to
    November 2018, Technews Publishing, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    The latest offerings in the market with respect to doorbells and intercoms, and what functionality they offer.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.