classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


Beyond the hype: tomorrow’s surveillance, today’s reality
April 2018, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions, IT infrastructure, Conferences & Events, Training & Education

The Crowne Plaza in Rosebank, Johannesburg, was the setting for the 2017 iLegal conference, a joint venture between Dr Craig Donald and Hi-Tech Security Solutions. Once again, the conference lived up to its reputation and saw a host of presenters offering insights and advice into a range of aspects related to the surveillance world.

The title of this year’s iLegal was ‘Tomorrow’s surveillance – today’s reality, the social, operational, legal and strategic implications.’ The conference examined new and improved applications of surveillance technology and what they offer businesses today in terms of safety and security, as well as the legal and ethical implications we face when using these solutions.

It always feels like somebody’s watching me

This keynote speaker was Dion Chang from Flux Trends. His presentation provided insight beyond the security world into how surveillance technologies are being used generally, and how they will continue to become a more integrated part of people’s lives going forward, in both a positive and negative sense.

Chang tracked ‘a day in the life’ of a cyber citizen to illustrate just how dependent we’ve become on our digital eco systems, which ironically is parallel with our growing concerns for privacy. He covered everything from smart houses to self-driving cars, from convenient payment systems to toys embedded with AI and facial recognition, to the emergence of real robocops patrolling our streets – already a reality in places like Dubai.

He also mentioned how facial recognition and behavioural biometrics is becoming a key area of surveillance, noting how, for example, China is on a multi-year mission to cover several large cities with surveillance cameras capable of recognising people’s faces and their unique traits – such as the way they walk and so forth.

While the advance of technology is unstoppable, the security element is something we need to take much more seriously. It’s not simply about being hacked or inconvenienced, but as technology gets more personal, a slip in security could expose intimate and sensitive details about our lives. The hacking of baby monitors that allowed strangers to speak to children over the Internet is simply one of the examples of how poor security can be a serious problem. And then there are other issues such as identity theft, hacking your self-driving car and causing it to crash and so on.

Security and human rights

Following Chang, Martin Hood from MJ Hood Associates offered attendees some insights into the human rights implications of surveillance as it relates to the South African constitution. For the security monitoring industry, the Bill of Rights makes it clear that everyone has inherent dignity and the right to have their dignity respected and protected. The right to privacy was also included in this legislation, including the prevention of searching people’s person, property and home without legal authorisation.

South Africans also have the right of freedom of expression, which includes the right to assemble and move around freely. Given the history of the country, it is not impossible that people will see security operations as infringing on these rights and in these situations, the security industry should be able to understand the perception and contextualise it in a manner than everyone can understand.

More importantly, however, Hood said the security industry must make sure that its data collection is done in accordance with the law and does not violate any of the above principles (and many more). This is tricky as there are no clear guidelines as to ‘acceptable’ video surveillance. A rule one can use is that you can’t record someone if they are in an area where they have ‘reasonable expectation of not being the subject of surveillance.’ For example, in changing rooms or in their own homes.

What is clear is that information can not be collected without the knowledge and consent of the subject(s), and this collected data will soon have to be held in accordance with the PoPI regulations, which are strict about what information can be held, where and how it is held, who has access to it, and the right of individuals to ask for and receive data about what information an organisation has about them. Of course, PoPI applies to all sorts of data, not just video.

The next challenge, according to Hood, is how you use or process the information. Hood’s final advice if you are not sure your surveillance is 100% legal: “Always take the initiative and pre-empt the issue before it becomes a problem.”

CCTV and crowd management

Shannon Patrick.
Shannon Patrick.

The next presentation by Shannon Patrick from South Deep Gold Mine took this idea further when he spoke on the realities of crowd management and how to develop strategies for dealing with large crowds. He started by mentioning that crowds are almost an independent lifeform and have unique characteristics from the individuals that comprise them.

Not all crowds are intent on causing harm and they can be formed for a variety of reasons, from people queuing or waiting for something or someone, spontaneous onlookers to an event and the famous one in South Africa, crowds formed in protest marches or demonstrations.

When dealing with crowds, the security operative needs to be prepared for the event. A grade D guard will not handle an aggressive crowd as the unique characteristics of this entity requires experienced personnel to manage them. Patrick says preparation and calm are essential, as is planning your response and making sure minimum force is used.

Part of preparing for crowd management is to ensure your surveillance systems are ready for the event. This could mean placing additional cameras at strategic locations. You need to be able to capture the big picture as well as zone in on individuals in certain circumstances. You also need to ensure that your CCTV operators are aware of their responsibilities in the heat of the moment and have reliable mechanisms to communicate with people on the ground.

The key is information. You need as much information as possible, both before and in real time to ensure your responses are not only reactive and consequently sub-standard, but preferably proactive to void any unpleasant consequences. As always, your reaction to the crowd will be limited by law and security operations should always ensure they work within the boundaries of the law when dealing with crowds.

Know what you’re looking for

Dr Craig Donald.
Dr Craig Donald.

Dr Craig Donald was also on hand to offer his insights into the world of CCTV surveillance and the requirements control rooms should have of their operators. We live in a world where we have relied on physical guarding for a long time, but we are in the process of moving to a situation where surveillance technologies are taking some of those manpower jobs over.

Your security, therefore, increasingly rests in the hands of your operators and it is therefore vital that they are trained to do the job properly. This is supported by technology such as workstations and the environment they work in, which should be tailored to get the best performance from your operators. It’s a cliché by now, but the best technology is useless unless you use it properly. In a control room environment, best practices should be standard practices to realise a return on your investment.

The standards employed in the design and set-up of your surveillance operation was also a topic of discussion. A best guess is always inferior to a properly analysed, planned and designed solution.

Being an operator is not a matter of simply watching a screen until something happens, Donald says it’s a matter of understanding your environment and what people do in that environment in order to be able to identify activities deemed suspicious or out of character, potentially preventing a crime or getting the right response personnel there much faster.

Donald showed the audience some videos to support his arguments. In all of the videos, it was clear (once pointed out to the audience) that certain people under observation were planning something illegal, whether stealing a handbag or robbing a jewellery store. He explained that reading the would-be perpetrator’s body language allows for better insights into potential problems, allowing the security team to prevent an event from happening rather than waiting for something to happen before reacting.

The importance of training

Adriaan Bosch.
Adriaan Bosch.

Adriaan Bosch, the chairman of ASIS South Africa gave an overview of the importance of effective and relevant training in the security industry. Bosch lamented the fact that while there are many training opportunities in the security industry, covering skills from technical to risk management and best security practices, too few people are taking advantage of them.

The result of this is people who don’t understand the full scope of what they are doing and the security operation suffers as a result. Experience in the police force or military is no doubt beneficial in a security context, but there are many additional skills risk and security managers need.

Moreover, despite the large number of unemployed people in the security industry, there is still a lack of talent in this field. Of course, this is not a uniquely South African problem (apart from the ridiculous unemployment numbers). He quoted Harvard Business Review of 2013 which noted that 16 out of 24 leading CEOs listed talent management as their top concern.

Additionally, a Financial Times report titled Baby Boomers Effect, noted that Volkswagen is looking at robotics to cope with a staff shortage caused by retiring baby boomers. While this may not be a South African problem, the concept is not foreign. South Africa has a disturbingly large number of young people unemployed with many of them said to have given up looking for a job.

This brought Bosch to another problem in the security industry, that of the lack of young people (under 40) in the industry. It is not a problem having older people in leading roles as they have the experience to effectively do the job, but what about the succession planning? Who is being coached to take over when the oldies retire?

Of course, Bosch also spoke on dealing with risk and the best practices security operations should take in ensuring they meet the expectations of their organisations, using both public and private security operatives. Issues discussed included the necessity of effective incident management as well as a “crime to court” approach.

Bosch ended his presentation with a look at the security professional of tomorrow. This individual will need:

• A wide range of physical and technical knowledge, skills, and abilities.

• Competency in information systems, project management, communication systems, incident management, investigations and resource management.

• A greater need for communicating and the ability to strengthen relationships with peers in the private and public sector.

Without training and coaching, who will make that grade?

Safe and smart

Just in case anyone was still uncertain about the complexity of managing risk in today’s environment, independent consultant Heinrich van Eck was next up. He provided some insights into what really matters and what is necessary when setting up a smart city. In his words, a smart and safe city is “a complex maze of divergence and convergence. It is a multifaceted and complex endeavour.”

The full scope of what he was able to convey to the audience is too long for one article, but some of his insights included the need for proper planning. Knowing your environment and what is expected of your final solution is the most important first step.

This allows you to develop a strategy to accomplish all the goals, and will probably mean you require a phased approach. Once you have your strategy mapped out, then is the time to look at what technology will meet the demands of your project.

Van Eck also touched on a project he has been involved with for years. He has managed the development of a local smart city from the first idea to the current stage of the implementation in which everyone travelling on the roads within the city is under constant camera surveillance (from more than one camera), with response teams ready to respond to anything, from someone who is lost to those with criminal intent.

He was clear that technology, although important, is not the end of the story. In this project, many products were tested before the final decision was made as to which brands were to be used. Van Eck said it is crucial to have the right employees on the ground and in the control room, with the right training and paid a decent wage to ensure they make optimal use of the technology. And, of course, he stressed the need for effective integration between products to ensure a seamless security experience.

Technology focus

L to r: Warren Myers, Vanessa Tyne, Brent Cary.
L to r: Warren Myers, Vanessa Tyne, Brent Cary.

Just before the lunch break, three technology companies were invited to participate in a panel discussion about a variety of technical and operational questions pertinent to the security industry. The participants were:

• Vanessa Tyne from Axis Communications,

• Warren Myers from Myertal Tactical Security, and

• Brent Cary from Genetec.

The questions this panel answered ranged from inquiries on camera technology, such as lenses, low-light functionality, edge analytics and more. Other areas covered included remote monitoring and video management, as well as the all-important question of integration.

Brendan Cowley.
Brendan Cowley.

After lunch, the last three events of the day continued the focus on technology. The first was a panel discussion facilitated by Dr Craig Donald in which local experts provided some insights into thermal cameras and their capabilities, including some end user experiences of what these cameras can do to assist security operations.

The members of the panel were:

Ankia Swart.
Ankia Swart.

• Brendan Cowley, C3 Shared Services

• Ankia Swart, Anglogold Ashanti

• Philip Schmerkovitz, TeleEye SA

• Rob Anderson, Adamastor Consulting

Philip Schmerkovitz.
Philip Schmerkovitz.

The discussion included a number of current uses of thermal cameras, including perimeter and other areas, as well as a few insights into what we can expect from these devices in future and the new functionality they will deliver. Needless to say, while there are those who would still like to see reduced restrictions on what type of thermals are allowed to be sold to non-government organisations, but that is unlikely, but the ‘permissible’ technology is advancing significantly and delivering enormous benefits to users.

Another area in which we have seen significant improvements in terms of thermal surveillance was in the area of video analytics. From detecting fires before they become large and dangerous, differentiating between humans and animals, and everyone’s favourite, thermals on drones, thermal cameras have become a standard part of the security and risk management framework. In addition, the use of thermal imaging is being used in different industries with equivalent success rates.

Ankia Swart was able to take the conversation into a more practical space with supplementary information on how her security team makes use of thermals to support its surveillance and security operations.

Come fly with me

Mark Paynter.
Mark Paynter.

Having briefly mentioned drones (or unmanned aerial vehicles) in the panel discussion, Mark Paynter from Securitas sub-Saharan Africa delivered a presentation looking at what was happening in the world of drones, from what technology is in the air now and what it is being used for, through to what is still to come and the potential for this technology. Paynter focused primarily on the security industry, but as with so many technologies, he mentioned other industries and markets where drones are also having an impact – and there are many.

Getting the boring stuff out of the way first, Paynter provided some information about the legal aspects of using drones, laws that make the legal use of these devices quite cumbersome. While recreational use has less legal burdens, commercial drone use is subject to a range of regulations companies and their pilots must adhere to.

Thereafter, Paynter provided an overview of the main types of drones around today: single- or multi-rotor, fixed-wing and helicopter UAVs (and also tethered drones which seem to fall into a legal loophole). He also mentioned where these are best used and their capabilities, such as the height they can reach, cost, stability, power issues and speed. He then touched on the challenges and risks of using drones, focusing on the privacy aspect in particular.

Paynter also looked at some real-world scenarios where drones are in active use today, including in commercial, policing, military and other areas. And if you are worried about a drone invasion of your privacy, he also mentioned some anti-drone technology you can make use of – including birds of prey.

Security is cyber, cyber is security

The final presentation of the day was delivered by Bernard Senekal, MD of Naxian. He delved into the world of cybersecurity and IoT, noting how these issues are not something to be left to the ‘IT guys’, but are integral to the physical security function today – and will be infinitely more important in the future as we fully enter the world’s fourth industrial revolution.

Senekal went on to describe what the Internet of things (IoT) is and why it is important. He also made the point that even though technology is improving and things are getting smarter, this has not meant smarter in terms of security. We are seeing an increased speed of change in terms of technology, more devices doing things that were unheard of a few years ago and many offering ‘free’ applications, but security has been the last consideration for everyone.

To back up his statements of how things have become smarter but not necessarily more secure, Senekal showed a video demonstrating how easy it is to compromise a company, its people, its data and its future by ignoring cybersecurity issues in seemingly irrelevant devices like a printer.

iLegal 2017 was a great success and the overall impressions of the delegates was that the event was relevant and insightful, offering real and valuable information for security decision makers and operations personnel. Hi-Tech Security Solutions would like to extend our thanks to the delegates for taking the time to attend the conference as well as to the speakers who spent a significant amount of time preparing their presentations and delivering them on the day.

iLegal will be back in early 2019, keep an eye in www.ilegal.co.za for more details.


Credit(s)
Supplied By: Technews Publishing
Tel: +27 11 543 5800
Fax: +27 11 787 8052
Email: vivienne@technews.co.za
www: www.technews.co.za
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Habitual awareness
    August 2018, Technews Publishing, News
    Habits are very good things that allow us to carry out the many repetitive tasks we do every day. Our brains automatically form habits to make these repetitive tasks easier and allow us to do them ‘without ...
  • Measure it if you want to manage it
    August 2018, Adamastor Consulting, This Week's Editor's Pick, Security Services & Risk Management, Residential Estate (Industry)
    There is no doubt that one of the differentiators between service providers is going to be the ability to make efficient use of data. We need more data detectives to meet the challenges.
  • Using data to stay secure
    August 2018, Technews Publishing, This Week's Editor's Pick, Security Services & Risk Management, Residential Estate (Industry)
    Situational awareness beyond the boundary walls can have a significant impact on the security of an estate and the wellbeing of its residents.
  • Technology risk assessments
    August 2018, Adamastor Consulting, This Week's Editor's Pick, Security Services & Risk Management, Residential Estate (Industry)
    Rob Anderson says the role of security practitioners is to continually work on mitigating risk, both physical and technological risk.
  • What is a security risk assessment?
    August 2018, Alwinco, This Week's Editor's Pick, Security Services & Risk Management, Residential Estate (Industry)
    Alwinco's Andre Mundell takes a look at what a real security risk assessment is, what it entails and what it delivers.
  • Nice price, but consider the cost
    August 2018, Technews Publishing, CCTV, Surveillance & Remote Monitoring, Residential Estate (Industry)
    The influx of cheap surveillance products in recent years has put the squeeze on everyone in the supply chain, from the more established equipment manufacturers who have to compete with them, to the installers and system integrators who are forced to slash their margins.
  • Efficient and proactive control rooms
    August 2018, Technews Publishing, This Week's Editor's Pick, Integrated Solutions, Security Services & Risk Management, Residential Estate (Industry)
    A question many estate managers face is whether they should keep the control room onsite and manage it and the relevant staff internally, or whether they should opt for a remote monitoring service.
  • Take estate security seriously
    August 2018, Fidelity Security Group, Integrated Solutions, CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection
    While the growth in residential estates continues, crime syndicates continue to target lifestyle estates, more often than not using inside information to gain access.
  • Securing Serengeti
    August 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions, Security Services & Risk Management, Residential Estate (Industry)
    Serengeti Estate offers luxury, golf, conferencing and security, and the estate is on a new growth phase to incorporate more people and services within its 17.5 km boundary.
  • Local estate, local security
    August 2018, Technews Publishing, Residential Estate (Industry), CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection
    Garlington Estate recently made the decision to improve some of its security systems and turned to Excellerate Services to assist in the upgrades.
  • Estate expansion requires access convergence
    August 2018, Powell Tronics, Access Control & Identity Management, Integrated Solutions, Residential Estate (Industry)
    Val de Vie sets the benchmark in secure estate living through the merger of two estates and the associated access and visitor management systems.
  • Major security upgrade for Kindlewood Estate
    August 2018, Technews Publishing, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection
    Kindlewood upgrades to IP cameras for its gates and perimeter security, and biometrics for access control.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.