classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn

Hi-Tech Security Solutions Business Directory

Video evidence from digital devices
September 2008, CCTV, Surveillance & Remote Monitoring

A large part of CCTV’s role in security relates to the gathering of information, allowing visual observation of events, and providing context about what happened. For many people, particularly in the public area, there is an expectation that anything that gets produced from a CCTV is going to be 'perfect'.

Living up to this kind of expectation is always going to be difficult technically, operationally, and in terms of the evidence generation process. There is much that goes into ensuring that CCTV images meet both the substantive and procedural requirements for evidence. Given that CCTV potentially plays such a pivotal role in getting convictions, the defence representatives are going to try and subject it to the maximum scrutiny. They will attack every potential area in order to discredit the evidence. Faced with this, some organisations are reluctant to expose their CCTV to public scrutiny as part of a presentation of evidence.

However, there are literally millions of other collection devices besides CCTV operating within our environment that can potentially contribute visual information as evidence. These include Press video and still photography, private video cams, cell or mobile phones, and these are complemented by additional devices that record audio. Press videos have been used frequently, willingly or unwillingly, in court. Video cam footage features on TV as well as in court, and is also used as a source of footage in investigations. None of these techniques are expected to occupy the same 'high ground' as CCTV, yet in many cases may still be accepted as evidence. A feature such as watermarking, for instance, while becoming integral to CCTV is not expected from all these other technologies.

These alternative sources, or even less than perfect CCTV footage still have the potential for contributing to our understanding of the context of an incident or crime, beyond what we would get from witnesses or the participants. Recently, the BBC ran a website news story (1 April 2008) discussing the fact that the police commissioner of the New York Police Department (NYPD), Ray Kelly, recently called for the public to submit any mobile phone camera images of crime scenes that they thought could help in an investigation. Quoting a Reuters news agency report, they indicated Kelly stating – “It is a fact of life. Everybody has a camera in their telephones. When people can record an event taking place that helps us during an investigation.” The greater our coverage of an event and the better the understanding of the developments within that event, the better any decision arising from it will be. Whether legal, management, safety or any other kind of decision, these different kinds of technologies have a role to contribute. The entering of cellphone video and audio recording information in a South African case recently highlights that such information can have an appreciable impact on the nature of the judgment.

The movement into a digital age, and the fact that many of these devices now record into digital format creates concerns that footage or images may be faked or manipulated. However, this should hardly mean that we disregard all information that does not meet ideal standards. From a legal point of view, the information should be evaluated and tested for its integrity and standing. In the recent case above concerning cellphone evidence, three days of court arguments were made on the admissibility of the information. This extensive process probably reflected the defence attempts to keep a strong element of evidence out of the court which could affect the decision against the client. The judge in question, in deciding to accept the evidence for presentation, neatly got through all the convoluted and expert arguments with a relatively simple set of comments that are as important to CCTV evidence as that of the cellphone that was used. Importantly, he noted (see The Star, pg1, 17 October 2008) that the recordings could not be relied on without corroboration and the fact that they were not tampered with. However, the judge went on to note that there was no expert knowledge needed beyond honesty, intelligence and a good sense of hearing for the particular recordings to be admissible. Raising some key criteria, he indicated among other points the following:

1. Not a single word in the recording had been questioned.

2. That defence did not have another version of what happened, and did not deny that things did not happen in the way portrayed in the recording.

3. That while experts had claimed that digital recording could be manipulated or altered in some way, the defence had failed to show that this had been done.

4. The person collecting the evidence had been accepted as skilled enough to handle and store data.

5. The recordings were audible and clear.

6. The manner in which the information had been generated, stored and communicated has gone unscathed by the defence.

An important point that emerges from this discussion is that just because digital evidence can be altered, it does not mean that it is therefore excluded. The judge above noted “Is it enough to say that it can be altered in the absence of evidence that this actually occurred? (ibid.). There are a number of other criteria by which it may be tested for its authenticity and originality. Even an imperfect CCTV video may be relevant for a case, given the right support. However, some general principles emerge for the case.

* Do not rely only on the video footage unless it has strong technological integrity and has been handled properly.

* Wherever possible, use other sources of evidence to confirm what the video footage is saying.

* Ensure that the person who collected the data can authenticate it and that they are competent in gathering it.

* Minimise any transfer of data and avoid editing data until such time as the status of the original has been confirmed.

* State what the footage is showing and how that is relevant for the case in question – this will determine evidential weight.

* Avoid any potential for sensationalising data or use for publicity purposes as this detracts from the key purpose of the video and suggests alternative interests.

In the judgment discussed above, the judge noted that previous judgments showed that the courts were embracing the digital age with caution. The better the video quality, the building in of technological integrity measures to confirm original data, and ensuring the evidence handling trail are all measures that will assist judges in accepting video evidence. However, there are a range of measures discussed above that organisations can take to ensure that as much information as possible is presented to assist in the decision making process. Given the spread of digital recording devices, these issues will increasingly be on the judicial table in time to come.

Dr Craig Donald
Dr Craig Donald

Dr Craig Donald is a human factors specialist in security and CCTV. He is a director of Leaderware which provides instruments for the selection of CCTV operators, X-ray screeners and other security personnel in major operations around the world. He also runs CCTV Surveillance Skills and Body Language, and Advanced Surveillance Body Language courses for CCTV operators, supervisors and managers internationally, and consults on CCTV management. He can be contacted on +27 (0)11 787 7811 or

Supplied By: Leaderware
Tel: +27 11 787 7811
Fax: +27 11 886 6815
  Share via Twitter   Share via LinkedIn      

Further reading:

  • The changing nature of CCTV surveillance and the demands of crisis handling
    May 2017, Leaderware, CCTV, Surveillance & Remote Monitoring
    While used to traditional physical security responses to threats in outside areas, many managers and staff in surveillance control rooms are facing new challenges.
  • Trusted Platform Module explained
    May 2017, Bosch Security Systems, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security
    Bosch IP cameras, encoders and selected storage systems have an onboard security chip – actually a system-on-a-chip called the Trusted Platform Module – that provides functionality similar to crypto smartcards.
  • Seagate Integration is Milestone Certified
    May 2017, Milestone Systems, News, CCTV, Surveillance & Remote Monitoring
    Milestone Systems has announced that Seagate Technology RealStor is now a Milestone Certified Solution.
  • Security beyond security
    May 2017, Axis Communications SA, Financial (Industry), CCTV, Surveillance & Remote Monitoring, Asset Management, EAS, RFID
    The use of security solutions can extend beyond security in financial organisations.
  • Top CCTV
    Securex 2017 preview, CCTV, Surveillance & Remote Monitoring
    Top CCTV is a CCTV superstore and wholesale supplier in South Africa for a full range of CCTV cameras, DVRs and surveillance products. It has been providing solutions to customers for more than 10 years ...
  • Frank Street
    Securex 2017 preview, Frank Street, CCTV, Surveillance & Remote Monitoring
    Frank Street will be exhibiting the latest Milesight and Luxriot EVO product ranges as well as its own spy camera range. Milesight will introduce the Milesight PTZ bullet camera, a first of its kind, ...
  • FLIR
    Securex 2017 preview, FLIR Systems, CCTV, Surveillance & Remote Monitoring
    FLIR announced four new security products recently. The new products include FLIR United VMS 8.0, the latest version of the company’s flagship video management solution (VMS), and three high-performance ...
  • GeoVision SA
    Securex 2017 preview, GeoVision SA, CCTV, Surveillance & Remote Monitoring
    GeoVision SA will again be participating in this important annual security event and numerous new products will be on display, in particular its IP range. A new high-tech, but very affordable mini dome ...
  • Desert Wolf Consulting
    Securex 2017 preview, CCTV, Surveillance & Remote Monitoring, Transport (Industry)
    Desert Wolf supplies rugged mobile solutions. With more than two decades’ experience, Desert Wolf strives to produce only the best logistical support trailers and complete military and commercial mobile ...
  • Keystone Electronic Solutions
    Securex 2017 preview, Keystone , CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management
    Keystone Electronic Solutions is an electronics research and development company. During Securex 2017 the company will be showcasing Project V, a ‘stream on trigger’ solution that provides centrally managed ...
  • Hitek Security Distributors
    Securex 2017 preview, HiTek Security Distributors, CCTV, Surveillance & Remote Monitoring
    The house of ProvisionISR, INIM Electronics & DUEVI, presents expert solutions to all your security requirements. Offering you the latest in advanced technology from CCTV and alarm systems to home automation. Visit ...
  • Graphic Image Technologies
    Securex 2017 preview, Graphic Image Technologies, CCTV, Surveillance & Remote Monitoring
    Graphic Image Technologies (GIT), specialists in both remote and enterprise CCTV and control room technologies, will be showcasing its latest range of SerVision and FLIR products and solutions that feature ...

Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Terms & conditions of use, including privacy policy
PAIA Manual
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.