Surveillance strategy - surveillance functions and levels

May 2002 Surveillance

The surveillance strategy that is appropriate for any operation will consist of a number of functions or activities. These functions are important not only in defining what you are going to do, but also in setting up an appropriate departmental structure, clear job definitions and responsibilities, and appropriate manpower and training in order to carry out the objectives of the system.

The types of surveillance functions will require different levels of expertise. Activities therefore need to be consistent with formal levels of expertise within the department. A general principle is also to have a system of audit checks to verify the quality of surveillance. This is typically accomplished through a series of levels or tiers of surveillance. These tiers are also consistent with the levels of skill development and may provide a career path for operators entering the surveillance function. Some of the possible functions are described under general headings below.

Basic surveillance functions

* Camera patrolling: This is the detection of intruders or the presence of people in areas where they should not be. Camera patrolling can also led to the inspection of sites to detect incidents and the detection of events (eg diamond spillage).

* Remote escorts: Surveillance of personnel walking through or working in an area. This could be aimed at detection (eg theft while in an area), or protection (eg remote escorting of tourists through known crime spots).

* Picture comparison: Verification of the identity of personnel requiring access to areas.

* Camera checks: Checks that cameras and system are working.

* Direct incident detection: Live surveillance aimed specifically at the detection of incidents where people are in working areas or to detect scenes in public areas. This could include theft of articles, nightclub violence, or visual searches.

* Incident handling: When an incident is detected, responsibilities need to be allocated for continued tracking of the parties to the incident while also arranging and controlling a police or security response to the incident. It is difficult for a single operator to do both of these simultaneously and ideally there needs to be some kind of 'handover'.

* Verify compliance to rules/work procedures (eg casino table procedures/diamond sorting). This is an essential part of the casino environment, but companies like DeBeers have also implemented 'rules-based systems' that provide a structured basis to guide people's actions in high-risk areas.

* Monitoring of high risk situations in the production environment: Certain high risk activities are likely to occur within any environment. When these occur, more intensive surveillance should be directed at them. This could include things like cash (or goods) in transit transfers, occasions when working with objects such as gold, high value casino chips, or volatile public situations). This kind of surveillance may require expertise knowledge in the critical area.

* Alarm inspection: Live inspection of alarms generated through motion or infrared detection. These usually display on monitors automatically, either through blank screen technology or on allocated monitors.

* Recording of suspicious behaviour: Behaviour that seems out of place or inappropriate, but does not clearly show an incident should be recorded for follow up by more senior personnel.

Advanced surveillance functions

* Dedicated surveillance on specific suspects: This can be referred to as directed, focussed or targeted surveillance. It involves the tracking and in-depth surveillance of suspects including their behaviour, movement and contacts. Often such surveillance is driven by intelligence or profiling information. This can occur both in work and public environments.

* Coaching/training: Coaching of other operators, particularly junior personnel on surveillance techniques and situational awareness of what is happening in those sites.

* Profiling of individuals: This involves profiling individuals' behaviour, characteristics and even lifestyle to identify anomalies or signs of involvement in criminal dealings. Key to this is having an acceptable and ethical set of criteria for profiling. With such profiling, changes or out of the ordinary behaviour can be examined more closely to see if these are related to incident conditions.

* Profiling of situations: Situational profiling can reflect two major themes. The first of these is to establish normal benchmarks of performance or behaviour. This then allows one to recognise anomalies or breaks in the normal process. Secondly, profiling of unusual events within a specific location provides the basis to assess the risk within these situations. A number of occurrences or events, for example, may lead to the identification of a theme or consistent elements. One would like to establish things like whom is involved, when and what time it happens, and actions that occur. This may lead to identifying hotspots or directing surveillance on certain people when they are in those situations.

* Crime profiling: The more one knows about techniques and methods of a particular kind of theft, the better one is prepared to detect it. Crime profiling involves building up these signs for different criminal incidents to make it simpler to detect the crimes when they occur.

Auditing functions

* Review and auditing: This auditing generally occurs at a higher level than the initial operator viewing. This is because such an audit function requires greater expertise in order to pick up incident conditions. Typically, the increased expertise, the time available to repeat viewing of suspicious scenes and the option of slow motion replays will lead to a appreciable rate of detection of incidents during review that are not initially picked up. However, review has a critical quality control function in the following areas:

• verifying views of first tier viewing (what is covered and not covered)

• verifying integrity of first tier viewing (quantity and quality of detection)

• inspecting camera views not covered live by first tier.

* Alarm reviews: This is the systematic offline review of alarms generated by the system. This is sometimes addressed through a video management system that logs the alarms and initial few seconds of video to allow evaluation of the causes of the alarm. Whether such reviews are done manually or through automated systems, causes of alarms need to be addressed as part of a programme to reduce alarms to manageable levels.

Specialist functions

* Reconciling risk profiling across areas/time and people: Trend and pattern analysis of information from multiple sources to identify risk areas and people.

* Maintenance of individual profiling database and identification of investigation needs.

* Identification of targets: Identification of targets for dedicated surveillance and developing strategies for syndicate detection.

* Crime pattern reports: Analysis of incidents and implications for surveillance strategy and planning.

* Evidence handling: Handling and preparation of case for detected incidents.

These functions or activities can be allocated into a 'tier' system based on requirements of the organisation. As indicated, the functions themselves, and the way they are organised into 'tiers' will vary from operation to operation. Indeed, some operations may only have a single tier position, although a number of activities would have to be sacrificed as part of this. Table 1 provides a guideline for this allocation.

Table 1. An outline of how surveillance functions can be allocated to different tiers
Table 1. An outline of how surveillance functions can be allocated to different tiers

Full implementation of all functions outlined above requires a strong commitment of resources. For most operations, priorities and the nature of surveillance will determine what gets covered. It is probably better, however, to do less things well than to try and cover too many options with insufficient resources so they cannot be addressed effectively. The use of business applications and process enhancement is also an area that can be addressed but is not included in the table.

This is why the early definition of a surveillance strategy needs to consider how the CCTV system is going to be used so resources, people, and the work infrastructure and procedures can be aligned effectively in order to achieve the required objectives.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Human-centric control rooms
Iritron Integrated Solutions Surveillance Residential Estate (Industry)
Iritron and Oculus show that when it comes to control rooms, people, not just technology, are at the centre of the most significant performance differentiators today, not just how efficiently the technology works.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Secure, long-distance thermal from Keenfinity
Products & Solutions Surveillance Residential Estate (Industry)
The DINION thermal 8100i camera is a bullet thermal camera built for mission-critical applications, prioritising long-distance monitoring and reliable perimeter intrusion detection with built-in Intelligent Video Analytics (IVA) Pro Perimeter video analytics.

Read more...
IVA AI Pro Visual Gun Detection
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of the IVA AI Pro Visual Gun Detection analytics based on deep learning. It is designed for automatic detection and classification of people and brandished firearms.

Read more...
IP-based horn loudspeakers
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of its new IP-based horn loudspeakers and amplifier module: the high-output LHN-UC15L-SIP horn (for long-throw applications), the compact LHN-UC15W-SIP horn (for wide-angle coverage) and the AMN-P15-SIP amplifier module.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
LiDAR protects railways from new and existing dangers
Surveillance
3D LiDAR (Light Detection and Ranging) sensors are being installed to monitor rail traffic and ensure safety of passengers as well as individuals walking near the tracks, or trying to perform dangerous stunts for social media.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.