Leveraging intelligence information for surveillance

August 2003 Surveillance

Traditionally, many security departments were composed of a physical security side and an investigations section and these were relatively distinct in their emphasis and function. The introduction of the electronic security measures of CCTV surveillance and access control introduced an additional factor into the way sections of security were managed and related to one another.

These electronic techniques introduced a sudden rush of information available for the department to use, but also raised issues of who had access to this information. It also raised the issue of who directed the CCTV surveillance team on what to look for and whom to watch. This has resulted in a degree of tension in many operations between the surveillance and investigations sides, and this is also reflected in some police and city centre CCTV operations in the UK. Companies have adopted various ways to structure the security department and responsibility for surveillance, sometimes splitting up surveillance into different activities under different sections, having surveillance as a fully independent function, or having surveillance report through one of the other sections.

In an attempt to make security more proactive, intelligence functions are increasingly being developed to assist in defining the strategy for the security function. Historically, intelligence has being associated with national security, military and at times policing. In an article by Jeff Corkill and Craig Donald in CCTV Today (March/April, 2003), however, they point out that intelligence is becoming more common across industry as well. Similarly, Peter Fry of the CCTV User Group indicates that intelligence is being increasingly seen as a part of designing effective crime fighting strategies. Whether through formal intelligence personnel, sections, or done on an informal basis, intelligence provides a better perspective of the crime dynamics in the area one is dealing with, and allows you to adjust your strategy accordingly. While some big companies/industries are developing their own intelligence functions, smaller operations in anything from town centres, precious metals plants, and even shopping centres are building an intelligence perspective in order to detect theft patterns.

Proactive CCTV

Intelligence provides potential insights into a number of crime dynamics, including criminal resources, networks, channels, communication, syndicate members, kinds of targets, and levels of activity. However, while investigations have typically been a closed section reluctant to compromise information by sharing it with others and risking leakage, intelligence tends to be even more so. The big question then is how does one translate intelligence into a practical response at an operational surveillance level.

Proactive CCTV surveillance is dependent on the ability to anticipate and make timely decisions in response to an incident. The initial detection of the incident, the quality of evidence gathering, and the arranging of a security response are all influenced by the timeous recognition of the incident. Intelligence provides the basis for a number of factors that can contribute to this timeous recognition. This includes factors to look for such as:

* The risk of an incident occurring.

* The type of potential incidents.

* The modus operandi.

* The likely suspect profile.

* The likely victim/theft object type.

* Expected times when incidents are most likely to occur.

Area of intelligence

Areas of intelligence that can provide aspects of the above as well as giving a more in-depth context for personnel to view situations and developments are discussed briefly below. These are by no means the only areas of intelligence, but provide some of the immediate details that are relevant to surveillance.

1. Environmental intelligence - information relating to the immediate and adjacent environments covered by the CCTV system. Hot spots, entry and exit points, expected densities of people/objects and threat profiles. Maps are often used to give an indication of the threat profile. At a basic level, even the use of coloured pins to establish kinds of threats that have occurred in different locations gives an immediate visual analysis.

2. Target identification - identification of the people or profiles of people likely to be involved, the vehicles they drive (ideally with registrations), and the people they meet as part of the process. Contact behaviour may also be part of this, for example how users approach drug dealers tends to be characteristic in locations where this happens.

3. Movement and flow analysis - movement of people and objects within the target environment. This then allows the detection of variations from the norm as indicators that something is potentially going to happen or is happening.

4. Counter intelligence support - information on methods and techniques employed by criminals to avoid detection by the surveillance system. Criminals are continually trying to find new ways around security systems and keeping up with these places operators in a good position to adjust their own practices and maintain detection performance.

5. Indicators and warnings - issues around demands for commodities likely to be stolen, increased levels of contacts between suspects, scouting behaviour around a particular location, areas potentially being compromised.

Intelligence can come from external sources, informants, and a good appreciation by intelligence officers of the situation around them. However, an appropriate and thorough analysis of information generated within the security department and through reporting can produce useful insights into crime patterns without having to go outside the organisation. Analysing CCTV footage after the incident to profile events and find themes, characters and behaviour is useful, as well as debriefing people involved. Given that a thief who steals once is likely to repeat the process, the likelihood of the theft behaviour being repeated is strong.

Maintaining an intelligence function, whether as part of the formal structure or informally analysing information generated within the department requires a dedicated and systematic effort. It also needs to be maintained on an ongoing basis. Further, the trust levels between intelligence and surveillance personnel needs to be high. Confidential information needs to be maintained in-house, especially where it concerns sensitive targets, and intelligence personnel need to be confident that it will remain so. Finally, there needs to be reciprocal exchange.

Surveillance has a major part to play in following through and leveraging the intelligence information. However, it also can play a major role in testing out assumptions and providing a whole range of details to enhance the intelligence process. These will be discussed in more depth in a later article.

Dr Craig Donald is an industrial psychologist and specialist in human factors in security and CCTV. He is the co-developer of the Surveillance and Monitoring Assessment Exercise (SAMAE) for the selection and placement of CCTV operators and presenter of the CCTV Surveillance Skills training course. He can be contacted on telephone: (011) 787 7811, fax: (011) 886 6815, or e-mail: craig.donald@leaderware.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Banking’s AI reckoning
Commercial (Industry) Surveillance Access Control & Identity Management Fire & Safety Perimeter Security, Alarms & Intruder Detection Information Security Asset Management News & Events Integrated Solutions Infrastructure Security Services & Risk Management Education (Industry) Entertainment and Hospitality (Industry) Financial (Industry) Healthcare (Industry) Industrial (Industry) Mining (Industry) Residential Estate (Industry) Retail (Industry) Transport (Industry) Conferences & Events Products & Solutions Associations Videos Training & Education Smart Home Automation Agriculture (Industry) Logistics (Industry) AI & Data Analytics Facilities & Building Management IoT & Automation Power Management
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
Securing a South African healthcare network
Surveillance Healthcare (Industry) AI & Data Analytics
VIVOTEK partnered with local integrator Chase Networks and distributor Rectron to deliver a fully integrated security ecosystem, providing PathCare with a centralised view of all facilities, simplifying monitoring of sensitive laboratory areas, and ensuring SOP compliance.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
Proactively enhancing campus safety
Surveillance Products & Solutions
Strengthening security management and proactive alerting have become priorities for schools. To address risks such as expansive campuses, multiple entry points, blind spots, and potential intrusions.

Read more...
Smarter investigations in Security Center SaaS
Genetec Surveillance
Genetec has announced new intelligent automation (IA)-powered investigation capabilities in Security Center SaaS to help operators quickly locate video evidence, understand the context surrounding an event, and close cases in minutes.

Read more...
ONVIF to end support for Profile S
News & Events Surveillance
ONVIF has announced that it will end support for ONVIF Profile S and recommends using its successor, Profile T. Profile S is the first-ever profile introduced by ONVIF in 2011.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Recording 40 high-resolution channels
Dallmeier Electronic Southern Africa Surveillance Products & Solutions
With the new MK4 revision of the DMS 2400, Dallmeier introduces a more powerful version of its video appliance, enabling the recording of up to 40 high-resolution video streams, and offering significantly increased capacity.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.