CCTV - is only part of the security solution

November 2006 Surveillance

CCTV is typically introduced as a solution to a crime or disorder problem, often as a spontaneous reaction to problems that have occurred.

It is seen as an all-powerful technology by some people. Suggestions are often voiced that if CCTV is installed, it is the total solution to the problem. However, although CCTV is an extremely useful technology, it is best used in conjunction with a number of other crime prevention measures. These other crime prevention facilities include physical security measures, access control, and response and guarding facilities.

Physical security includes fences, barriers, alarms and perimeter protection. These are all measures to prevent or restrict access to an area or goods, to alert security personnel to the presence of someone in an area, to channel the movement of personnel or to warn of violations of some kind. CCTV cannot provide a similar barrier function.

It can, however, complement physical security measures through auditing of facilities, detection of breaches, providing a follow up investigation function and identifying causes of alarms, and even replacing some of the alarm functions through video motion detection and other video analysis techniques. In this context, CCTV has an important part to play in maintaining the integrity of physical systems that can be broken, breached, or bypassed.

There is also a reciprocal relationship between some aspects of physical security and CCTV. For instance, lighting has a direct impact on reducing crime, but is also required to create the conditions under which CCTV can function effectively. I have heard on a number of occasions when the effectiveness of a CCTV system has been compromised because the available lighting is not enough to deliver appropriate results to the system.

While CCTV can assist with physical security, it cannot replace it, and in fact it requires it. The need for secure CCTV control rooms and the protection of operators and data is a simple example of this.

Controlling access

Access control relates to how the movement of people and goods is regulated and organised. This control allows the verification of identity or purpose, provides for the recording of details, ensures approved entry, and allows searches of people, goods and vehicles to maintain the integrity of the site. However, access can involve virtually no regulation, for example in retail stores, or it can involve high regulation such as government key points or airports.

CCTV can relate to access control in a number of ways. Just being able to identify the person who has entered an area provides a key function. This is reflected in the frequent use of cameras directed towards the occupant of the car or vehicle at vehicle booms, which record identify when the person presses a button to open the boom. In another context, face recognition can provide the basis for access. Picture comparison systems controlled by operators may provide a similar remote access control function.

CCTV may also be used for ensuring the integrity of access points. For example, detecting people tailgating to get an unauthorised person through access control when another one badges etc.

Similarly, CCTV can also be used to audit that procedures are followed by access control personnel, or monitor the efficiency of these processes by identifying build-ups of queues etc. Access control points and the interruption of normal flow can also create opportunities for crime, ranging from the theft of goods to pick-pocketing in crowded situations. X-ray points, for example, are one of the areas vulnerable to this. In some cases where suspect behaviour is observed using CCTV, access control systems can provide identification of the targets where camera views do not provide this. However, although CCTV can often play a useful part in identifying people who have been through access points (eg the London bombers), it cannot in itself provide access control.

Guarding and reaction personnel provide a deterrent, detection, and also a response role when incidents occur. In this context, CCTV is increasingly assuming the deterrent and detection functions. However, CCTV remains a passive technology in that viewing an incident is very different from the physical response to an incident. Response personnel need to be called and directed to the incident and suspect personnel.

There are two things that will determine the success of this. The first is the quality of communication and incident handling skills that the CCTV operators demonstrate. The second is the capacity and speed of the response to the site of the incident. The success of CCTV can be severely damaged by poor or excessively slow response rates.

CCTV strategies therefore need to be looked at from a systems wide perspective - not just for surveillance, but security more generally. The more CCTV can be integrated into the rest of the security and protection facilities, and the more it can complement and leverage these, the more successful it will be in implementation.

Dr Craig Donald
Dr Craig Donald

Dr Craig Donald is a human factors specialist in security and CCTV. He is a director of Leaderware, which provides instruments for the selection of CCTV operators, X-ray screeners and other security personnel in major operations around the world. He also runs CCTV Surveillance Skills and Body Language, and Advanced Surveillance Body Language courses for CCTV operators, supervisors and managers internationally, and consults on CCTV management. He can be contacted on +27 (0) 11 787 7811 or craig.donald@leaderware.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
CAA-compliant ground drone outsourcing
Surveillance IoT & Automation
South African mines, estates, utility companies, independent power producers, ports, municipalities and others can now own and operate a CAA-compliant drone dock ground station in just six to eight weeks.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
Securing a South African healthcare network
Surveillance Healthcare (Industry) AI & Data Analytics
VIVOTEK partnered with local integrator Chase Networks and distributor Rectron to deliver a fully integrated security ecosystem, providing PathCare with a centralised view of all facilities, simplifying monitoring of sensitive laboratory areas, and ensuring SOP compliance.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.