Leveraging wide-area CCTV evidence

July 2017 Editor's Choice, Surveillance

CCTV coverage across buildings, city blocks, cities and even intercity camera footage is being used increasingly to deal with major crime or terror violations in the UK. I use the term ‘wide-area CCTV’ to describe this.

At a UK CCTV User Group conference in May, a counter-terrorism police office spoke in depth about how CCTV was used to track the killer of an elderly Imam and the bomber of three mosques. Ironically, the night before the presentation was the time of the suicide bombing at the Manchester concert. The same CCTV techniques would have been immediately applied to that case, as the UK police strategy to pursue terrorists at all parts of the social spectrum is based on the same CCTV review strategy.

What stands out about the presentation was the way in which the UK police can systematically make use of CCTV evidence over an extended area, systematically working out the movements of a person over areas and time. Recent subsequent terror events confirmed the effectiveness of their police performance in this regard.

The crime scene is obviously a major area of focus, but the investigation gets expanded to the approach of the suspect to the crime scene as well as leaving. Contrasts in what they are wearing or carrying and the nature of the goods are reviewed. All of these become clues for further CCTV pursuit.

In the case of the Imam murder, CCTV was used to identify the route the person took to the scene, things like buying tickets for the bus, footage waiting for the bus and on the bus to identify the suspect, the subsequent town area that he then moved through after the bus ride, to the route that was taken to the area where he stayed. Shops that he went into were also reviewed, and where he purchased certain components of the bombs were also identified. A similar process with the Manchester suspect was also used, where police quickly released video pictures of where the suspect had purchased items used, even to the clothing that he was wearing when doing so and how it was consistent with the evidence remaining after the bomb blast.

This is not a new thing in the UK, possibly based on the fact that the country has faced one of the most sustained experiences of terrorism in the world. From IRA bombings years ago, and from the 1999 case of the Brixton Bomber, David Copeland who set off three bombs killing three people and injuring many, CCTV has been used systematically by the UK police. In the case of the Brixton Bomber, a bag logo viewed from within a store at the first site was used to define height and clothing, including a cap that was subsequently identified in the second bombing, leading to a positive identification.

It is also not a process that is defined by terrorism. Many town centres in the UK plot out both public and private camera coverage to assist in the tracking and apprehension of crime suspects. While control rooms in town centres in the UK are often relatively understaffed compared to sites in South Africa, for example, the forensic capacity of police to follow up and track suspects is probably the best in the world. Police are analysing the suspects’ activities, associations and potential involvement from days before the incident actually occurred.

This is not limited to the UK. Counties like Australia have followed a similar path, with a project called Blue Iris in Perth city centre where all parties with CCTV cameras in the city centre register camera coverage which can be used for police investigations.

The systematic use of CCTV evidence is aimed not just to identify people at the crime scene, if this is possible, but to follow and build clues around identity, location, and a profile of the person. Ultimate identification of the person may happen in another city based on CCTV tracking follow through. The objective is to identify and make the most of anything about the person, and to building a chain of evidence which is going to be as robust as possible. What it means for criminals or terrorists is that identity, activities and associates may be identified by actions hours or even days before the criminal action. It also means that profiling of suspects is maximised to get every last scrap of information available and leverage this in an investigation.

In the South African scenario, we have a glaring absence of any systematic use of wider CCTV information by almost all parties. One of the common activities by UK police when looking at a crime scene is to immediately start looking for cameras that can be used. While crime site information is generally used and looked at in South Africa, extending to a wider framework of CCTV coverage in the community and other information is typically neglected. This is obviously a manpower intensive operation and certainly not all crimes can be subject to such thorough investigation.

Casinos are possible an exception. Even since using VCRs, casinos systematically reconstruct crime behaviour and actions of suspects on site, potentially creating a narrative of people moving from activity to activity after a major crime or scam. Yet casinos and sites such as shopping centres and major banks operate in an extended community and can work with such communities with mutual benefits in a wide-area surveillance network.

We have seen some use of widespread surveillance gathering such as toll booth stations and cellphone tracking in dealing with crime, but the use of CCTV has typically fallen short. The use of wide-area surveillance promises potential for not just tracking and follow-up after crimes, but used live, offers the potential for forewarning based on things like number plate recognition or facial recognition of known suspects. It offers a major potential tool that can be used to reduce crime, and something to make it very difficult for criminals to hide.

Dr Craig Donald is a human factors specialist in security and CCTV. He is a director of Leaderware which provides instruments for the selection of CCTV operators, X-ray screeners and other security personnel in major operations around the world. He also runs CCTV Surveillance Skills and Body Language, and Advanced Surveillance Body Language courses for CCTV operators, supervisors and managers internationally, and consults on CCTV management. He can be contacted on +27 (0)11 787 7811 or craig.donald@leaderware.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Banking’s AI reckoning
Commercial (Industry) Surveillance Access Control & Identity Management Fire & Safety Perimeter Security, Alarms & Intruder Detection Information Security Asset Management News & Events Integrated Solutions Infrastructure Security Services & Risk Management Education (Industry) Entertainment and Hospitality (Industry) Financial (Industry) Healthcare (Industry) Industrial (Industry) Mining (Industry) Residential Estate (Industry) Retail (Industry) Transport (Industry) Conferences & Events Products & Solutions Associations Videos Training & Education Smart Home Automation Agriculture (Industry) Logistics (Industry) AI & Data Analytics Facilities & Building Management IoT & Automation Power Management
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
ONVIF to end support for Profile S
News & Events Surveillance
ONVIF has announced that it will end support for ONVIF Profile S and recommends using its successor, Profile T. Profile S is the first-ever profile introduced by ONVIF in 2011.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.