Structuring CCTV viewing

August 2018 Editor's Choice, Surveillance, News & Events

In the early days of CCTV, operators were usually placed in front of monitors and told to look for things that were suspicious. Few actually knew what qualified as an issue, and extensive time was spent looking at moving pictures not really knowing what to look for.

In fact, this still isn’t entirely uncommon today. The exception in those days was the casino industry which has always had an extremely focused nature to surveillance. Part of this is having the industry governed by gaming boards, which provide a regulatory effect in the industry. However, early casino monitoring was characterised by fairly élite surveillance practioners for whom detection was a critical deliverable from their job and catching people was part of their motivation.

In my experience it was the diamond industry that was the first to develop a structured approach to surveillance. This was done through the development of a rules-based approach, where people were given access to do particular duties in a high risk area, and they were kept under surveillance to ensure that they did the required activity and didn’t commit any offences during that time.

Operators were still allowed some space for independent viewing. Surveillance, however, has become increasingly more focused over time, with operators having to address specific issues and administration becoming an overarching part of their jobs in some cases where this structured surveillance is addressed. In extreme cases, it has meant that surveillance has done less and less ‘natural hunting’ for targets, and has instead become more of a simple auditing function.

Structured surveillance strategies

The guiding or structuring of surveillance activities still remains an important concept, and the use of rules-based surveillance can be applied to a range of industries and is just as important now as it was then. This is pushing the focus of surveillance forward. It can be achieved through things like task based observation, structured profiling of people or areas, covering of critical events, intelligence led surveillance, or even a more effective surveillance strategy where the most important areas and times determine what is shown to operators.

In addition, alarm triggered monitoring such as motion detection or video analytics conditions (sometimes known as blank screen monitoring) can direct surveillance to relevant areas. Where these become part of an integrated and balanced strategy, they can play a major role.

I find it incredibly frustrating when I visit a control room and the operators have no real idea of what they are looking at or looking for, have never received training in the physical area they are covering, and do not have an comprehension of crime dynamics and how to use crime-based analysis to pick up possible incidents. For me, one of the major benefits of surveillance is the potential to spot an incident occurring well in advance, and arrange to either prevent it, or to get excellent evidence and apprehend the suspect.

Dr Craig Donald
Dr Craig Donald

Good hunting

This does call for some unstructured viewing time so operators can show their worth and pick up things themselves, translating this into detection rate. However, it will only happen if they are given a context in which to view things, a thorough knowledge of what they are looking for, and an awareness of how to identify relevant crime behaviour and dynamics.

I see a danger in the way some operations function, where operators get lost in simple audit and administration functions. It is almost as bad as leaving them alone with no support at all. At the end of the day, operators need a little ‘hunting’ to keep sharp. Ultimately, the success of a CCTV operation is whether it detects incidents, not whether it runs smoothly.

Dr Craig Donald is a human factors specialist in security and CCTV. He is a director of Leaderware which provides instruments for the selection of CCTV operators, X-ray screeners and other security personnel in major operations around the world. He also runs CCTV Surveillance Skills and Body Language, and Advanced Surveillance Body Language courses for CCTV operators, supervisors and managers internationally, and consults on CCTV management. He can be contacted on +27 11 787 7811 or [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Re-imagining business operations with the power of AI
AI & Data Analytics Surveillance
inq., a Convergence Partners company, has introduced a range of artificial intelligence (AI) solutions to assist organisations across industry verticals in optimising business operations and improving internal efficiencies.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...