The role of CCTV in solving crimes

CCTV Handbook 2005 Surveillance

Welcome to the first IP-CCTV handbook. It is full of information which will be of interest to anyone involved in the design, specification, installation or usage of surveillance solutions. As always I would welcome your feedback if you feel we have missed the point, or erroneously positioned marketing hype as fact.

CCTV has had a profound impact on crime prevention and detection, and is never out of the news for long. However, coverage is often rather stereotyped, and there is a tendency to ignore key issues. The IP-CCTV Handbook seeks to redress the balance by focusing on issues that have a profound effect on vendors and users of surveillance systems.

London 7/7

One thing that is abundantly clear, is that CCTV still plays an intrinsically important role in the combating of crime. In simple terms, surveillance cameras are our 'eyes' when we cannot be everywhere at once. They help us 'see' when our own eyes are closed. And probably, most importantly, they provide us with evidence which support the facts.

Consider the recent London bombings (three explosions on London Tube trains and one on a bus, killed at least 55 people, including the bombers). According to www.BBC.co.uk, the Police (on Sun 17 July) have already released a CCTV image of the four London bombers together as they set off on their deadly mission. The four men were pictured entering Luton rail station at 0720 BST on Thursday 7 July on their way to London.

Police confirmed the names of all four bombers: Mohammed Sidique Khan, 30; Shehzad Tanweer, 22; Hasib Mir Hussain, 18 and Germaine Lindsay, 19.

The CCTV picture was released in an attempt to find out more about their final movements. Peter Clarke, head of the Anti-Terrorist Branch, said: "The investigation continues on many fronts, but we have been very grateful for the contribution made by the public in response to our previous appeals. However, we still need to find out more about these four men and their movements, both on the morning of the bombings, and in the days and weeks beforehand."

The collision between security and IT

Probably one of the most interesting articles published in this handbook is the Cisco case study of its own security installation, and which graphically illustrates the complexity of convergence.

According to Deon Chatterton, program manager for the Cisco Security, Technology, and Systems group, the chief lessons learned from the transition to digital CCTV pertain to making the best use of Cisco IT resources. "Physical security and IT security are converging," says Chatterton, "and the two groups need to work more closely than before. When we managed the servers ourselves, a hardware or software problem was a serious issue for the department. Now we just generate a case and IT uses its technical resources and expertise to resolve the issue. We had to shift our culture to let IT do the work and run through its own processes." Chatterton also notes that for a successful partnership, IT has to fully understand and agree with the project goals.

Another lesson learned is that training is essential. "As the use of technology for physical security increases, computer-literacy will become increasingly important," says Lang. "Systems are no better than the competent people who run them. We need to do a good job of training investigative staff to manipulate and understand CCTV over IP." Chatterton and Lang have held training classes for Cisco staff across the United States, Europe, Middle East, and Africa, the Asia-Pacific region, and Japan.

Finally, Bill Jacobs, manager of safety and security, Cisco Systems, notes that the key to a successful CCTV over IP deployment is preplanning. "Make certain that you totally understand your own group's responsibilities and IT's responsibilities," he says. "And make sure that management understands the costs and implementation effort needed to get the project going." At Cisco, for example, IT agreed at the outset to provide the funding for the hardware, but acquiring the funds for installation, maintenance, and monitoring required negotiating. "For a global deployment like ours, it is helpful to work with someone who has authority to approve the project worldwide so that you do not have to negotiate separately with someone in each theatre," says Chatterton.

All parties agree that the culture change required to partner with IT yielded dividends. "The increased reliability, increased accuracy, and reduced manpower requirements of a digital CCTV solution with IT management, completely offset the costs," says Jacobs.

So, enjoy the read. And if you think we have got it right (or wrong), we would love to hear from you.

Sincerely,

Darren Smith



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

When your security starts thinking with you
Secutel Technologies Surveillance Perimeter Security, Alarms & Intruder Detection AI & Data Analytics
If you manage a warehouse or logistics environment, you already understand how quickly risk can escalate during the day and after hours. The question is: how quickly can you respond?

Read more...
SWEAR integrates with Milestone
Milestone Systems Surveillance Products & Solutions
Security footage, legal evidence, and other critical surveillance assets face increasing risks of tampering, raising chain-of-custody questions, jeopardising admissibility, and undermining the timely operational decisions that depend on credible video.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Smarter surveillance in a connected world
Securex South Africa Surveillance IoT & Automation
The security sector is moving rapidly towards integrated, intelligence-led environments. Organisations want systems that communicate with each other, deliver meaningful insight, and support operational efficiency without compromising cybersecurity or privacy.

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
From surveillance to strategic business infrastructure
Axis Communications SA Surveillance
The Axis Perspectives Report 2026 describes how intelligent IP cameras are evolving beyond traditional surveillance to become an increasingly embedded component of operational infrastructure, supporting security, safety and broader business performance.

Read more...
From the editor's desk: When the rules change
Technews Publishing News & Events
         Welcome to the SMART Surveillance & AI Handbook 2026. We were a bit nervous about including AI in the title, since it either has a good or bad reputation depending on the individual – very few people ...

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Security’s three defining forces for 2026
Milestone Systems AI & Data Analytics Surveillance IoT & Automation
As we move into 2026, several technology trends that were once mostly confined to research labs and conference keynotes are now becoming part of the daily reality of the security industry.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.