The role of CCTV in solving crimes

CCTV Handbook 2005 Surveillance

Welcome to the first IP-CCTV handbook. It is full of information which will be of interest to anyone involved in the design, specification, installation or usage of surveillance solutions. As always I would welcome your feedback if you feel we have missed the point, or erroneously positioned marketing hype as fact.

CCTV has had a profound impact on crime prevention and detection, and is never out of the news for long. However, coverage is often rather stereotyped, and there is a tendency to ignore key issues. The IP-CCTV Handbook seeks to redress the balance by focusing on issues that have a profound effect on vendors and users of surveillance systems.

London 7/7

One thing that is abundantly clear, is that CCTV still plays an intrinsically important role in the combating of crime. In simple terms, surveillance cameras are our 'eyes' when we cannot be everywhere at once. They help us 'see' when our own eyes are closed. And probably, most importantly, they provide us with evidence which support the facts.

Consider the recent London bombings (three explosions on London Tube trains and one on a bus, killed at least 55 people, including the bombers). According to www.BBC.co.uk, the Police (on Sun 17 July) have already released a CCTV image of the four London bombers together as they set off on their deadly mission. The four men were pictured entering Luton rail station at 0720 BST on Thursday 7 July on their way to London.

Police confirmed the names of all four bombers: Mohammed Sidique Khan, 30; Shehzad Tanweer, 22; Hasib Mir Hussain, 18 and Germaine Lindsay, 19.

The CCTV picture was released in an attempt to find out more about their final movements. Peter Clarke, head of the Anti-Terrorist Branch, said: "The investigation continues on many fronts, but we have been very grateful for the contribution made by the public in response to our previous appeals. However, we still need to find out more about these four men and their movements, both on the morning of the bombings, and in the days and weeks beforehand."

The collision between security and IT

Probably one of the most interesting articles published in this handbook is the Cisco case study of its own security installation, and which graphically illustrates the complexity of convergence.

According to Deon Chatterton, program manager for the Cisco Security, Technology, and Systems group, the chief lessons learned from the transition to digital CCTV pertain to making the best use of Cisco IT resources. "Physical security and IT security are converging," says Chatterton, "and the two groups need to work more closely than before. When we managed the servers ourselves, a hardware or software problem was a serious issue for the department. Now we just generate a case and IT uses its technical resources and expertise to resolve the issue. We had to shift our culture to let IT do the work and run through its own processes." Chatterton also notes that for a successful partnership, IT has to fully understand and agree with the project goals.

Another lesson learned is that training is essential. "As the use of technology for physical security increases, computer-literacy will become increasingly important," says Lang. "Systems are no better than the competent people who run them. We need to do a good job of training investigative staff to manipulate and understand CCTV over IP." Chatterton and Lang have held training classes for Cisco staff across the United States, Europe, Middle East, and Africa, the Asia-Pacific region, and Japan.

Finally, Bill Jacobs, manager of safety and security, Cisco Systems, notes that the key to a successful CCTV over IP deployment is preplanning. "Make certain that you totally understand your own group's responsibilities and IT's responsibilities," he says. "And make sure that management understands the costs and implementation effort needed to get the project going." At Cisco, for example, IT agreed at the outset to provide the funding for the hardware, but acquiring the funds for installation, maintenance, and monitoring required negotiating. "For a global deployment like ours, it is helpful to work with someone who has authority to approve the project worldwide so that you do not have to negotiate separately with someone in each theatre," says Chatterton.

All parties agree that the culture change required to partner with IT yielded dividends. "The increased reliability, increased accuracy, and reduced manpower requirements of a digital CCTV solution with IT management, completely offset the costs," says Jacobs.

So, enjoy the read. And if you think we have got it right (or wrong), we would love to hear from you.

Sincerely,

Darren Smith



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Holding all the cards
neaMetrics Suprema SMART Security Solutions Technews Publishing Access Control & Identity Management
After so many years of offering alternatives to card technology for access control, one could be forgiven for assuming we are all using biometrics or mobile credentials for all our physical and digital access requirements.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.