The increasing role of information management in security

August 2002 Surveillance

Information has been bread and butter to security for a number of years. The whole point of investigations, for example, has been to generate information on incidents and people.

With the advent of new security systems such as access control and CCTV, a result was the creation of huge amounts of data that sat on a computer or on tape.

Yet most facilities did little to manage and make use, or even sense of this data. It is only more recently that the police are starting to use analysis and statistics in a more serious way to get to understand crime and provide a basis for planning crime management strategies. For most operations, things that were not immediately looked at were just left.

It has been somewhat ironic that the new technology that was so good at generating data has taken some time to be useful in translating that data to useful and interpretable information. I have seen huge piles of printouts on access control movements on desks that would have taken a couple of days to read through and would have been almost impossible to make sense of.

Making sense of data

It is only more recently that the security software systems have been able to take advantage of storage and analysis capabilities to make sense of all this data and turn it into truly useful information that can assist with such things as movement analysis, picking up unusual activities, and true decision support functions. Overly frequent visits to a particular location, visits out of normal working time, and access by certain people within certain times of each other may indicate something is afoot. While access control systems lend themselves most easily to data storage and subsequent analysis, CCTV and other security activities also provide a basis for generating information that can be used to anticipate, prevent or detect crime.

CCTV data storage has traditionally been through video tapes. Tape libraries have been a key aspect of managing and, if necessary, retrieving this information. In the UK, the Data Protection Act has created a far greater focus on effectively managing tapes in the libraries, not just those kept as evidence. Indeed, the UK legislation has led to the creation of an entirely new designation - the data controller who is responsible in law for how recorded information is handled.

Digital recording introduces far more scope for managing information and increasing its accessibility. In a recent Frasier show episode, Frasier wanted to retrieve a recording of one of his radio broadcast sessions of a couple of years ago. How easy would it be for you to retrieve a video clip of a particular time and date from two weeks ago, or even a month ago? Given that criminals often repeat their behaviour, on catching one you may well want to see if the person has committed the same kinds of offences on previous days or weeks. Digital recording should make this retrieval a great deal easier, but few companies have actively thought through how to approach this process. However, casinos, even with their traditional VCR systems have taken this tape management process to a fine art. Using tape libraries, they are able to reconstruct a suspect's movements across a time period by assembling a series of video clips from different tapes together. It is something that all companies should be thinking about whether they work with traditional tape or digital storage.

While access control systems tend to accumulate information automatically through electronic means, CCTV operator comments and analyses are largely manually logged in occurrence books or incident type logs. When was the last time a manager in your department had a good look at what trends and unusual patterns were coming through in your occurrence book?

Typically the comments in these written records are noted, never to be seen again unless an emergency happens and you have to refer back to it. Transferring or capturing operator comments on events, incidents or people onto a computer-based system allows one to retrieve these more easily. At Ekati diamond mine in Canada, operators use voice recognition systems to transcribe operator comments and reports directly onto computer as they happen. However, even manually written comments can be moved to some kind of computer database relatively easily. Establishing trends like a particular person being around frequently when there is diamond or gold spillage, or machines only breaking down when certain people are on shift provide insights into potential security issues, but only if that information is captured into systems and then looked for as part of an information risk management approach.

Risk management component

Information management and pattern analysis is increasingly becoming a vital aspect of the management and usefulness of security technology systems. The need to start making sense of existing data and to look at what other signs are available to tell us what is happening in our work environments is increasingly opening up new job positions.

There is a strong risk management component to this and companies need to give consideration to formulating a plan to gather investigation and information gathering strategies. Like the data controller, a person in the operation needs to be responsible for looking at data, making sense of it and translating it into information that will support decisions or identify problems. Among the things that such a position can be doing are:

* Developing a security risk model and the components and sources of information that will give an indication of concerns.

* Determining what kind of information gathering strategies you can use.

* Developing ways to capture or process the information at different sources so it can be used in subsequent analysis.

* Coordinating system information gathering - at what points could details from your access control system overlap with concerns indicated from your CCTV monitoring.

* Interrogating system data in order to establish trends and identify questionable combinations of events as indicators of suspicious activities.

We can expect data to become increasingly available as more technologies and increasing use of systems that allow data collection become common in our operations. How we treat this data and whether we use it constructively or let it slide into obscurity is going to make a difference. While I use another tracking company and am not particularly fond of their advertising, vehicle tracking company Matrix's use of 'no go zones' is a great use of translating the regular supply of transmitted data into information that is meaningful and can be used in an intelligent way. Data mining has been used extensively for marketing purposes and even things such as mining exploration for some time.

For security, it presents some exciting challenges and offers the opportunity for new skill sets and career paths. Most importantly it offers powerful tools in the fight against crime both within organisations and communities.

Dr Craig Donald, consulting editor
Dr Craig Donald, consulting editor

Dr Craig Donald can be contacted on telephone: 011 787 7811, fax: 011 886 6815, or e-mail: [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hikvision launches AcuSeek NVR
Surveillance Products & Solutions AI & Data Analytics
By integrating natural language interaction, Hikvision’s AcuSeek NVR enables precise video and image retrieval within seconds, marking a transformative milestone for the security industry's advance into intelligent and efficient applications.

Read more...
2025 video surveillance market set for improved fortunes
News & Events Surveillance
Novaira Insights has unveiled its latest report, World Market for Video Surveillance Hardware and Software – 2025 Edition, forecasting a healthy growth rate of 8,1% until 2029, excluding China.

Read more...
Dallmeier and Hexagon form a technology partnership
Surveillance
Dallmeier and Hexagon have agreed to form a technology partnership, which will see the two companies combine their expertise to develop integrated security solutions for various application areas, particularly critical infrastructures.

Read more...
Analyse, automate, and optimise logistics processes
neaMetrics Surveillance Transport (Industry) Products & Solutions Logistics (Industry)
In today’s rapidly evolving logistics sector, the pressure to improve process efficiency, optimise resource usage, and ensure seamless security is more intense than ever. Smart, proactive surveillance is no longer a luxury — it is a critical operational necessity.

Read more...
Safer spaces through smart surveillance
NEC XON Surveillance
Advances in facial recognition technology are transforming surveillance from a mere recording tool into an intelligent, integrated system that enhances real-time safety, moving beyond the traditional expansion of CCTV efforts.

Read more...
Next generation of AI-powered video telematics
IoT & Automation Surveillance Transport (Industry)
Webfleet, Bridgestone’s fleet management solution in South Africa, has launched Webfleet Video 2.0, an AI-powered solution designed to enhance fleet safety, security, compliance with local regulations and operational efficiency through real-time video insights.

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
How intrusion protection helps secure O&G operations
Surveillance Perimeter Security, Alarms & Intruder Detection Industrial (Industry)
For O&G operators in Africa, physical security remains one of the biggest considerations, particularly when it comes to perimeter protection and the ability to mitigate intruder-related incidents.

Read more...
Axis secures the Waterfront
Surveillance Entertainment and Hospitality (Industry) Retail (Industry)
Axis Communications shares insight into its longstanding partnership with the V&A Waterfront, one of Africa’s premier retail and mixed-use precincts, through its latest, updated customer success story.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.