Leveraging intelligence information for surveillance

August 2003 Surveillance

Traditionally, many security departments were composed of a physical security side and an investigations section and these were relatively distinct in their emphasis and function. The introduction of the electronic security measures of CCTV surveillance and access control introduced an additional factor into the way sections of security were managed and related to one another.

These electronic techniques introduced a sudden rush of information available for the department to use, but also raised issues of who had access to this information. It also raised the issue of who directed the CCTV surveillance team on what to look for and whom to watch. This has resulted in a degree of tension in many operations between the surveillance and investigations sides, and this is also reflected in some police and city centre CCTV operations in the UK. Companies have adopted various ways to structure the security department and responsibility for surveillance, sometimes splitting up surveillance into different activities under different sections, having surveillance as a fully independent function, or having surveillance report through one of the other sections.

In an attempt to make security more proactive, intelligence functions are increasingly being developed to assist in defining the strategy for the security function. Historically, intelligence has being associated with national security, military and at times policing. In an article by Jeff Corkill and Craig Donald in CCTV Today (March/April, 2003), however, they point out that intelligence is becoming more common across industry as well. Similarly, Peter Fry of the CCTV User Group indicates that intelligence is being increasingly seen as a part of designing effective crime fighting strategies. Whether through formal intelligence personnel, sections, or done on an informal basis, intelligence provides a better perspective of the crime dynamics in the area one is dealing with, and allows you to adjust your strategy accordingly. While some big companies/industries are developing their own intelligence functions, smaller operations in anything from town centres, precious metals plants, and even shopping centres are building an intelligence perspective in order to detect theft patterns.

Proactive CCTV

Intelligence provides potential insights into a number of crime dynamics, including criminal resources, networks, channels, communication, syndicate members, kinds of targets, and levels of activity. However, while investigations have typically been a closed section reluctant to compromise information by sharing it with others and risking leakage, intelligence tends to be even more so. The big question then is how does one translate intelligence into a practical response at an operational surveillance level.

Proactive CCTV surveillance is dependent on the ability to anticipate and make timely decisions in response to an incident. The initial detection of the incident, the quality of evidence gathering, and the arranging of a security response are all influenced by the timeous recognition of the incident. Intelligence provides the basis for a number of factors that can contribute to this timeous recognition. This includes factors to look for such as:

* The risk of an incident occurring.

* The type of potential incidents.

* The modus operandi.

* The likely suspect profile.

* The likely victim/theft object type.

* Expected times when incidents are most likely to occur.

Area of intelligence

Areas of intelligence that can provide aspects of the above as well as giving a more in-depth context for personnel to view situations and developments are discussed briefly below. These are by no means the only areas of intelligence, but provide some of the immediate details that are relevant to surveillance.

1. Environmental intelligence - information relating to the immediate and adjacent environments covered by the CCTV system. Hot spots, entry and exit points, expected densities of people/objects and threat profiles. Maps are often used to give an indication of the threat profile. At a basic level, even the use of coloured pins to establish kinds of threats that have occurred in different locations gives an immediate visual analysis.

2. Target identification - identification of the people or profiles of people likely to be involved, the vehicles they drive (ideally with registrations), and the people they meet as part of the process. Contact behaviour may also be part of this, for example how users approach drug dealers tends to be characteristic in locations where this happens.

3. Movement and flow analysis - movement of people and objects within the target environment. This then allows the detection of variations from the norm as indicators that something is potentially going to happen or is happening.

4. Counter intelligence support - information on methods and techniques employed by criminals to avoid detection by the surveillance system. Criminals are continually trying to find new ways around security systems and keeping up with these places operators in a good position to adjust their own practices and maintain detection performance.

5. Indicators and warnings - issues around demands for commodities likely to be stolen, increased levels of contacts between suspects, scouting behaviour around a particular location, areas potentially being compromised.

Intelligence can come from external sources, informants, and a good appreciation by intelligence officers of the situation around them. However, an appropriate and thorough analysis of information generated within the security department and through reporting can produce useful insights into crime patterns without having to go outside the organisation. Analysing CCTV footage after the incident to profile events and find themes, characters and behaviour is useful, as well as debriefing people involved. Given that a thief who steals once is likely to repeat the process, the likelihood of the theft behaviour being repeated is strong.

Maintaining an intelligence function, whether as part of the formal structure or informally analysing information generated within the department requires a dedicated and systematic effort. It also needs to be maintained on an ongoing basis. Further, the trust levels between intelligence and surveillance personnel needs to be high. Confidential information needs to be maintained in-house, especially where it concerns sensitive targets, and intelligence personnel need to be confident that it will remain so. Finally, there needs to be reciprocal exchange.

Surveillance has a major part to play in following through and leveraging the intelligence information. However, it also can play a major role in testing out assumptions and providing a whole range of details to enhance the intelligence process. These will be discussed in more depth in a later article.

Dr Craig Donald is an industrial psychologist and specialist in human factors in security and CCTV. He is the co-developer of the Surveillance and Monitoring Assessment Exercise (SAMAE) for the selection and placement of CCTV operators and presenter of the CCTV Surveillance Skills training course. He can be contacted on telephone: (011) 787 7811, fax: (011) 886 6815, or e-mail: [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Empowering cities with intelligent security solutions
Secutel Technologies Surveillance IoT & Automation
By leveraging advanced AI analytics, real-time data collection, and seamless integration capabilities, cities can address pressing security challenges and create a safer environment for residents.

Read more...
Re-imagining business operations with the power of AI
AI & Data Analytics Surveillance
inq., a Convergence Partners company, has introduced a range of artificial intelligence (AI) solutions to assist organisations across industry verticals in optimising business operations and improving internal efficiencies.

Read more...
Eight MP dome for harsh environments
Axis Communications SA Surveillance Products & Solutions
Axis Communications announced a marine-grade stainless steel camera that offers performance in harsh environments. Enclosed in an electropolished stainless steel casing, it can withstand the corrosive effects of seawater and cleaning chemicals.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
Advanced security solution for high-risk areas
Secutel Technologies Surveillance Integrated Solutions
The need for a sophisticated intrusion detection system is paramount when faced with persistent security challenges, particularly in isolated battery rooms or high-risk areas prone to vandalism, cable theft, and battery theft.

Read more...
Hikvision’s top seven trends for the security industry in 2024
Hikvision South Africa News & Events Surveillance AI & Data Analytics
As we embrace technological innovation, and adapt to evolving societal needs, we are witnessing the convergence of advanced technologies like artificial intelligence (AI), the Internet of Things (IoT), and big data.

Read more...
inq. SA unveils AI, IoT solutions for the digital age
AI & Data Analytics Surveillance
inq. has announced the launch of an extensive Edge Artificial Intelligence (AI), Internet of Things (IoT), and the Edgedock data insights value proposition to transform business operations across various sectors.

Read more...
ONVIF releases first add-on for secure communications
Surveillance Training & Education
ONVIF has released the final version of the TLS Configuration add-on to increase the security of communications between devices and software clients within a physical security system.

Read more...
2024 Trends in Video Surveillance report
Surveillance AI & Data Analytics
AI in video surveillance tops Eagle Eye Networks 2024 trends report; this year’s list also includes affordable professional video monitoring, workplace security upgrades, licence-plate recognition for HOAs, and sustainable security.

Read more...