Directing the CCTV operator surveillance focus

February 2006 Surveillance

CCTV operation system design should be aimed at addressing a number of clearly defined purposes for the organisation.

Sometimes, to assist with funding or to gain leverage, the needs of other functions besides security such as production, logistics or safety are incorporated into the CCTV scheme coverage as well. For this reason, the system design should be matched against clearly stated operational requirements. These define how the system and the cameras should deliver a service relative to the organisation's needs. Often, the original clear objective and purpose of the system starts becoming diluted as soon as it leaves the drawing board. Ultimately the responsibility gets passed through a number of people responsible for development and given over to a group of staff to run the CCTV system and fulfil the requirements. The danger in this is similar to that in the telephone game, otherwise known as Broken Telephone, Chinese whispers or whisper down the lane. The Wikipedia online free encyclopedia describes this as a game in which a phrase or sentence is passed on from one player to another, but is subtly altered in transit. The final understanding of the message is far from the original or intended one. Similarly, the passing on of the CCTV objectives, priorities and intention from one person and one level to another results in a final version that may be very different to the original requirement that was conceived.

Bad surveillance

The worst kind of surveillance is a random viewing of images displayed on monitors as they arise. Any kind of detection under these conditions is often purely by chance.

Operators may review scenes using hundreds of cameras or constantly changing camera views per day. So what do they look at most? Fortunately, most operators have an idea of what is important to view and there is generally a concentration in these areas. However, they are equally charged with viewing a broad range of areas and conditions, relevant or otherwise, that are continually being shown on screen. Some also see certain scenes as more interesting or entertaining than others, and the use of a PTZ gives more variety in tasks and always tends to be used more often. In the worst case operators just look at screens without actually seeing anything of what is there. While in isolated situations this could be due to screen blindness (too much time looking at something and ending up not noticing anything), this can also be due to simple boredom or a lack of motivation.

It is important therefore to occasionally go back and reference the original operational requirements of the system in order to audit that the CCTV system is being used appropriately. Even where clear operational requirements were not specified originally, the objective for any CCTV scheme manager and staff is to maximise detection. The way to do this is to ensure that operators are continually working according to the risk profile of the operation and that they are aware of the kinds of conditions, scenes, equipment, people, and behaviour that represents a threat to the wellbeing of the operation they are responsible for. Optimising a surveillance strategy involves covering key events and practices within the site to maximise opportunities for detection and ensure a safe environment. Operators need to be aware of these issues which provide the framework that is used when conducting any viewing of CCTV monitor information during the shift. The priority aspects will be established with management prior to the audit, but may often be supplemented by the experience of operators on the ground and their insights gained from hours of close observation.

Extent of risk

Questions to be cased revolve around the following key issues which define the extent of risk:

* Areas to be viewed - have risk areas been defined, which are the most vulnerable, what can occur there, and when may it happen? This should cause operators to view these areas as part of their patrolling schedule or requested close surveillance strategy at appropriate times. Intelligence information is often a vital ingredient to such viewing, but standard risk assessments and even common sense should assist with establishing priorities.

* Work processes - what vulnerable aspects of the work process have been identified, where are the value points, and where is it possible for the process to be circumvented or sabotaged?

* People - are there any characteristics of people who may be suspects - ie style of dress, movement, behaviour, interactions. Have potential suspects being profiled?

* Authorised vs non-authorised activities - are operators clear on what is allowed and not allowed? Are they aware of the consequences of these?

* Focus on types of incidents - is there the right balance between security and other functions such as safety or production? Do operators know the priorities and is it rewarding for them to stick to these in terms of their performance measurement?

* Alarm and exception handling - is there a reasonable level of alarms, ratio of real to false alarms, time involved versus surveillance, clear camera pictures to the alarms can be investigated properly.

Assisting operations

One of the things that assists with CCTV operations is to have a structured surveillance strategy that makes it clear where, what, when, how and who should be looked at. This is not to say that all attention is given to only the high risk areas - this would mean that other areas would be unprotected. It simply means that your human and system resources are being used in the best possible way to deal with the threats and concerns that may be faced in your operation. It is essential that the operators who are actually doing the job know these requirements as much as anybody.

Dr Craig Donald
Dr Craig Donald

Dr Craig Donald is a human factors specialist in security and CCTV. He is a director of Leaderware, which provides instruments for the selection of CCTV operators, X-ray screeners and other security personnel in major operations around the world. He also runs CCTV Surveillance Skills and Body Language, and Advanced Surveillance Body Language courses for CCTV operators, supervisors and managers internationally, and consults on CCTV management. He can be contacted on 011 787 7811 or [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
LiDAR protects railways from new and existing dangers
Surveillance
3D LiDAR (Light Detection and Ranging) sensors are being installed to monitor rail traffic and ensure safety of passengers as well as individuals walking near the tracks, or trying to perform dangerous stunts for social media.

Read more...
Securing South Africa’s logistics sector
Secutel Technologies Products & Solutions Surveillance Logistics (Industry)
Unlike traditional guarding services, Visual Verifier operates on an ‘Always On’ principle, ensuring continuous 24/7 coverage of warehouses, depots, transit hubs, and delivery points.

Read more...
Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
Eagle Eye Precision Person & Vehicle Detection
Surveillance Products & Solutions AI & Data Analytics
Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.