Lethal tech combo to fight crime

July 2016 Infrastructure, Surveillance, Integrated Solutions

With countries across the globe continuing to face difficult economic conditions, high crime rates are adding to the climate of risk and uncertainty. While CCTV systems are being installed to protect schools, banks and other public facilities, is the answer as simple as just adding more cameras?

Jean Turgeon.
Jean Turgeon.

How are CCTV systems making us more secure? Jean Turgeon, Avaya’s VP & chief technologist, software defined architecture, speaks about CCTV, crime and whether anyone has the lethal tech combination to fight crime.

Millions of CCTV systems are being deployed around the world to catch criminals. Why is it still not working?

Turgeon: Deploying more security cameras can only help in discouraging people from committing crimes – knowing they are more likely to be caught on camera – but what is really important is the quality of the video provided, the use of analytics to help prevent crimes, and ensuring that installed cameras eliminate blind spots.

CCTV has evolved tremendously from the old days of analogue, which for the most part didn’t provide the right level of required quality – so it was difficult to clearly identify individuals, but also hard, if not impossible, to perform real-time analytics. With the evolution of CCTV, cameras now offer extraordinary definition, for instance a licence plate can be read clearly from hundreds of metres away. Even in dark conditions, video surveillance can capture amazing quality images, allowing analytics to be performed in real time.

The transition from analogue to digital, combined with the IP enablement of deployments, provides many other key bene-fits. Centralised digital recording of high definition video, which can easily be time-stamped and indexed, not only allow whoever is committing the crime to be caught more easily, but also help authorities be much more pro-active by fully leveraging real-time analytics.

Now suspicious individuals can easily be detected and tracked, while security authorities can be notified to hopefully prevent crimes from happening. This is big data: as you combine the video surveillance data with other relevant databases such as criminal records, arrest records, or whatever, one can easily imagine how positively impactful this technology can be to our citizens. The more CCTV we deploy, the more capabilities the world has to fight and prevent crime.

Experts say that without a strong network to support all these CCTV deployments, we continue to be at risk. Can current legacy networks support more advanced CCTV applications or do we need to look at other solutions?

Turgeon: Legacy networks were built with a series of protocols running on top of each other to meet some of the security or virtualisation requirements. For the most part, the legacy networks used a concept of unicast to communicate – think of it as a one-to-one conversation. This is very efficient in a client/server-type environment, where the PC or device communicating is communicating with one specific server application. Now imagine this model in a CCTV implementation, where thousands of cameras need to be deployed, causing thousands of network unicast flows to be sent to the recorder and likely to a series of monitoring stations, even potentially to a police department. One unicast stream can quickly turn into three; hence it becomes very inefficient in this type of deployment.

If a camera is not used for monitoring or analytics, but only for recording – for audit purposes for instance – then unicast can likely meet the business needs. Where it gets more challenging is when your the business requirements demand not only recording, but multiple monitoring stations, and other agencies want to gain access to some of the video feeds too.

In such cases, multicast technology will come to the rescue. However, this unfortunately comes with more complexity as more protocols are required to run these IP flows in a multicast mode: protocols such as PIM-SM, OSPF, VLANs with IGMP snooping, and so on will be required to be designed and implemented on the network.

At this point there are two challenges: the recovery times when a failure occurs and the complexity associated with a network that requires 5 000 to 10 000 or more IP video surveillance cameras running multicast.

Recovery times due to the inter-dependency of all of these protocols can be as long as 35-40 seconds; potentially losing video recording for such a length of time makes audit capabilities pretty much impossible, and may make the video source invalid in a court of law.

Rather than deal with the complexity associated with all these protocols needed to support multicast configurations, many organisations will choose to stay away from multicast deployments and opt for smaller separate physical networks. This is less than ideal if you are attempting to reduce your TCO.

The good news, there is a solution available in the market, which is based on an IEEE (IEEE 802.1aq) and IETF (RFC 6329) standard that eliminates the needs for all of these protocols and allows a much simpler deployment with extremely fast recovery times in the range of 150 to 400 ms. Not just that, this solution brings scales to new levels where in excess of 14 500 multicast streams have been tested and validated running over a single physical network infrastructure. For customers that need multicast, they have to very seriously evaluate this technology.

Does CCTV + Network = lethal weapon against crime? Or do we need to go deeper and focus on early notification systems and communication-enabling processes if we are to find the right answer?

Turgeon: The combination of CCTV deployed over a highly scalable and reliable network is definitely beneficial and can largely contribute to reducing crime and potentially pro-actively preventing it. But, where the technology gets really impactful is when you also add real-time analytics integrated with business process automation. It is great to have analytics detect some abnormal behaviour, but when this becomes incredibly powerful is when an automated workflow can be triggered based on the situation analysis.

Imagine that somebody is attempting to steal something from a store – this could be detected by real-time monitoring and real-time analytics, triggering a workflow that could address the incident without human intervention. For instance, the workflow could automatically order other cameras to track all movements of the suspect, while integrating the video stream to a mobile video conferencing system that could provide full visualisation to security guards or police officers on a smart device. The system could also trigger a store lockdown through SIP-enabled door locks, sound an alarm, enable a strobe light, trigger an alert through paging systems – whatever is required.

In simple terms, the lethal weapon is when you combine a highly scalable, reliable network infrastructure optimised for multicast to support thousands of IP video cameras, with a business process automation system allowing you to customise the desired business outcome.

This is all possible today from Avaya. It is the combination of our SDN Fx architecture and Breeze, the latest iteration of our Engagement Development Platform (EDP). Business process automation and customisation over an automated network optimised for CCTV leveraging multicast makes a very powerful combination today. Now, that is lethal to crime.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
CCTV control room operator job description
Leaderware Editor's Choice Surveillance Training & Education
Control room operators are still critical components of security operations and will remain so for the foreseeable future, despite the advances of AI, which serves as a vital enhancement to the human operator.

Read more...
Platform to access data and train AI models
Milestone Systems AI & Data Analytics Surveillance
Milestone Systems has announced Project Hafnia to build services and democratise AI-model training with high-quality, compliant video data leveraging NVIDIA Cosmos Curator and AI model, fine-tuning microservices.

Read more...
AI means proactive surveillance
DeepAlert Technews Publishing SMART Security Solutions AI & Data Analytics Surveillance
SMART Security Solutionsasked DeepAlert for some insight into how AI is transforming video surveillance, even to the extent of it being taught to protect the privacy of those in the cameras’ view.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Vumacam highlights concerns with proposed Johannesburg CCTV by-laws
Vumacam News & Events Surveillance
Vumacam has raised objections to critical provisions of the by-laws governing privately owned CCTV cameras with a view of public spaces in the city, which were promulgated on Friday, 28 February 2025.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...