Reporting on CCTV surveillance events

December 2005 Surveillance

What constitutes a reportable offence for a CCTV operation? We tend to associate CCTV with detecting the major crime incidents that we are concerned about happening on a site. However, the reality is that CCTV control rooms get involved in a range of activities from picking up production process issues, health and safety, procedural violations, general misconduct, minor offences as well as the major crime issues we are faced with.

Many of these events may not mean anything in terms of the core function of security. However, for the production department, the failure to report a major equipment failure or spillage that initially looks inconsequential could result in the loss of millions in the production process if it develops into a full scale failure or major spill.

Given these kinds of conditions, what should CCTV operators be spending their time on and reporting about? We need to consider that any logging and reporting is taking time out of active surveillance. However, getting an audit trail is a key part in safeguarding not just security, but possibly the whole company from getting into a situation of harm. I remember one newspaper story of an ambulance that arrived later than expected at a major company after being called some time before. Only the fact that the call and subsequent follow up ones had been fully logged and duly processed allowed the company to escape the blame for what outsiders initially attributed as a unconcerned failure to provide service.

The reduction of the New York crime rate and the concept of zero tolerance has been extensively written about as a solution for crime over the past few years. The approach has been attributed to William Bratton, the NYC Police Commissioner appointed by Mayor Rudolph Giuliani, in 1994. The theory is that not dealing with small issues will create an atmosphere where more serious offences will flourish, and over time, individuals who feel that they may get away with minor offences will go on to commit more serious offences.

Certainly this philosophy is also relevant to the CCTV context. Undoubtedly, criminals actively test and push boundaries or rules and procedures in order to create more opportunities or 'space' for them to steal. Where these breaches get reported to management and not acted on, they eventually become ignored. The extent to which criminals can then perform what formally would have been 'transgressions' but are now regarded as normal practice creates a far more conducive environment to theft. However, in many cases when security reacts by trying to impose more discipline on the working environment or even production process, they are seen as the bad guys - becoming a barrier to getting the production work done efficiently.

What kind of CCTV reporting should therefore be done, and to what extent should it include all these other types of events? We need to start off with a clear framework of what is reported on and how this information is conveyed to the relevant stakeholders. This may include a feature for stepping up the priority of reported issues - for example, repeat issues get pushed up the priority list until they are effectively dealt with. There is a need to generate reporting systems that are useful to security, but also that will be informative for management - producing data that can give insight into their own operations and the worth of CCTV in viewing these.

* We need to optimise how logging of incidents is done and how these are treated. These days, an electronic logging system that distributes relevant messages to appropriate people through the network appears to be the only feasible option. The traditional occurrence book has never been a major source of information that can be constructively used but rather a safeguard for security to fall back on to show they have done something.

* Security personnel need to look seriously at what they report on and what gets conveyed to others. In the zero tolerance philosophy, even the smallest aspects get included. This can lead to information fatigue and managers not taking results seriously. There is a real danger that it becomes just another administration issue generated by security. People need to value the information that comes to them.

* Managers need to accept that they must deal with issues that are sent their way and that these reports or logs contain meaningful content. In this sense, security departments need to contract with managers on what gets sent, what acknowledgement is received, and action that is then taken to rectify this. The performance evaluation of those managers then needs to include how they have responded to this reporting. In this way, it needs to become part of the culture of how things are done.

* CCTV operators need to be activity managed in terms of what kind of information they are including in the systems. There is the potential when generating so much information, that it becomes too much to handle. This does have some implications for the performance management of both operators and supervisors. How one rates the nature of information produced by operators has to be considered ie, it has to have some kind of weighting for quality as well as quantity.

* There needs to be a way of integrating and analysing all the information produced. This kind of database is a rich source of information for intelligence analysts. Too many systems store information in a format that is virtually irretrievable and only then by people with specialist skills.

The efficient reporting of information that matters and its effective use could potentially transform the application of security in an enterprise. More importantly, it can transform the relationship between security and the various clients they have in the organisation and enhance the position of security as a service provider.

Craig Donald
Craig Donald

Dr Craig Donald is a human factors specialist in security and CCTV. He is a director of Leaderware, which provides instruments for the selection of CCTV operators, X-ray screeners and other security personnel in major operations around the world. He also runs CCTV Surveillance Skills and Body Language, and Advanced Surveillance Body Language courses for CCTV operators, supervisors and managers internationally, and consults on CCTV management. He can be contacted on 011 787 7811 or [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Drones and a hint of access control
Surveillance Products & Solutions
Drones are an indispensable tool for security operations, with more functionality and capabilities than ever. Securex Cape Town 2025 will naturally have drone service providers available to light the way for interested parties.

Read more...
Innovations in video management
Arteco Global Africa Surveillance
Visitors to Securex Cape Town this year will have the opportunity to experience Arteco’s latest innovations in video management and integrated security technology, including uSee VMS, Arteco’s hybrid-cloud video management platform.

Read more...
Human-centric control rooms
Iritron Integrated Solutions Surveillance Residential Estate (Industry)
Iritron and Oculus show that when it comes to control rooms, people, not just technology, are at the centre of the most significant performance differentiators today, not just how efficiently the technology works.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Secure, long-distance thermal from Keenfinity
Products & Solutions Surveillance Residential Estate (Industry)
The DINION thermal 8100i camera is a bullet thermal camera built for mission-critical applications, prioritising long-distance monitoring and reliable perimeter intrusion detection with built-in Intelligent Video Analytics (IVA) Pro Perimeter video analytics.

Read more...
IVA AI Pro Visual Gun Detection
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of the IVA AI Pro Visual Gun Detection analytics based on deep learning. It is designed for automatic detection and classification of people and brandished firearms.

Read more...
IP-based horn loudspeakers
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of its new IP-based horn loudspeakers and amplifier module: the high-output LHN-UC15L-SIP horn (for long-throw applications), the compact LHN-UC15W-SIP horn (for wide-angle coverage) and the AMN-P15-SIP amplifier module.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.