Putting the digital CCTV age into perspective

August 2005 CCTV, Surveillance & Remote Monitoring

The early 1990s was a period of huge development in the area of CCTV. For the first time, large companies in South Africa engaged seriously in implementing CCTV systems.

In a world that had only recently become involved in CCTV in a major way, South Africa led the implementation of huge-scale CCTV systems in industrial settings. To some extent, this had been pre-empted by the casino operations with the Carousel Casino being the largest CCTV operation in the southern hemisphere at one point. However, leading companies in a variety of sectors created expectations, pressure on service providers and ultimately systems to provide solutions that had previously only been speculated about.

After the initial heady rush into CCTV, things seemed to have begun to stabilise at the start of the 2000s. Distributors, installers and users got to know what worked and there was a move to tried and trusted methods as people gained increased experience with different sites and operations. That was until the advent of the digital wave and the gradual move to affordability of DVR in the last couple of years. Suddenly, with digital recording systems, networked CCTV and digital cameras, it seems that the technology has been revolutionised again.

This is true, but only in parts of the system. Indeed, many digital recording systems were put in as direct replacements for the previous analog equipment and those sites have continued to operate in pretty much the same manner. For all intents and purposes, the design principles of CCTV systems remain the same with the key aspect of providing a properly integrated system that will cater to the client's requirements.

The main technical challenges over the next few years will be to find ways that make sure that digital components interact with each other, interact with the analog components which continue to be used, and that operations are in a position to take advantage of the unique advantages that digital is able to offer.

At this stage, it is critical not to lose sight of the essential requirements of working CCTV systems. It is easy to jump in with the aim of producing a high technology state-of-the-art technical system. However, we need to ensure that we produce systems that deliver on client requirements, are usable, and deliver required results.

Recent research in the UK indicates that using this new technology does not guarantee results. Indeed, the research gave anyone involved in CCTV a serious wake-up call. Quoting from the recent UK Home Office report in a recent article, I noted "CCTV is a powerful tool that society is only just beginning to understand. It looks simple to use, but it is not" (page 121). Organisations that rush into CCTV and think that the system will do the work often reflect this perspective. CCTV is an incredibly powerful tool that needs to be carefully managed and integrated into a security management strategy in order to realise its potential. How it is implemented, and how people are equipped to deal with it, makes the real difference.

In line with the need to focus on delivery, we have taken five previous articles published in Hi-Tech Security Solutions in the past few years that are as relevant now as they were then. They focus on different aspects of the CCTV installation and operational process but all provided guidance based on experience internationally in the CCTV area.

The concept of operational requirements was initiated by Jim Aldridge at the Police and Scientific Development Branch (PSDB) at the UK Home Office to focus the large number of CCTV schemes coming on-stream in the UK. Many of these previously had no clear purpose and were implemented on a haphazard basis driven by the views of different individuals in the scheme. The whole point of operational requirements is to define the problem you want to solve and then develop a system to do this. The concept of developing solutions around the problems you want to solve is still reflected in many of the articles I write. The article on 'CCTV operational requirements and incident behaviour' provides some insight into this - the original report (still used as a key document in the UK) is available online at the Home Office website. Herman Walsh of De Beers was the person who first introduced me to the concept of CCTV tiers and can probably take the credit for introducing them more widely. Since then I have heard many definitions of what functions are supposed to be covered at what levels in CCTV. The second article 'Surveillance strategy - surveillance functions and levels' indicates some perspectives of what can be covered by CCTV and where these functions can be allocated. Operations have the discretion to cover all or some of these, and to position them at different tiers based on their operations, but at least the document provides a basis to see how the functions can be looked at.

Two trends strike me with ergonomics - the first is that some people do not seem to learn from the lessons of other sites where ergonomics has been shown to be critical in assessments, the second is that often the lessons learnt are implemented in the wrong way. The article on 'Common ergonomic errors in CCTV control room design' highlights some of the things that can go wrong based on my personal experience with different operations. Once the CCTV system has been obtained, the question is how effective one can be at surveillance. The article on 'Surveillance-friendly environments' covers some of the issues that can make or break the effectiveness of CCTV. Finally, in line with the advent of digital, an article on some 'Practical perspectives in evaluating digital surveillance systems' is provided. These are general points and do not provide a set of specifications. However, the points raised were based on a real-life scenario that I found particularly useful and all credit goes to the operation responsible for it.

Much of the content in these articles has been based on observation of what happens at actual sites. I have had the opportunities to gather the experience of many people and feed it back to others and I see that as one of the best ways of enhancing standards in the industry. There are many previous articles I have not covered relating to selection of people, surveillance and body language training, and the increasing role of intelligence information and technology. People in particular are the enabling force of CCTV and getting the right ones with the key skills from operator to management level will make all the difference. In this sense, CCTV is like any other activity - get the basics right and the rest will flow from there. As indicated in the comments about the UK experiences, getting the basics right is often more difficult than we think.

Dr Craig Donald is an industrial psychologist and specialist in human factors in security and CCTV. He is the co-developer of the Surveillance and Monitoring Assessment Exercise (SAMAE) for the selection and placement of CCTV operators and presenter of the CCTV Surveillance Skills training course.

Dr Craig Donald can be contacted at Leaderware on 011 787 7811 or craig.donald@leaderware.com


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Unintended consequences of ­technology
June 2019, Leaderware , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
The development of general AI capabilities has seen an accompanying concern among some of the key players in the IT space as well as academics internationally.

A platform to the future
June 2019, Genetec, Cathexis Technologies, Milestone Systems, Gijima Electronic and Security Systems (GESS) , Integrated Solutions, CCTV, Surveillance & Remote Monitoring, IT infrastructure
With AI, IoT and cloud changing the security technology landscape, will your security management platform be able to adapt to new demands?

Foresight means secure offices
June 2019, Bosch Building Technologies , Commercial (Industry), CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management
If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property.

Axis 7th generation ARTPEC chip
June 2019, Axis Communications SA , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Cyber Security
Axis has launched its 7th generation ARTPEC chip, optimised for network video, to improve all the signature Axis technologies created to address difficult light conditions.

Hyper-converged simplicity
June 2019 , IT infrastructure, CCTV, Surveillance & Remote Monitoring
Hyper-converged infrastructure combines all of the data centre’s critical components, such as storage, networking, compute, backup and more into pre-packaged units.

Enhancing perimeter security with video
June 2019, Pelco by Schneider Electric , CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection
Securing perimeters, whether they surround an airport, seaport, or an oil and gas facility, require a layered approach.

Proactive forensic intelligence
June 2019, Secutel Technologies , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
Through its Safe City projects, AxxonSoft is assisting authorities in identifying unsolicited behaviour and potential human threats in public spaces.

Tailoring surveillance to the customer
June 2019, Pelco by Schneider Electric , CCTV, Surveillance & Remote Monitoring
Pelco’s custom surveillance solutions can be used to adapt to avoid obstructions or conform to unique architectural features by modifying mounts on cameras.

From hype to viable assistance
June 2019, Dallmeier Electronic Southern Africa , CCTV, Surveillance & Remote Monitoring
Dallmeier has published four practical statements about video technology and artificial intelligence to assist users in differentiating reality from research.

Protecting education campuses with AI
June 2019, Hikvision South Africa , CCTV, Surveillance & Remote Monitoring, Integrated Solutions, Education (Industry)
School security must also be designed in layers, or concentric circles of protection, starting at the school’s perimeter and working inward.