CCTV operational requirements and incident behaviour

CCTV Handbook 2005 Surveillance

CCTV systems should be developed with a clear purpose and objectives for what they want to accomplish. Equally, CCTV operators should be able to produce results in a manner consistent with this purpose.

The concept of operational requirements provides a basis on which to develop the purpose and objectives of your system. In the UK, the concept of operational requirements highlighted by Jim Aldridge is commonly used. Aldridge (1994, p.2), defines an operational requirement as "a statement of needs based on a thorough and systematic assessment of the problems to be solved and the hoped for solutions".

Using operational requirements involves a process that takes you through looking at a number of aspects relevant to the situation you are implementing a system for, including working with all the stakeholders in determining what their perspectives are. Issues covered are priorities, response times throughout the system, responsibilities of different parties, audit trails and future needs. The most important part of defining a system is what you want to watch, the technical quality of video picture and the kind of views of incident and evidence material you need to capture on camera. Scenarios and possible incident dynamics that you expect to happen need to be anticipated and thought through. This has major implications for the capacity and quality of your equipment, what you record and the positioning of cameras.

A poor definition of what picture views are to be expected will lead to limiting effects in your system arising right from the initial specification. These will automatically follow through into the design, initiation and testing of the system. At times when the incident material that you will need to view has not been considered enough, these problems may only become apparent when wanting to use the system under certain incident conditions. The use of cameras by operators often throws up a number of previously unanticipated issues and considerations. Where an experienced operator or supervisor is involved in the initial operational requirements, or where they are involved as part of a trial implementation, these features can be identified before the system is finalised. Alternatively, ongoing limitations can become a feature of the system that people tend to accept and live with despite the reduction in system effectiveness. Problems that can arise include not seeing the desired picture detail, light and viewing hazards, cameras positioned behind the activity that has to be monitored and a failure to meet evidence or information requirements from incident conditions. What is important in this context is that one is not merely monitoring areas of floor space or situations. An incident will typically occur through the involvement of people within those situations and it is the incident behaviour that is displayed which has to be monitored and captured.

What to watch as part of the initial requirements also needs to be communicated effectively to operators once they start. While the system design may provide the facility, operators need to be clear about what they are looking for and they do not always receive proper instructions on this. There must be a sizeable proportion of operators on different CCTV sites who are looking continuously at screens day in and day out with no real conception of what they are supposed to be spotting. When asked, the typical response is that they are looking for suspicious behaviour. When asked what form this behaviour may take, they shrug their shoulders with the belief that they will recognise it when they see it. Although blatant incident behaviour is generally likely to be seen, unfortunately most criminals do not co-operate so readily.

In discussions during the review of video material, we often find what some people see as suspicious looks perfectly normal to others. Indeed, when watching some actual video material different people may often interpret it as perfectly innocent with others thinking there are clear indications of guilty behaviour. In our CCTV training we stress that it is far more effective to recognise expected signs of behaviour rather than to try and interpret behaviour in order to make sense of it, particularly under pressure. The more the operator can visualise what kinds of incident behaviour can occur, the quicker the incident is identified and acted on once it happens. Not only is it necessary to communicate what managers see as the operational requirement, it is necessary to get the operator thinking through what they perceive as the requirements for the cameras they are using. Where operators are well tuned to the risk areas, their surveillance will be more efficient. The quality of surveillance is therefore greatly enhanced by knowing where to look and what to look for, with a camera system that supports these needs.

Ref: Aldridge, J. CCTV Operational Requirements Manual. PSDB, Home Office. 1994.

Dr Craig Donald can be contacted at Leaderware on 011 787 7811 or craig.donald@leaderware.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Duxbury SA Milesight distributor
Duxbury Networking News & Events Surveillance
Duxbury Networking has been appointed the exclusive distributor of Milesight surveillance solutions in South Africa, expanding its surveillance portfolio with a platform designed to deliver AI-driven analytics, rapid deployment, and open integration for modern security environments.

Read more...
Transforming video surveillance into strategic intelligence
Secutel Technologies Products & Solutions Surveillance
In a world where risk moves faster, and operations are more interconnected than ever, you need more than footage — you need insight.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
CAA-compliant ground drone outsourcing
Surveillance IoT & Automation
South African mines, estates, utility companies, independent power producers, ports, municipalities and others can now own and operate a CAA-compliant drone dock ground station in just six to eight weeks.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.