CCTV operators’ duties to response personnel at crime scenes

April 2019 Editor's Choice, Surveillance, Security Services & Risk Management

Operators and response personnel interact with each other in a variety of situations. These may include operators notifying the response party of a situation requiring an intervention, or the response parties directing the operator to view a particular situation from their side.

In the past, I have emphasised the importance of the response function (see http://www.securitysa.com/7937a). However, what often does not get considered is that the control room operator often has a responsibility to monitor response scenes that goes beyond the initial detection and response relationship with response officers.

The control room operator has a responsibility to support the response personnel who arrive on site in a number of ways. This includes protection of the response party, whether through notifying them of possible physical threats, or reputational threats and allegations.

Where criminals are caught red handed, often the only way to get out of the situation is to accuse the response personnel of infringing their rights, or turning the focus on alleged violations by the response personnel. This tactic of deflecting the focus away from the crime onto the response personnel can be used surprisingly often. Where operators have the capacity to display a clear audit of response officer behaviour, it is an essential method of protection.

In other situations, response personnel may be focused on their engagement with a particular party, especially where someone is injured or there is a direct threat from an aggrieved party. Operators under these conditions may have to notify the response personnel of dangers beyond the current vison or focus so they can take appropriate action.

Besides protection of response personnel, extended operator viewing beyond the immediate response may include monitoring of subsequent perpetrator behaviour which may be used in court, possible involvement of accomplices, and the condition of victims who may have been affected. This is essentially additional evidence gathering which can be used to supplement the initial detection and have an impact on prosecution or sentencing.

Getting good identification of bystanders for possible later access for information would also be of benefit. Operators may also follow up on possible issues like searching for where things like stolen articles have been hidden, or weapons that may have been discarded. There may be further ongoing communication, arranging of help to the response personnel or affected people, and any arrangements to be proactive in anticipating problems and arranging early solutions to possible issues.

Besides assistance, operators also bear a responsibility for ensuring or auditing crime scene management. While this may cause them to come into conflict with the response personnel who are the first-line intervention, where operators see issues relating to the crime scene being affected, they should notify response personnel or, if necessary, liaise with control room management to mediate the possible damage to the crime scene integrity or evidence quality.

It also involves ensuring the all parties adhere to their obligations under these conditions. Taking a wide-angle view of the area to verify all people entering or leaving the scene may be important in being able to account for what happened subsequent to the event occurring.

The role of the operator definitely does not end with the arrival of a response officer to the scene of the event. There are various activities that can be done by the CCTV operator that assist and complement the response function. This includes support of various kinds, verification of various factors, auditing of processes, and gathering and logging additional information that could be used for further investigation or intelligence.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Cyber top business risk as climate change hits record high
Editor's Choice
Globally, companies identify cyberattacks, particularly data breaches, as their primary business concern for the coming year, with business interruption ranked second. In Africa and the Middle East, cyber incidents, shifts in legislation and regulation, and macroeconomic developments are the three foremost business risks.

Read more...
As technology converges, so does cybercrime
Editor's Choice
Cybercrime is no longer siloed: it involves complex collaborations and coordination between different malicious entities, including state actors, organised crime and even drug and human trafficking networks.

Read more...
The need for integrated control room displays
Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
New firearms training modules from ITA
News & Events Security Services & Risk Management
The International Firearm Training Academy has launched two new firearms training modules to support career development in the firearms industry: the Maintenance Fitter and the Firearms Custodian modules.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...