Surveillance strategy - surveillance functions and levels

May 2002 Surveillance

The surveillance strategy that is appropriate for any operation will consist of a number of functions or activities. These functions are important not only in defining what you are going to do, but also in setting up an appropriate departmental structure, clear job definitions and responsibilities, and appropriate manpower and training in order to carry out the objectives of the system.

The types of surveillance functions will require different levels of expertise. Activities therefore need to be consistent with formal levels of expertise within the department. A general principle is also to have a system of audit checks to verify the quality of surveillance. This is typically accomplished through a series of levels or tiers of surveillance. These tiers are also consistent with the levels of skill development and may provide a career path for operators entering the surveillance function. Some of the possible functions are described under general headings below.

Basic surveillance functions

* Camera patrolling: This is the detection of intruders or the presence of people in areas where they should not be. Camera patrolling can also led to the inspection of sites to detect incidents and the detection of events (eg diamond spillage).

* Remote escorts: Surveillance of personnel walking through or working in an area. This could be aimed at detection (eg theft while in an area), or protection (eg remote escorting of tourists through known crime spots).

* Picture comparison: Verification of the identity of personnel requiring access to areas.

* Camera checks: Checks that cameras and system are working.

* Direct incident detection: Live surveillance aimed specifically at the detection of incidents where people are in working areas or to detect scenes in public areas. This could include theft of articles, nightclub violence, or visual searches.

* Incident handling: When an incident is detected, responsibilities need to be allocated for continued tracking of the parties to the incident while also arranging and controlling a police or security response to the incident. It is difficult for a single operator to do both of these simultaneously and ideally there needs to be some kind of 'handover'.

* Verify compliance to rules/work procedures (eg casino table procedures/diamond sorting). This is an essential part of the casino environment, but companies like DeBeers have also implemented 'rules-based systems' that provide a structured basis to guide people's actions in high-risk areas.

* Monitoring of high risk situations in the production environment: Certain high risk activities are likely to occur within any environment. When these occur, more intensive surveillance should be directed at them. This could include things like cash (or goods) in transit transfers, occasions when working with objects such as gold, high value casino chips, or volatile public situations). This kind of surveillance may require expertise knowledge in the critical area.

* Alarm inspection: Live inspection of alarms generated through motion or infrared detection. These usually display on monitors automatically, either through blank screen technology or on allocated monitors.

* Recording of suspicious behaviour: Behaviour that seems out of place or inappropriate, but does not clearly show an incident should be recorded for follow up by more senior personnel.

Advanced surveillance functions

* Dedicated surveillance on specific suspects: This can be referred to as directed, focussed or targeted surveillance. It involves the tracking and in-depth surveillance of suspects including their behaviour, movement and contacts. Often such surveillance is driven by intelligence or profiling information. This can occur both in work and public environments.

* Coaching/training: Coaching of other operators, particularly junior personnel on surveillance techniques and situational awareness of what is happening in those sites.

* Profiling of individuals: This involves profiling individuals' behaviour, characteristics and even lifestyle to identify anomalies or signs of involvement in criminal dealings. Key to this is having an acceptable and ethical set of criteria for profiling. With such profiling, changes or out of the ordinary behaviour can be examined more closely to see if these are related to incident conditions.

* Profiling of situations: Situational profiling can reflect two major themes. The first of these is to establish normal benchmarks of performance or behaviour. This then allows one to recognise anomalies or breaks in the normal process. Secondly, profiling of unusual events within a specific location provides the basis to assess the risk within these situations. A number of occurrences or events, for example, may lead to the identification of a theme or consistent elements. One would like to establish things like whom is involved, when and what time it happens, and actions that occur. This may lead to identifying hotspots or directing surveillance on certain people when they are in those situations.

* Crime profiling: The more one knows about techniques and methods of a particular kind of theft, the better one is prepared to detect it. Crime profiling involves building up these signs for different criminal incidents to make it simpler to detect the crimes when they occur.

Auditing functions

* Review and auditing: This auditing generally occurs at a higher level than the initial operator viewing. This is because such an audit function requires greater expertise in order to pick up incident conditions. Typically, the increased expertise, the time available to repeat viewing of suspicious scenes and the option of slow motion replays will lead to a appreciable rate of detection of incidents during review that are not initially picked up. However, review has a critical quality control function in the following areas:

• verifying views of first tier viewing (what is covered and not covered)

• verifying integrity of first tier viewing (quantity and quality of detection)

• inspecting camera views not covered live by first tier.

* Alarm reviews: This is the systematic offline review of alarms generated by the system. This is sometimes addressed through a video management system that logs the alarms and initial few seconds of video to allow evaluation of the causes of the alarm. Whether such reviews are done manually or through automated systems, causes of alarms need to be addressed as part of a programme to reduce alarms to manageable levels.

Specialist functions

* Reconciling risk profiling across areas/time and people: Trend and pattern analysis of information from multiple sources to identify risk areas and people.

* Maintenance of individual profiling database and identification of investigation needs.

* Identification of targets: Identification of targets for dedicated surveillance and developing strategies for syndicate detection.

* Crime pattern reports: Analysis of incidents and implications for surveillance strategy and planning.

* Evidence handling: Handling and preparation of case for detected incidents.

These functions or activities can be allocated into a 'tier' system based on requirements of the organisation. As indicated, the functions themselves, and the way they are organised into 'tiers' will vary from operation to operation. Indeed, some operations may only have a single tier position, although a number of activities would have to be sacrificed as part of this. Table 1 provides a guideline for this allocation.

Table 1. An outline of how surveillance functions can be allocated to different tiers
Table 1. An outline of how surveillance functions can be allocated to different tiers

Full implementation of all functions outlined above requires a strong commitment of resources. For most operations, priorities and the nature of surveillance will determine what gets covered. It is probably better, however, to do less things well than to try and cover too many options with insufficient resources so they cannot be addressed effectively. The use of business applications and process enhancement is also an area that can be addressed but is not included in the table.

This is why the early definition of a surveillance strategy needs to consider how the CCTV system is going to be used so resources, people, and the work infrastructure and procedures can be aligned effectively in order to achieve the required objectives.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI human detection cameras vs outdoor detectors
Provision ISR SA Surveillance
The advancement of technology has revolutionised many aspects of security systems, notably in the transition from traditional outdoor alarm detectors to modern, AI-based, human-detection IP cameras, which offer many benefits.

Read more...
Safeguarding farmland with digital solutions
Axis Communications SA Surveillance
Marlenique Estate, located in the Western Cape, opted for an Axis end-to-end solution to protect its premises with access management, remote monitoring, and property and asset protection.

Read more...
Cutting costs and enhancing security
Secutel Technologies Surveillance
[Sponsored] Visual verification, powered by the Secutel Visual Verifier, detects and verifies intrusions and physical attacks and ensures comprehensive protection in areas where high-value losses are at risk.

Read more...
Supercharge surveillance with AXIS Camera Station Pro
Duxbury Networking Surveillance Products & Solutions
Designed to put efficient surveillance at users’ fingertips with an intuitive interface that is easy to operate, AXIS Camera Station Pro 6.2 provides a customisable video management and access control solution for companies of all sizes.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
SMART Surveillance at the Indaba
SMART Security Solutions Editor's Choice Surveillance Videos
SMART Security Solutions hosted its second SMART Surveillance conference, focusing on a range of topics related to the video surveillance market, on July 11th, 2024, at the Indaba Conference Centre in Fourways.

Read more...
Horn speakers from Sunell
Forbatt SA Products & Solutions Surveillance Residential Estate (Industry)
Horn speakers are an effective tool for actively deterring intruders from entering estates. By emitting loud, clear audio warnings, horn speakers can alert trespassers that they have been detected and are being monitored.

Read more...
Sunell’s range of thermal cameras
Forbatt SA Products & Solutions Surveillance Residential Estate (Industry)
Thermal cameras offer significant value to estate security. Their ability to provide reliable surveillance in all lighting and weather conditions ensures continuous monitoring, providing a constant sense of security and reducing the likelihood of security breaches.

Read more...
Integrating radar and surveillance
Forbatt SA Products & Solutions Surveillance Residential Estate (Industry)
Integrating radar with CCTV video systems significantly enhances estate security by providing long-range threat detection and comprehensive monitoring capabilities. This combination leverages the strengths of both technologies, offering several key benefits.

Read more...
Sunell anti-corrosion cameras
Forbatt SA Products & Solutions Surveillance Residential Estate (Industry)
With Sunell’s anti-corrosion range of cameras, the initial investment in anti-corrosion CCTV cameras may be higher than standard cameras, but the long-term benefits outweigh the upfront costs.

Read more...