Counter-terrorism and CCTV

February 2010 Surveillance

Craig Donald reports back from a counter-terrorism conference held in London last year.

A major counter-terrorism conference was held in London in November 2009 at which current issues and approaches to terrorism were addressed by a number of international and UK speakers. The two-day forum provided an insightful look at international threats, and highlighted a number of main trends that are being faced by all countries. I was fortunate to attend, having being invited by the hosts, Arena International Events, to speak on some of the implications of using CCTV in its application to terrorism.

Much of the initial discussion was dominated by the Mumbai attacks, reflecting that impact that they had on world perspectives, even a year after the event had occurred. With analysis and perspectives from a number of prominent speakers, a variety of critical issues were highlighted about how the attacks had taken place. Those involved in counter-terrorism are highly aware that these would likely be similar to terrorist attempts in the future.

* Main terrorist targets were identified specifically for the sensation value and the association with Western and particularly USA interests. This is a constant theme through most terrorist attacks.

* Reconnaissance was done extensively, with information linked to some of the targets of the attacks being picked up on a suspect apprehended weeks beforehand, but not acted on. The terrorists displayed a knowledge of the layout of hotels and the city that indicated that several had been there before. Similarly, the London tube bombers rehearsed their bombing plan beforehand.

* The terrorist strategy was to maximise death and disruption, and active steps were taken against security forces that were going to respond. We have seen secondary bombs primed to go off to hit emergency response and security personnel in places such as Indonesia and this is also a constant theme of a number of attacks.

* Multiple targets were attacked simultaneously to spread maximum confusion – taxis, for example, had bombs left in them to explode randomly around the city at the designated time. This was a particular characteristic of the Mumbai attacks and was central to the attackers’ strategy. The result was a mix of attacks that were directed at specific targets, and others designed to be random in nature.

* Camouflage was an essential ingredient of the terrorist strategy, from the use of a hijacked Indian ship to land on shore, to the use of unknowing taxis transformed into random car bombs, to the takeover and use of a police vehicle to drive around and shoot people. Student cards from facilities in Mumbai were found on some of the terrorists, indicating for at least one of the conference speakers, that their intention was to blend back in with the local population once the maximum effect had been created. The attack on the Sri Lankan cricket team saw a similar approach where attackers disappeared after the attack.

* TV press coverage was actively used by terrorist handlers to assess not just damage and impact, but terrorist strategy. The terrorists were briefed by their handlers in realtime via cellphone as security responses were happening, such as the time and numbers of Special Forces dropping by helicopter onto the roof of the building they were occupying.

In looking at CCTV and its implications for terrorism, I made the point that crime changes continually in response to security precautions. The same is valid for terrorism, with the Mumbai attacks containing similarities to previous situations, but introducing a range of new threats and dynamics.

A speaker representing one of the major international hotel chains showed how evolving protection at hotels was trying to anticipate threats and how protection had changed over time. A key point is that this protection had resulted in stopping the impact of some major terrorist bomb attacks on hotels around the world, unfortunately with some loss of life of security personnel though. The point was also made by a US police representative that measures that frustrate the purpose of the terror attack can have a major mitigating effect.

In the Mumbai attack one of the targets was the railway station. In the station, two terrorists got into an exchange of fire with two constables armed with a single bolt action Lee Enfield rifle between them. However, by keeping the terrorists occupied for a few minutes, those two guards potentially saved tens or even potentially hundreds of lives as people evacuated the station while the exchange of fire was going on. Having a number of highly armed specialist police groups around the city has now become at least one US city’s precaution to combat a potential terrorist attack similar to that of Mumbai. As security practitioners, we need to constantly think through the potential attacks that can occur.

The use of CCTV in combating terrorist attacks appears to be relatively poorly developed though, and the three speakers including myself were looking at crime and by implication, terrorism as a crime. Professor Martin Gill made the point that those responsible for implementing CCTV have seldom paid attention and listened to those who are responsible for committing the crime. His own research includes interviews with shoplifters and perpetrators of more serious crime to try to understand their perceptions of CCTV and how it affects their actions. It may not be possible to get interviews on their techniques with terrorists, but we need to look at their perspectives, values, and strategies in order to design our systems accordingly. If we align our CCTV viewing more with these needs, our observations are likely to be more effective.

At the conference, I highlighted the possibilities of looking for terrorists and terrorist actions through behavioural recognition and indicators, something I focus on in my training. All crimes have their unique indicators, and people need to do certain things in order to commit the crime. They also show a number of body language signals, whether voluntary or involuntary during that time.

By actively looking for these, we can increase the potential impact of our surveillance by proactively looking for signals that something is likely to happen and recognising it more quickly when it does. Further, once we have spotted a terrorist incident on CCTV, we need to ensure that the CCTV can be used in the most optimal way in order to direct an effective response to incidents.

Facilities to pass on CCTV information, direct attention to critical areas, collate and integrate video information, and generate intelligence to inform security responses needs to be an integrated part of any crises centre. CCTV has huge potential in dealing with the detection and impact of terrorism, but there is a great deal of work still to do in realising this potential in operations and strategies.

Dr Craig Donald is a human factors specialist in security and CCTV. He is a director of Leaderware which provides instruments for the selection of CCTV operators, X-ray screeners and other security personnel in major operations around the world. He also runs CCTV Surveillance Skills and Body Language, and Advanced Surveillance Body Language courses for CCTV operators, supervisors and managers internationally, and consults on CCTV management. He can be contacted on +27 (0)11 787 7811 or [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Human-centric control rooms
Iritron Integrated Solutions Surveillance Residential Estate (Industry)
Iritron and Oculus show that when it comes to control rooms, people, not just technology, are at the centre of the most significant performance differentiators today, not just how efficiently the technology works.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Secure, long-distance thermal from Keenfinity
Products & Solutions Surveillance Residential Estate (Industry)
The DINION thermal 8100i camera is a bullet thermal camera built for mission-critical applications, prioritising long-distance monitoring and reliable perimeter intrusion detection with built-in Intelligent Video Analytics (IVA) Pro Perimeter video analytics.

Read more...
IVA AI Pro Visual Gun Detection
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of the IVA AI Pro Visual Gun Detection analytics based on deep learning. It is designed for automatic detection and classification of people and brandished firearms.

Read more...
IP-based horn loudspeakers
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of its new IP-based horn loudspeakers and amplifier module: the high-output LHN-UC15L-SIP horn (for long-throw applications), the compact LHN-UC15W-SIP horn (for wide-angle coverage) and the AMN-P15-SIP amplifier module.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
LiDAR protects railways from new and existing dangers
Surveillance
3D LiDAR (Light Detection and Ranging) sensors are being installed to monitor rail traffic and ensure safety of passengers as well as individuals walking near the tracks, or trying to perform dangerous stunts for social media.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.