Criminal countermeasures to CCTV

November 2011 Surveillance

One of my early memories of CCTV is viewing an employee in a gold plant picking up some gold bearing material, looking around very obviously, and then without any attempt at concealment, putting it into his pocket. He was one of the first successes of the CCTV system, whereupon things got a lot more difficult as those planning theft became more aware of cameras and showed less obvious behaviour.

Now years down the line, crime is becoming increasingly more professional and organised. This is particularly so at a syndicate level and we find that syndicates are increasingly preparing their members, and if necessary, making attempts to rescue them from the justice system.

I emphasise in my training courses that for every action we take as security, there is a counter reaction from the criminal elements. It may not be direct response to hammering down a gate, for example, and rather take the form of crime occurring in another context or area. The spread of ATM bombings as bank robberies and cash in transit heists become more difficult is an example of this.

With CCTV systems we have had a number of things over time, from hosing cameras while cleaning, pushing cameras with brooms or poles so they are out of alignment, maintenance errors which leave cameras inappropriately placed, or obstacles placed in front of cameras. It is important for operators to be aware of these kinds of issues. That is why having a reference camera view photo printed out so one can compare the current camera view to the designated view is a good idea. Similarly, you need to safeguard your footage. It is pointless having a CCTV system if the criminals take off with your DVR or server containing all your recordings.

The one advantage that CCTV has is that we can generally see that somebody is going to try to counter the camera. Counter strategies produce behaviours that one can look for and recognise. However, knowing that CCTV can be effective, syndicates are increasingly targeting security themselves.

Contract security guards in particular are usually at the lowest end of the pay scales, work difficult hours, and are often not supervised to the degree that they probably should be. These factors partially contribute to the fact that such security personnel are often found facilitating or even actively involved in theft – in some cases being offered sums equivalent to months or even years of wages. That is not to say all security officers are like this – I am continually amazed at the calibre of some of the personnel we have in low, poorly paid positions, but who have outstanding potential. Nevertheless, CCTV identifies security involvement in theft on a regular basis.

Given the success of CCTV in identifying criminals, it is logical that syndicates are at some stage going to focus on surveillance operators to help compromise the systems. Instances of turning cameras away, deleting recordings and not following procedures in evidence documentation do happen from time to time. While the vast majority of operators are intending to do their jobs, we do have to deal with syndicate infiltration as a fact of life. I have seen a CCTV surveillance operator acting as an inside accomplice facilitating theft from the control room and displaying all the signs that the criminal directly involved in the stealing on the ground was also likely to be showing. Having cameras in the control room itself is therefore a basic requirement.

Given that syndicates may approach an operator in your control room, what can you do to combat this? Support for operators and staff is critical to try and avoid situations where they are exposed to threat or being comprised. This includes social support, encouragement, rewarding performance, and setting out values which management demonstrate and practice.

Operators need to report on any approach that is made to them. This also allows the company to test whether this does in fact occur. Having measures that check on the integrity of systems as much as possible and providing audit and measurement trails are also important. Ensuring people can be linked to actions is a good way of discouraging adverse involvement.

Personal assessments such as polygraphs or the potential use of polygraphs can also play a part. Where an operator is threatened by criminals and he or she can reply that there is a very high chance they will be caught and lose their jobs because precautions are in place, it makes it more difficult for syndicates to put the same pressure on that person. Expectations of certain levels of detection as a monthly performance measure can also ensure better effectiveness for surveillance, even if these are on a group or shift basis.

The best way of ensuring people stay loyal is to provide the conditions and management culture to promote this as much as possible. We will not overcome these kinds of challenges from crime syndicates by pretending they don’t happen. It is a problem that is going to get worse over time and we need to have strategies in place to anticipate and prevent it.

Dr Craig Donald is a human factors specialist in security and CCTV. He is a director of Leaderware which provides instruments for the selection of CCTV operators, X-ray screeners and other security personnel in major operations around the world. He also runs CCTV Surveillance Skills and Body Language, and Advanced Surveillance Body Language courses for CCTV operators, supervisors and managers internationally, and consults on CCTV management. He can be contacted on +27 (0)11 787 7811 or [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Human-centric control rooms
Iritron Integrated Solutions Surveillance Residential Estate (Industry)
Iritron and Oculus show that when it comes to control rooms, people, not just technology, are at the centre of the most significant performance differentiators today, not just how efficiently the technology works.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Secure, long-distance thermal from Keenfinity
Products & Solutions Surveillance Residential Estate (Industry)
The DINION thermal 8100i camera is a bullet thermal camera built for mission-critical applications, prioritising long-distance monitoring and reliable perimeter intrusion detection with built-in Intelligent Video Analytics (IVA) Pro Perimeter video analytics.

Read more...
IVA AI Pro Visual Gun Detection
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of the IVA AI Pro Visual Gun Detection analytics based on deep learning. It is designed for automatic detection and classification of people and brandished firearms.

Read more...
IP-based horn loudspeakers
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of its new IP-based horn loudspeakers and amplifier module: the high-output LHN-UC15L-SIP horn (for long-throw applications), the compact LHN-UC15W-SIP horn (for wide-angle coverage) and the AMN-P15-SIP amplifier module.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
LiDAR protects railways from new and existing dangers
Surveillance
3D LiDAR (Light Detection and Ranging) sensors are being installed to monitor rail traffic and ensure safety of passengers as well as individuals walking near the tracks, or trying to perform dangerous stunts for social media.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.