Surveillance-friendly environments

February 2001 News & Events

I was in a CCTV control room of an operation recently where I was looking at the way that they were doing surveillance. Within the space of a few minutes, I saw several behaviours that could have been actions associated with the theft of an article although they occurred as part of the normal working process and one could not see the article at all.

The operators were relatively unmoved by this - they see these behaviours all the time and have no way of knowing whether these are innocent actions or deliberate attempts at taking something. If the operator calls security to apprehend the person and nothing has been taken, it leads to awkward public and employee relation issues. If they do nothing, they run the risk of something being taken without their knowledge. Because the company and management culture is sensitive about employee issues, operators have to avoid disruptions and therefore no action is taken in ambiguous cases. If operators see behaviour that clearly shows a theft they are allowed to get a response team in. The only trouble is that theft is seldom that obvious and as a result there is a minimal incident detection rate as operators do not want to create unnecessary scenes. Although the CCTV system may act as a deterrent, this is clearly a surveillance-unfriendly environment.

There are a number of areas that influence how surveillance-friendly your environment is:

* The working environment: How easy is it to view the target activity? This includes line of sight, lighting, light contrasts, obstructions etc and incorporates the concept of having defensible space. Metallurgy plants in older diamond and gold mines, for instance, were designed with no thought for surveillance cameras. Characterised by low light, wet and with multiple levels, piping and structural viewing obstructions, they are difficult to conduct effective surveillance in. Newer operations incorporate more features to allow clearer lines of sight, better viewing angles in high risk areas, and a far more surveillance-friendly facility. A common problem in many production lines with large scale goods (eg motor vehicles) is that when working on the product the person is hidden from view. Similarly, many town CCTV centres have to deal with store signs being placed in direct viewing lines of cameras and obscuring views behind them, which then have to be moved. To what extent is security/surveillance involved in analysing the risk features within the working environment?

* The production process: How easy is it for the operator to understand what is going on in the production process so it can be recognised when something inappropriate is happening? In more complex environments, extensive training is given to familiarise operators with what is going on. In the casino industry, for example, operators are given weeks of training in gaming procedures. If the production process is predictable, it is a great deal easier to identify deviations. Also, how easy is it to camouflage theft within the normal cycle of activities or in the standard behaviour required to do the job? Are minimal hand or arm movements required, are target items being continually handled? Where should they be handled?

* Management culture: Is management committed to establishing a surveillance-friendly environment even if this means some constraints on the normal activities or dress of personnel? Some measures include pocketless coats or overalls, standard uniforms, short sleeves, target personnel having to show clean areas or hands after certain operations, a prohibition or restriction of movements in the working area. These are often seen as restrictive by personnel but can make the task of detection much easier. To what extent are surveillance operators authorised to make a decision that could cause a loss in production if they feel a serious incident has occurred? Is management committed to pursue findings by surveillance personnel or do they hang back?

* The distinctiveness of incident behaviours: How easy is it to recognise the incident? How easy is it to confuse the incident behaviour with normal behaviour? To what degree can the incident behaviour be camouflaged as part of normal behaviour? How often do incidents occur and what impact does this have on the vigilance requirements of the person to be selected? To what extent can the signs of an incident developing be picked up? How will a person remove a stolen object and how obvious will this be? Where can they go to conceal it?

Some environments are a great deal easier to perform surveillance on than others. However, this is both a result of the type of operation, when it was developed, how management have treated the potential risk within the operation, the influence of security within the production process, the nature of incidents themselves, and the ability of personnel to spot what happens. If your surveillance environment falls into the unfriendly category, you need to seriously consider what you can do in the different areas to make it more effective. What is important is that it is not just security's problem. To get an effective surveillance, a friendly environment is a key responsibility of risk management for managers across all areas.

Dr Craig Donald is an industrial psychologist and specialist in human factors in security and CCTV. He is the co-developer of the Surveillance and Monitoring Assessment Exercise (SAMAE) for the selection and placement of CCTV operators and presenter of the CCTV Surveillance Skills training course. He can be contacted on tel: (0110 787 7811, fax: (011) 886 6815 or [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
The power of PKI and private sector innovation
Access Control & Identity Management News & Events Government and Parastatal (Industry)
At the recent ID4Africa 2025 Summit in Addis Ababa, the spotlight was firmly on building secure, inclusive, and scalable digital identity ecosystems for the African continent.

Read more...
Bosch Security renamed Keenfinity
News & Events
Globally renowned brands for video systems, access control and intrusion alarm systems, as well as communication systems, unite under the roof of the new company Keenfinity Group.

Read more...
2025 video surveillance market set for improved fortunes
News & Events Surveillance
Novaira Insights has unveiled its latest report, World Market for Video Surveillance Hardware and Software – 2025 Edition, forecasting a healthy growth rate of 8,1% until 2029, excluding China.

Read more...
Wialon announces integration with fleet maintenance and optimisation platform
News & Events Transport (Industry) Logistics (Industry)
Fleet management software platform integrates with a fleet maintenance and optimisation platform to support mutual customers for better workflows and deeper insights into fleet operations.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Value and industry insight
Securex South Africa Training & Education News & Events
Securex South Africa 2025, co-located with A-OSH EXPO, Facilities Management Expo, and Firexpo, drew thousands of security professionals from across the continent and beyond, offering a platform for networking, product discovery, and knowledge sharing.

Read more...
Gallagher Security achieves ISO 27001 recertification
News & Events Training & Education
Gallagher Security has successfully achieved certification to the updated ISO/IEC 27001:2022 standard for Information Security Management Systems (ISMS). This accomplishment builds on previous certifications and reflects a continued commitment to the highest standards of information security.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.