Anti-Terrorism Video Surveillance Bad at Fighting Crime

Author: Ethan Ace, Published on May 16, 2016

So much of city video surveillance has been deployed and funded with the intention of stopping, or at least mitigating, terrorist attacks.

But these systems are often bad at fighting crime, completely removed from the most troubled areas of the city they serve.

In this note, we take a look at these issues and potential recommendations to solve them.

** **** ** **** ***** ************ *** **** ******** *** ****** with the ********* ** ********, ** ** ***** **********, ********* *******.

*** ***** ******* *** ***** *** ** ******** *****, ********** removed **** *** **** ******** ***** ** *** **** **** serve.

** **** ****, ** **** * **** ** ***** ****** and ********* *************** ** ***** ****.

[***************]

Anti-Terrorism ******* *** ***********

** *** **** ******, **** ** *** ******* *** **** surveillance ******* *** **** ** *** **** ** ****-********* ******. For *******, **** *** ********** ** ******** ******** ** **** the ******* ****** ******** ********** ***** ******* ***** ** ****. ***** ****** ***** ** ********* ****** (*** ******** ** ****) many **** ************ *******, ********* *** **** *** *******, ** well ** ******* ******.

*********, ***** ****** **** ***** ** ******* ********* ******* ** a ********* ******, ***** ********* **** **** ***** **********: 

  • ***** **********: ***** ********* ****** **** ** ********, ******, ********** *****, *** even ***** ****** *********** ***** ****** ****** **** ****
  • *******:**** ******* *** ********* *******, ** **** ** ****** *********
  • ******** **************:***** ********, ********** ********** **********, *******, ***.

** *** *******, * *** ****** ***** **** **** * sports *****, ***** ********* *****, *******, *** ******** *********** ********** may ******* ******* ** ******* ******* ** *** ***** *****, highlighted **** ** *****:

Different ***** *** ******** *****

*******, ***** ********* ***** ** *** ***** *** ********* ** highest ***** *****, *** *** ** *********** ******* *** ***** police ***** ********** ** ******** *************. ****** *** ** **** to **** ***** ** ******** ****** ** ** **** * crime *****, ********* ** ***** ************* *** *******, *** **** ** not **********.

*******,******* **** ******* **** ******* *** ******** ** ****** ***** ** ******** *****, while ***** ********* ** *** ***** ***** **** ******* ******* and *** ** **** ****** ** ***** ******* ******** ** residents.

*** *******, ****** *** ***** ***** *** ********** *** ****** areas **** ******* ***** ***** (** ***), ** *** **** the none ** *** ********* ********** ** ********* ********* ******* *** near (****** ******* ******) ** *** ******* ***** *****, **** violent *** ********:

***************

***** *** *** ********* ********* ** ***** ***********:

*** *******

**** *** **** ** *** ****** ******* ** *****, **** as *******, *******, **** ********, ****** ********, ***., *** **** may ****** *** ******* ** *** ********* ***** ** ***** crime ***** *** ***** *****. ** **** ***** **** *** be *** **** ******, ** **** ****** *** ******* *** funded ******* ** ****** ** ***** *********.

**** ** *** **** ********* ******, ** *** *******, ********, wireless ******, *** ***** ********* ** ******** ** **** *** site **. *********** ******** **** **** ********* *******. ************, ***** must ********* ********* *** ****** ** ***** ******* ** ******** servers, *******, *** ******** *****, ** **** *** ******* ******** any ** *****, ****** ***** ** ******** ********* ****.

******** ******** *******

*************, ***** *** ** **** ** **** ******** ******* ** new *********. *******, ***** *** ******* *******:

  • ******** *******:**** **** **** ******* **** ** ***** ***, ** *** original ******* *** ***** ** *****, **** *** ****** ***, in **** ***** ****** **** ** *******, *** ****** ************ by *****, ***** **** ******. **** ** ***** ***** ******* have ****** *** **** ********, *** ***** ** *** *** in **** ** ****** ****** *** ************' ***********.
  • **** *** *** *** ********:********* *** ****** ** * **** *** *** *** *** location. *** *******, **** ********* *** ** ****** ****** ** multiple ***** ******* ******* ** *** **** ***** **** ****** in ***** *******. ** * ******** *** **** ********** *** light ******, ****** ** ********** ** *** * ****** ***.
  • ******** *********:***** **** ** ******* ** ******* ******** ******* ** *** new *********, ** ******** ****** (***** *.* *** ** *.* GHZ) *** *** **** ** **** ** ****** ********* ** higher ********** ******, ********** ** *********** ***** ***** ********** ******** is ******.

** ***** ******** *** ***, ********** ******* ** ****** * lower **** ****** ******** ** ****** *** **** ** *** system. **** ****** ***** *** ******** (************ *****, ******, *******, etc.) ******* *** ***, *** ********* ***** *** ******* ** eliminated.

Funding ********

*** *** ***** ** ***** ****** ******** ************* ** **** ******* has ****** **** **** ****** **** *** **** *** ***** compared ** *** ***/**** ***** **** ************ ****. ****** *** potentially **** *********** ******* ** **** **** ***** ********* ***** may *** ** ****** ** *** ** *** ******, **** little ******** ** ******** *** ********** ******* ** ****** ******** equipment ** **** ****** *********.

******* *** *** ******* ** ********* *** ****** **** *** US ********** ** *******, ****** ** ******* ****** ******** ** the ******** ******. ***** ****** *** ***** ****** ********* ******** ******** ******** (****)********* ***** ******* ********** ****** (***), ****** ***** ******* *** ** *********.

*******, ** *** *********** **** ************** *** *********** ******* ****, funding ** **** ****** ** **** **** *** *******:

  1. ***** ******* *******, **** ** ***** ** ****** ******/*******. *** availability ** ***** ******** ****** ****** **** ***** ** ***** or **** ****** ** ******.
  2. ******/******* ************, ** ***** ********* **********, **********, ** ********* ********** funding ** **** ******* *********. ***** ************ **** **** ** increase ********* ***-** *** ****** ********** ** *** ****** ************ system, ** ********* **** **** ********.

Comments (5)

This article conflates terrorism and crime, which are two different things with differing targets. While nearly all terrorism is criminal, not all crime is terrorism.

There are many definitions of terrorism. However, one common aspect of most definitions is that terrorism has a political purpose. Common crime does not. Toward this end, terrorists usually choose high visibility targets such as those outlined in this article:

  • Event Facilities: Large gathering spaces such as stadiums, arenas, convention halls, and even large school auditoriums where public events were held
  • Schools: Both primary and secondary schools, as well as higher education
  • Critical Infrastructure: Water supplies, electrical generation facilities, bridges, etc.

Besides rarely having a political purpose, common crime generally tries to be less readily apparent: poorly lit areas, at night, with few witnesses present.

So that cameras funded by DHS for antiterrorism are not placed in high crime areas makes perfect sense.

Disclaimer: This is my personal opinion and not necessarily that of my employer.

So that cameras funded by DHS for antiterrorism are not placed in high crime areas makes perfect sense.

Sure, we agree that DHS, by design, does not place cameras in high crime areas. The point is that terrorism has proven to be much less of a threat than garden variety crime and that those DHS funded cameras do not help as much as cameras designed and deployed for 'regular' crime.

Yes, but can they simply be relocated from their originally intended aims (anti-terrorism) without violating the grant from which they were funded and continue to be funded, even if the new locations are deemed a better service to the public?

I agree with you that terrorism is not an existential threat.

Whatever existential threat terrorism wields, it is only acting as a catalyst. Just as your body can overreact to a honeybee sting, killing itself in the process (anaphylaxis), terrorism's most tangible damage is that which its target inflicts upon itself in response.

The New York Times estimates the actual cost of the September 11 terror attacks at $55 Billion. Since then, the United States has spent $3.3 Trillion in response, sixty times as much. The political and psychological effect of terrorism is to magnify the threat much like an immune response gone haywire.

The point of the article is that cameras placed for antiterrorism are not in high crime areas. I was attempting to explain why this is by design and not by mistake.

Disclaimer: This is my personal opinion and not necessarily that of my employer.

I was attempting to explain why this is by design and not by mistake.

Again, we understand that this was by design. The point is, as you acknowledge in your response above, it has turned out to be a mistake in the greater scheme of things.

In other words, some things can be 'by design' and still turn out to be a mistake that would benefit from change. This is not meant politically, but as a observation on how cameras are used by cities.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Last Chance - Save $50 - July 2018 IP Networking Course on Jun 20, 2018
Today, Thursday the 21st is the last chance to save $50 on registration. Register now and save. This is the only networking course designed...
Cybersecurity Startup VDOO Disclosing 10 Manufacturer Vulnerabilities Starting With Axis And Foscam on Jun 20, 2018
Cybersecurity startup VDOO has uncovered significant vulnerabilities in Axis cameras along with many others not yet disclosed. In this report, we...
S2 Access Control / 'Unified Security Management' Profile on May 08, 2018
In our 13th access control company profile, we examine S2 Security's Netbox platform: Unified Security Management Platform positioning Core...
IP Network Hardware for Surveillance Guide on May 02, 2018
Video surveillance systems depend on IP networking equipment. In this guide, we explain the key pieces of equipment and features, explaining where...
Netwatch / NMC Mega Deal Targets Global Remote Video Monitoring on Apr 27, 2018
Big money has entered the remote video monitoring market. While remote video monitoring has been done for more than a decade, the market has...
Favorite Access Control Manufacturers 2018 on Apr 26, 2018
150+ Integrators told IPVM "What is your favorite access control management software/system? Why? Unlike the 2016 access favorites where a group...
Rare Video Surveillance Fundraising - Verkada $15 Million on Apr 19, 2018
Fundraising in video surveillance (and the broader physical security market) has been poor recently. Highlights are few and far in between...
ISC West 2018 Access Control Rundown on Apr 06, 2018
For ISC West 2018, what is new and interesting in access control?  This rundown will bring you up to speed on the exhibitors, what they are...
The 5 Major Lock Profiles Guide - Euro, Oval, KIK, Interchangeable Core, Mortise on Apr 03, 2018
Locks are used everywhere, but they are not all the same. In fact, even the shape of the lock changes, sometimes for no other reason than...
70+ New Products Directory Spring 2018 on Apr 02, 2018
We have compiled a list of new products for Spring 2018 in the categories: Video Surveillance Access Control Fire and Intrusion Other...

Most Recent Industry Reports

IFSEC Show Report Day 2 Report on Jun 20, 2018
IPVM is live from London reporting on the IFSEC show. The Chinese have taken over the UK, centered on Hikvision, flanked by Dahua, Huawei and a...
Mobotix Releases 'Move' Into 21st Century on Jun 20, 2018
For years, Mobotix stood resolutely against, well, every other manufacturer, selling it as a virtue: MOBOTIX equipment is designed with no...
Cybersecurity Startup VDOO Disclosing 10 Manufacturer Vulnerabilities Starting With Axis And Foscam on Jun 20, 2018
Cybersecurity startup VDOO has uncovered significant vulnerabilities in Axis cameras along with many others not yet disclosed. In this report, we...
July 2018 IP Networking Course on Jun 19, 2018
The last chance to save $50 on registration is this Thursday, June 21st. Register now and save. This is the only networking course designed...
Axis Guardian - Cloud VMS And Alarm Monitoring - Released on Jun 19, 2018
Axis has struggled to deliver a cloud-based managed service video platform. Video service providers have utilized AVHS for over a decade, and have...
IPVM Vulnerability Scanner Released on Jun 18, 2018
IPVM is proud to announce video surveillance's first and only cybersecurity vulnerability scanner. This tool allows quickly and simply...
Hikvision Corrects False Cybersecurity Announcement on Jun 18, 2018
Hikvision has corrected a false cybersecurity announcement that claimed a British government-sponsored program endorsed the cybersecurity of...
The Dumb Ones: PSA's Bozeman On Cybersecurity on Jun 15, 2018
The smart ones are the hundred people who flew to Denver and spent $500+ on a 1.5-day conference featuring Dahua as a 'cyber responsible partner',...
Amazon Ring Launches $10 Monthly Professional Alarm Monitoring on Jun 15, 2018
Amazon's Ring has announced an alarm system with 24/7 professional alarm monitoring for $10 per month, a fraction of the $30+ per month traditional...
Axis Releases First New Access Controller In 5 Years (A1601) on Jun 15, 2018
It has been 5 years since Axis 2013 entry in the physical access control market, with the A1001 (IPVM test). Now, Axis has released its second...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact