The Most Frustrating Surveillance Operator Job

Author: Carlton Purvis, Published on Jan 09, 2014

Think your job is tough? You have it easy compared to this senior surveillance operator for a Fortune 500 company with more than 50 sites all around the world. In this note, we share our exclusive interview and insights into the operational problems and challenges he faces.

Constant Alerts

What makes the job particularly frustrating is that during the day there are almost constant alarms. His whole job is to respond to these alarms and log the causes.

The company has around 50 sites around the world including New York, Texas, South America and Europe, including data centers, warehouses and office buildings. Some sites have as little as three cameras and the biggest has about 40. In all there are just over 1,000 cameras, he said.

“I’m at a desk and I’m surrounded by computer monitors. There is always an alarm going off for sites all around the world. When the alarm goes off, a video stream will pop up an show us where the alarm is going off and then we have to investigate it by reviewing the footage to see what was going on. It gets kind of monotonous after a while,” he said.

Many Alarms Synced to the Camera System

In some cases, like at night or in remote areas, the alarms are motion activated. They also have window break alarms, the company’s executives all have personal panic alarms and some are synced with access control systems.

All False Alarms

More than 99 percent of these alarms are false.

“There are alarms that constantly go off for no reason like when someone walks by or someone opens a door and well tell the sites about it and put a ticket in for it. I suspect they don’t want to pay the money,” he said.

A glass break alarm at one site goes off every time a loud car drives by. The DVR at a site in the US is faulty and at another site few camera views take extremely long to load.

“For some reason we can’t review the video on those cameras but you start to get a feel for which ones you can pull up quickly and which ones are harder ... we just keep those available on the main screens,” he said.

Sometimes the software doesn’t give an alarm when it should, but “nothing really horrible has happened,” he said. “I’ve been here a year and everything has been pretty smooth.”

Outside of faulty equipment there are also “courtesy alarms.”

“For example, after hours if someone opens the main office building door then we get an alarm,” he said. But from there it becomes a judgement call. The company has thousands of employees so it’s impossible for operators at a remote site to know them all.

“We have to guess whether that person is an employee or a cleaning person or a maintenance person so there’s that little bit of room for error. A thief could probably walk in wearing a suit and steal everything and we wouldn’t know until he was walking out the door with all the stuff,” he said.

They get a legit alert about once per month, generally for people vandalizing property, breaking in or often homeless people looking for somewhere to get warm.

A Typical Day

The global command center is located at one of the company's data centers, its most valuable asset.

“It’s like $10 million lost for every minute the data center is down so they have people there 24/7 and critical systems technician and we work pretty closely with. Sometimes we’ll relay [alarm] information to them to go and check it out.”

The shift starts with the day’s briefings, “then we sit down, and we wait for the alarms to start coming in,” he said. “Halfway through my shift the other guard leaves. Then I get all the cleaners setting off the alarms because they don’t have badges, they have keys. Near the end of my shift it totally dies down though and you have more time to review the video when you get alerts.”

Being good at this job means getting good at reviewing video quickly and closing out alerts.

“You just have to stay on top of it. People get overwhelmed by it, but I actually like it because it keeps me awake,” he said.

When An Alarm Is Real

When an alarm is real, the company has a click-through flow chart program that takes and operator through all the response steps for specific incidents from alerting managers to notifying police. The web-based program allows them to enter notes. They export video and attach it to generate an instant report.

False Alarms Cause Intra-Company Animosity

The company's bigger sites have security guards on-site that they can coordinate with. When those guards go on tours they transfer all of their alarms to the global operating center.

“So then we’re constantly calling them to check things out and they don’t understand that we’re trying to help them. They think we’re a big bad watchdog, always watching over them,” he said. He says his managers will get complaints from managers from other sites that they are calling them too often.

Who Can Handle a Job Like This?

A veteran with military surveillance operator experience, he has quickly moved up in the ranks at the company.

He says people usually first train as operators at the global command center to see how proficient they are at it. The people who can handle the amount of alarms coming in get to work at bigger sites. The ones who cannot either do not get the job or get stationed in areas with less going on.

*** **** ****** ****** ******** ***** * ***** ******* ** would **** *** ******** *******. ****** **** ***** *** ** the **** ****** **********, ********** ****** ******.

Comments (10)

“** **** ** ***** ******* **** ****** ** ** ******** or * ******** ****** ** * *********** ****** ** *****’* that ****** *** ** **** *** *****. * ***** ***** probably **** ** ******* * **** *** ***** ************* ** ******’* **** ***** ** *** ******* *** *** door **** *** *** *****,” ** ****.

* ********** ** ********** ****** ******* ** **** ** **** *******? If **, ***** ** * ****** ************* ** ********* ***** and *** ********.

**** *** ** ****, *** *** ** *** *****.

*** ***** ***** **** ***** ** ***** **** ********** ********/********** pictures ********* ** ******** ***** ** **** ***** ********* ** someone *** ******** ** * **** ** ***. *** *** you **** ******* ******* ** ***** ** *** ***'* ******** who ** ******* ** *** *** ** **** ********* *** if **** ****** ** ***** ** *** ***** *****?

** *** *** *** ******* ******* ** ***** ******* ******* an ******* ** **, *** ***** ***** **** ******* ***** pictures **** ** ***** *** ****. ** *** ***** *** my ******* (******* **** * ******* *** *******) *** ******* anywhere ******* *,***-*,*** ******** ********** ********* ******* ** *** ********** around *** *****. **** ** ** *** ** *** *,*** employees. **** ** ***** ******** ********* **** **** * ***-****** of * ****** ** ******** ** ***** ********* ********** *****. Meaning *** *,*** ********* **** *** **** **** **** *** not ** *** **** *,*** **** **** (******* *** ******** are *** **** **** ** ****, *** *** ***** ** month). ********* ** *** ******* ******** ******** ** **** ** our **********, *** ******* **** **** ** ***** ******** ********* and *** ****/**** ** ****** ** *** ** ****** ***** of **** ** ** *** **** ******** ********.

***** **** **** *** ***** **** * ************* ******* *** have ** ****** ******* **********, ***********, ****/**** *******, *********, **** services, ***. ***. ***. **** **** *** **** *****. **** if **** **** *** **** *** ** *** * ***** break ** *** **** *** ***** ** *** *** ******** and ***** ** ****** *** ********.

**** - * ******* **** **** *** ** * ********* for *** *******, *** *'* ******** ** ***** ***** ************ described ** *** *********:

“*** *******, ***** ***** ** ******* ***** *** **** ****** building **** **** ** *** ** *****”

*** **** ********** ****** ***** ** ************** ** talking ***** ****? ******** *** **** ****.

** *** ** ******** ****** ** ********** ******** ***** ********* of ******** ******* **** ** *** *** ** *** ***** of ***, ****'* * ***** ***** **** ** ***. ******* with ****** ********* **** ****** ** ******* ************ *** ********** used ** ***** ***** ** ************ *** ***'* ******* ******* much *********** ****** *** ****** ********* *****, ********* *'* *** sure *** ****'* ******* ** *** ************ ***'** ********* **.

******** ***** **** ****** ** **** **** ****, ** *** all, ** *** ****** ** *** ***** ********* *****.

**** *** **! **** ***** *****! ***** ***** ** * whole ***** *****.

** ****** ** ** ** ** **** **** ******* ****** going ** ****.

* **** ******* ****** *** ******* ***** ******** ***** **** of **** *** *'* ******** **** *******, ** *** ***** wisdom, **** **** ******, ******* *** ******* ** *** ***** grunts *** *** ** * ******* ******, ******* ***** ****** most ** *** ****, **** ** ***** ** ******* *** issues ********** ** *** *********.

***** *** ********** **** **** *** *** **** ******.

... **** *******, ** *** ***** ******, **** **** ******, figures *** ******* ** *** ***** ******...

****** ***** ** * *** ***** *** ******* *** *** nice ****** ** ******* ** **** ***********, **?

* ****'* **** ** ** * *** ***, **** **** regards ** *** *** **** ******* ** ******** ***** **** with *** ***** ******** **************. ** ***** ** ***** **** more *********** **** ** ** ****'* **** ** ***** ***** hours * *** ** **********.

** *******. :)

** ** "...******* *** ******* ** *** ***** ******** ****-********* professionals ** ******* *********..."

*'* **** ***** ****** ** *'* ******** **** **** *********... ;)

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Most Recent Industry Reports

Everbridge Mass Notification Service Examined on Mar 24, 2017
Everbridge is expanding in the security space. In January 2017 Everbridge acquired PSIM platform IDV, and have also begun integrating with other...
Hikvision Removing Auto 'Phone Home' on Mar 24, 2017
Facing pressure over their cameras auto phoning home and their Chinese government ownership, Hikvision has begun quietly removing automatic...
Axis Camera Vulnerabilities From Google Researcher Analyzed on Mar 23, 2017
A Google security researcher has reported 6 vulnerabilities for Axis cameras, affecting multiple models and firmware versions. In this report, we...
OpenEye Takes Aim At Exacq on Mar 23, 2017
First Milestone targeted Exacq with a takeover offer, and now OpenEye is gunning for them with an offer to swap out Exacq for their cloud-managed...
Lock Keyways For Access Control Guide on Mar 23, 2017
Lock keyways can be the difference between a lock working or not. Understanding keyways is important for access control. Indeed, a member recently...
Broken Browser Support for Video Surveillance on Mar 22, 2017
Modern web browsers have left the security industry behind. Current Chrome, Firefox, and Microsoft Edge browsers do not support NPAPI plugins,...
ADI Favorability Results on Mar 22, 2017
150 North American integrators provided feedback on 6 distributors, and why they do (or do not do) business with ADI. ADI is clearly a big name in...
1 Million Dahua Devices Exposed To Backdoor on Mar 22, 2017
Statistics show that 1 million Dahua devices are publicly exposed and vulnerable to the Dahua backdoor. Despite this, Dahua has downplayed the...
Hikvision Hires Crisis Communication Writer on Mar 21, 2017
Hikvision has hired a crisis communication writer as the company ramps up its efforts to deal with the 'crisis' it feels it is facing. 'Crisis...
Glass Break Sensor Tutorial on Mar 21, 2017
Burglars often break glass windows to get into a house. Using glass break detectors in conjunction with alarm contacts is a good way to protect the...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact