Using Video Surveillance to Fight Terrorism

Author: John Honovich, Published on Dec 03, 2008

The Mumbai attacks raise questions about security enhancements. What can CCTV or video surveillance do to address terrorist attacks such as Mumbai?  While the immediate reaction is always to spend money on new security systems, what is the best way to invest in security?

Here are the central claims this report examines:

  • Video surveillance can be a key tool in allowing responders to intercept and stop terrorist attacks
  • Video surveillance was not optimally used in Mumbai (from what I have read in the New York Times)
  • Video surveillance (specifically video analytics) will generally be a poor tool at detecting terrorist events because of the nature of terrorist events such as in Mumbai

Overview

Video surveillance should be viewed as one element in an overall security plan.  At a higher level, there are a number of key factors for ensuring security:

  • Political/Cultural Tension: The more hatred and tension, the more motivated people are to commit terrorist attacks
  • Public Policy/Police: The more powerful the police and the more controlling the laws are, the less likely terrorists will be successful in attacks or choose to attack (deterence)
  • Barriers/Access Control: The more walls and more checkpoints used, the more difficult it is for terrorists to successfully execute.
  • Detection: The more people and systems (burglar alarms, video analytics, etc) used, the more likely and sooner terrorists will be detected and stopped.
  • Response: Better responders and richer information (like real time video surveillance) improves the probability of terrorists being stopped quickly and without losses.

Of these five, only the last two factors can be impacted by video surveillance. 

The first two factors (culture and policy) are probably the most important long term factors.  These are obviously outside what an individual security manager can do.

The third factor (barriers/access control) are critical and can be impacted by individual organizations and security managers.  Indeed, a huge part of the problem in Mumbai was the incredible lack of barriers and access control (contrast this to the Marriott in Pakinstan - where barricades prevented the bombing from having far more deadly of an impact).  If you don't stop people or check people as they move throughout a facility, terrorist attacks will cause severe losses - there is basically no way around this.

Video Surveillance to Detect

You can use video surveillance to help detect terrorist activities by (1) having people watch the video in real time or (2) by having computers analyze the video for you and sending alerts (i.e., video analytics).

Watching the video in real time is not feasible for any large facility. Unless you want to employ dozens of people to watch monitors - and the economics probably does not support this.

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

You can use video analytics and this will eliminate the problem of having people to watch.  However, video analytics (for security) are only feasible today in areas where no person should be standing or moving.  If you have other people moving, you are likely to have numerous nuisance alerts (e.g., abandoned object detection sounds good in theory but is generally infeasible to use in production) This is why video analytics are almost always used in conjunction with barriers (like fences) or during times when an area is vacant (like an industrial facility after business hours).

Production video analytics are not sophisticated enough to determine who the terrorist is out of a group of people.  Unfortunately, the problem is Mumbai is that, because of the lack of barriers and access control, terrorists can walk right up to victims without any checks or constraints.

While video analytics can solve security problems (such as theft or intrusions), they do not address the core problems in terrorists attacks like that in Mumbai.

Video Surveillance for Response

One of the shocking problems in Mumbai was how long it took to end the attacks and how uninformed it appeared the responders were to the location and activities of the terrorists.

Video surveillance can play a crucial role to help responders quickly and precisely identify terrorists and to marshal responders to the right location and actions. Cameras can be widely distributed and accessed remotely, providing an excellent tool to see where terrorists are and where they are moving. This information can help quickly end attacks.

Unfortunately, in Mumbai, it appears that responders did not have access to those cameras during the fight with the terrorists. The NYTimes claims that the terrorists had much more information on the Taj Hotel and that responders had difficulties determining where to go inside the Hotel.

Access to Surveillance Video

If this is true, this problem must be addressed immediately.  It is a very solvable problem to share video and it does not require massive investments nor science fiction technology.

There is a key challenge - no standards between video management systems (and even with IP camera standards in development, this will not resolve the problem with video management systems). These can be overcome, at least temporarily, by using PSIM systems to facilitate cross vendor video surveillance integration.

 

Thoughts? Disagree?

Related Reports

Genetec Launches Cloud Access Control (Synergis SaaS) on Sep 21, 2017
Genetec's cloud everything expansion continues, with their announcement of Synergis SaaS edition, joining their cloud video offering Stratocast,...
Automatic Door Operators For Access Tutorial on Sep 20, 2017
Opening and closing doors might sound simple, but it takes a high-tech piece of door hardware to pull it off. Integrating automatic door operators...
HID Buys Mercury Security on Sep 19, 2017
One of the biggest access control deals in years. Mercury Security, the most widely used access hardware OEM, and partner to 20+ manufacturers,...
Cloud Guy Prints Book, Misses Irony on Sep 15, 2017
On-premise security systems are dead. But $75 print books are alive and well. Such are the lessons from Brivo's CEO new book "The Five...
Master Keying Tutorial on Sep 14, 2017
Mechanical keys are the most fundamental, albeit unsophisticated, form of access control. Like access control, Master Keying allows large scale use...
Startup Turing Video Segway-Based Security Robot Profile on Sep 13, 2017
If security robots can not replace guards, perhaps the next best thing is a robot the guard can actually ride.  Turing Video has raised $5...
Fail Safe vs. Fail Secure Tutorial on Sep 13, 2017
Few terms carry greater importance in access control than 'fail safe' and 'fail secure'. Access control professionals must know how these concepts...
Axis: Use QR Codes Instead of Access Cards on Sep 12, 2017
Innovation in access may be hard to find, but Axis recently suggested an idea for credentials few have considered. Rather than using plastic cards,...
Dahua and Hikvision Entering Access Control on Sep 05, 2017
Until now, Chinese video giants Hikvision and Dahua have held back releasing access internationally. Both companies have now pulled the trigger,...
BBC Featured Deep Learning Face Recognition Analyzed (Digital Barriers) on Aug 30, 2017
The UK's largest broadcaster, BBC, recently featured Digital Barriers (also based in the UK) on a segment highlighting face recognition technology....

Most Recent Industry Reports

Reseting IP Cameras - 30 Manufacturer Directory on Sep 22, 2017
Every camera has a reset button (well, almost) but it is not always clear what these buttons do, how long they need to be held, what settings they...
80+ OEMs Verified Vulnerable To Hikvision Backdoor on Sep 22, 2017
Over 80 Hikvision OEM partners, including ADI, Interlogix, LTS, and Northern Video, have been verified as having products vulnerable to the...
Genetec Launches Cloud Access Control (Synergis SaaS) on Sep 21, 2017
Genetec's cloud everything expansion continues, with their announcement of Synergis SaaS edition, joining their cloud video offering Stratocast,...
Genetec CEO Warns Against Insider Threats on Sep 21, 2017
With Dahua and Hikvision cybersecurity issues becoming indisputable, a new counter has emerged. Just put them behind a firewall, buy cheap...
New IPVM Calculator V3 Released on Sep 20, 2017
The New IPVM Calculator V3 is released. An entirely new architecture delivers the following benefits: Turbo The calculator is now ~50% faster in...
Automatic Door Operators For Access Tutorial on Sep 20, 2017
Opening and closing doors might sound simple, but it takes a high-tech piece of door hardware to pull it off. Integrating automatic door operators...
'Clowns' Allege Ubiquiti 'Completely Fraudulent' on Sep 20, 2017
A short seller has alleged Ubiquiti is 'completely fraudulent'. Ubiquiti's CEO has responded calling them 'clowns'. Here is the short...
Avigilon 'Blue' Cloud Entry Examined on Sep 19, 2017
Avigilon is moving to the cloud. The company announced their Avigilon Blue platform, designed to be a web-managed surveillance system, utilizing...
HID Buys Mercury Security on Sep 19, 2017
One of the biggest access control deals in years. Mercury Security, the most widely used access hardware OEM, and partner to 20+ manufacturers,...
Hikvision Backdoor Exploit on Sep 18, 2017
Full disclosure to the Hikvision backdoor has been released, allowing easy exploit of vulnerable Hikvision IP cameras. As the researcher, Monte...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact