Using Video Surveillance to Fight Terrorism

Author: John Honovich, Published on Dec 03, 2008

The Mumbai attacks raise questions about security enhancements. What can CCTV or video surveillance do to address terrorist attacks such as Mumbai? While the immediate reaction is always to spend money on new security systems, what is the best way to invest in security?

Here are the central claims this report examines:

  • Video surveillance can be a key tool in allowing responders to intercept and stop terrorist attacks
  • Video surveillance was not optimally used in Mumbai (from what I have read in the New York Times)
  • Video surveillance (specifically video analytics) will generally be a poor tool at detecting terrorist events because of the nature of terrorist events such as in Mumbai

Overview

Video surveillance should be viewed as one element in an overall security plan. At a higher level, there are a number of key factors for ensuring security:

  • Political/Cultural Tension: The more hatred and tension, the more motivated people are to commit terrorist attacks
  • Public Policy/Police: The more powerful the police and the more controlling the laws are, the less likely terrorists will be successful in attacks or choose to attack (deterence)
  • Barriers/Access Control: The more walls and more checkpoints used, the more difficult it is for terrorists to successfully execute.
  • Detection: The more people and systems (burglar alarms, video analytics, etc) used, the more likely and sooner terrorists will be detected and stopped.
  • Response: Better responders and richer information (like real time video surveillance) improves the probability of terrorists being stopped quickly and without losses.

Of these five, only the last two factors can be impacted by video surveillance.

The first two factors (culture and policy) are probably the most important long term factors. These are obviously outside what an individual security manager can do.

The third factor (barriers/access control) are critical and can be impacted by individual organizations and security managers. Indeed, a huge part of the problem in Mumbai was the incredible lack of barriers and access control (contrast this to the Marriott in Pakinstan - where barricades prevented the bombing from having far more deadly of an impact). If you don't stop people or check people as they move throughout a facility, terrorist attacks will cause severe losses - there is basically no way around this.

Video Surveillance to Detect

You can use video surveillance to help detect terrorist activities by (1) having people watch the video in real time or (2) by having computers analyze the video for you and sending alerts (i.e., video analytics).

Watching the video in real time is not feasible for any large facility. Unless you want to employ dozens of people to watch monitors - and the economics probably does not support this.

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

You can use video analytics and this will eliminate the problem of having people to watch. However, video analytics (for security) are only feasible today in areas where no person should be standing or moving. If you have other people moving, you are likely to have numerous nuisance alerts (e.g., abandoned object detection sounds good in theory but is generally infeasible to use in production) This is why video analytics are almost always used in conjunction with barriers (like fences) or during times when an area is vacant (like an industrial facility after business hours).

Production video analytics are not sophisticated enough to determine who the terrorist is out of a group of people. Unfortunately, the problem is Mumbai is that, because of the lack of barriers and access control, terrorists can walk right up to victims without any checks or constraints.

While video analytics can solve security problems (such as theft or intrusions), they do not address the core problems in terrorists attacks like that in Mumbai.

Video Surveillance for Response

One of the shocking problems in Mumbai was how long it took to end the attacks and how uninformed it appeared the responders were to the location and activities of the terrorists.

Video surveillance can play a crucial role to help responders quickly and precisely identify terrorists and to marshal responders to the right location and actions. Cameras can be widely distributed and accessed remotely, providing an excellent tool to see where terrorists are and where they are moving. This information can help quickly end attacks.

Unfortunately, in Mumbai, it appears that responders did not have access to those cameras during the fight with the terrorists. The NYTimes claims that the terrorists had much more information on the Taj Hotel and that responders had difficulties determining where to go inside the Hotel.

Access to Surveillance Video

If this is true, this problem must be addressed immediately. It is a very solvable problem to share video and it does not require massive investments nor science fiction technology.

There is a key challenge - no standards between video management systems (and even with IP camera standards in development, this will not resolve the problem with video management systems). These can be overcome, at least temporarily, by using PSIM systems to facilitate cross vendor video surveillance integration.

Thoughts? Disagree?

Related Reports

Paxton Drops US Reps, Plans Major Expansion on Dec 07, 2016
Paxton is gearing up to make a big run at  US access control success. The first step they have made is to cut all US Rep Firms, in anticipation of...
Axis Partner Elder Care Video Analytics (Smartervision) on Dec 07, 2016
Can video analytics be used to improve the care of the elderly? Axis and a video analytics startup, Smartervision, are working together to do so....
Door Operators Access Control Tutorial on Dec 05, 2016
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Free Online NFPA, IBC, and ADA Codes and Standards on Nov 29, 2016
Finding applicable codes for security work can be a costly task, with printed books and pdf downloads costing hundreds or thousands. However, a...
Top Surprises in the Video Surveillance Industry 2016 on Nov 29, 2016
  The top 3 surprises of 2016 for integrators surveyed by IPVM were: The race to bottom, repeating 2015's Top Surprise Result New -...
Hikvision's ImageNet Win Analyzed on Nov 28, 2016
Hikvision is pushing hard to move up market and win at video analytics. One notable sign is Hikvision touting their #1 ranking for an ImageNet...
Solutions to 5 Common Access Control Problems on Nov 21, 2016
Effective security is more than just good equipment. In fact, thousands of dollars in electronic access control can be wasted if they are not used...
Axis: HD Analog Will Die Out on Nov 18, 2016
If you are a fan of HD analog, stock up now. Axis says the popular low-cost architecture is going to reverse course and die out in the next couple...
Massively Strong Maglock (Securitron) on Nov 16, 2016
One of the market's strongest maglocks has a twist: the 4,000 pounds claimed bond power is not purely magnetic. Securitron's hybrid MM15 maglock...
Access Control Markups 2016 on Nov 09, 2016
  Access control markups have remained solid, according to new IPVM integrator survey results. Response Breakdowns We asked...

Most Recent Industry Reports

The Russian SMP Security Robot on Dec 08, 2016
A Russian manufacturer, SMP, has a commercially available outdoor security robot, at a lower price and with much less marketing than their main...
How Hikvision Beats Its OEMs on Dec 08, 2016
Hikvision GM declared that they are not aggressive with their competitors. But some of their own OEM partners disagree. Inside, we reveal a key...
Dahua Discontinuing H.264 Only Products on Dec 08, 2016
Dahua has taken a stand for H.265 and is discontinuing its H.264 only products. We examine the shakeup inside this...
Last Day Save $50 IP Networking Course January 2017 on Dec 08, 2016
Today is the last day to save $50 on next month's IP networking course. This is the only networking course designed specifically for video...
Hikvision vs Dahua Mobile Apps Tested on Dec 07, 2016
With smartphone use and low-cost video recorders surging, many user's main interface to their surveillance system is their phone. With mobile video...
Paxton Drops US Reps, Plans Major Expansion on Dec 07, 2016
Paxton is gearing up to make a big run at  US access control success. The first step they have made is to cut all US Rep Firms, in anticipation of...
Axis Partner Elder Care Video Analytics (Smartervision) on Dec 07, 2016
Can video analytics be used to improve the care of the elderly? Axis and a video analytics startup, Smartervision, are working together to do so....
Sony IP Camera Backdoor Uncovered on Dec 06, 2016
A backdoor has been uncovered in ~80 Sony IP camera models, attackers can remotely enable telnet on the camera, and then potentially login as root,...
Power Drill Selection Guide on Dec 06, 2016
Boring holes is a basic part of running cables for most security system projects. To do so, you will need to choose the right drills for various...
Milestone Favorability Results on Dec 06, 2016
In our second installment of manufacturer favorability results (first was Pelco), we turn to Milestone. 100+ integrators rated and explained what...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact