Using Video Surveillance to Fight Terrorism

Author: John Honovich, Published on Dec 03, 2008

The Mumbai attacks raise questions about security enhancements. What can CCTV or video surveillance do to address terrorist attacks such as Mumbai?  While the immediate reaction is always to spend money on new security systems, what is the best way to invest in security?

Here are the central claims this report examines:

  • Video surveillance can be a key tool in allowing responders to intercept and stop terrorist attacks
  • Video surveillance was not optimally used in Mumbai (from what I have read in the New York Times)
  • Video surveillance (specifically video analytics) will generally be a poor tool at detecting terrorist events because of the nature of terrorist events such as in Mumbai

Overview

Video surveillance should be viewed as one element in an overall security plan.  At a higher level, there are a number of key factors for ensuring security:

  • Political/Cultural Tension: The more hatred and tension, the more motivated people are to commit terrorist attacks
  • Public Policy/Police: The more powerful the police and the more controlling the laws are, the less likely terrorists will be successful in attacks or choose to attack (deterence)
  • Barriers/Access Control: The more walls and more checkpoints used, the more difficult it is for terrorists to successfully execute.
  • Detection: The more people and systems (burglar alarms, video analytics, etc) used, the more likely and sooner terrorists will be detected and stopped.
  • Response: Better responders and richer information (like real time video surveillance) improves the probability of terrorists being stopped quickly and without losses.

Of these five, only the last two factors can be impacted by video surveillance. 

The first two factors (culture and policy) are probably the most important long term factors.  These are obviously outside what an individual security manager can do.

The third factor (barriers/access control) are critical and can be impacted by individual organizations and security managers.  Indeed, a huge part of the problem in Mumbai was the incredible lack of barriers and access control (contrast this to the Marriott in Pakinstan - where barricades prevented the bombing from having far more deadly of an impact).  If you don't stop people or check people as they move throughout a facility, terrorist attacks will cause severe losses - there is basically no way around this.

Video Surveillance to Detect

You can use video surveillance to help detect terrorist activities by (1) having people watch the video in real time or (2) by having computers analyze the video for you and sending alerts (i.e., video analytics).

Watching the video in real time is not feasible for any large facility. Unless you want to employ dozens of people to watch monitors - and the economics probably does not support this.

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

You can use video analytics and this will eliminate the problem of having people to watch.  However, video analytics (for security) are only feasible today in areas where no person should be standing or moving.  If you have other people moving, you are likely to have numerous nuisance alerts (e.g., abandoned object detection sounds good in theory but is generally infeasible to use in production) This is why video analytics are almost always used in conjunction with barriers (like fences) or during times when an area is vacant (like an industrial facility after business hours).

Production video analytics are not sophisticated enough to determine who the terrorist is out of a group of people.  Unfortunately, the problem is Mumbai is that, because of the lack of barriers and access control, terrorists can walk right up to victims without any checks or constraints.

While video analytics can solve security problems (such as theft or intrusions), they do not address the core problems in terrorists attacks like that in Mumbai.

Video Surveillance for Response

One of the shocking problems in Mumbai was how long it took to end the attacks and how uninformed it appeared the responders were to the location and activities of the terrorists.

Video surveillance can play a crucial role to help responders quickly and precisely identify terrorists and to marshal responders to the right location and actions. Cameras can be widely distributed and accessed remotely, providing an excellent tool to see where terrorists are and where they are moving. This information can help quickly end attacks.

Unfortunately, in Mumbai, it appears that responders did not have access to those cameras during the fight with the terrorists. The NYTimes claims that the terrorists had much more information on the Taj Hotel and that responders had difficulties determining where to go inside the Hotel.

Access to Surveillance Video

If this is true, this problem must be addressed immediately.  It is a very solvable problem to share video and it does not require massive investments nor science fiction technology.

There is a key challenge - no standards between video management systems (and even with IP camera standards in development, this will not resolve the problem with video management systems). These can be overcome, at least temporarily, by using PSIM systems to facilitate cross vendor video surveillance integration.

 

Thoughts? Disagree?

Related Reports

Deep Learning Surveillance Startups Deep Problem on Jun 23, 2017
The undeniably good news for the video surveillance market is that we are seeing the rise of more startups than in many years. The cause of this...
Avigilon Announces RADAR-Based Presence Detector on Jun 22, 2017
RADAR is gaining momentum within physical security. Two months after Axis announced a network radar detector, Avigilon has announced a RADAR-Based...
Access Control Course Winter 2018 on Jun 11, 2017
The Winter 2018 IPVM Access Control Course is now open; save $50 on early registration. IPVM offers the most comprehensive access control course...
RMR Integrator Importance Statistics on Jun 08, 2017
How do integrators feel about offering RMR / recurring revenue services? For many, their business revolves around RMR, while others see no...
HID Edge EVO Tested on Jun 07, 2017
HID Edge controllers have been one of most common offerings in IP door controllers for years. The new generation is called Edge EVO. We tested...
Access Control AHJ Nightmares on Jun 01, 2017
For access control jobs, a single person can be the difference between finishing a job, costing thousands in extra dollars, and being profitable...
US States Security Licensing Guide on May 30, 2017
In the US, many states require integrators to be licensed to install burglar alarms, CCTV, electronic access control, or all three, and...
Anti-Hack Access Card Shields Tested on May 26, 2017
Keeping your access control card information secure is becoming a big priority, especially since cheaper copiers can hack details easily. Multiple...
Hackable 125kHz Access Control Migration Guide on May 19, 2017
Despite being one of the most popular credentials, 125 kHz credentials are easily copied and insecure as we showed in our test results, video...
Technician Personal Protective Equipment (PPE) Guide on May 12, 2017
Technicians encounter multiple hazards when running wires and installing security devices. Wearing personal protective equipment, or PPE, helps...

Most Recent Industry Reports

Importance of Sales To Integrators - Statistics on Jun 23, 2017
One of the top trends in the industry over the past few years has been the rise of across-the-board sales (e.g.: Hikvision Sales, Dahua Sale,...
Deep Learning Surveillance Startups Deep Problem on Jun 23, 2017
The undeniably good news for the video surveillance market is that we are seeing the rise of more startups than in many years. The cause of this...
Avigilon Announces RADAR-Based Presence Detector on Jun 22, 2017
RADAR is gaining momentum within physical security. Two months after Axis announced a network radar detector, Avigilon has announced a RADAR-Based...
Covert Cloud Camera Service Launching (KJB) on Jun 22, 2017
Cloud IP cameras, for consumers, has become increasingly commonplace. However, covert cameras, lag there, with few options. Now, North America's...
Manufacturers Shipping Unlicensed H.265 Products on Jun 22, 2017
While H.265 support in video surveillance is growing, IPVM's research shows that most surveillance manufacturers are shipping H.265 products with...
Uniview Low-Cost Bullet PTZ Tested on Jun 21, 2017
Uniview is offering a HD zoom bullet camera, the IPC742SR9-PZ30-32G, with an integrated pan / tilt positioner, for the price of a low-cost...
QSR Video Surveillance Best Practices on Jun 21, 2017
Fast food restaurants or QSRs (quick service restaurants), are frequent victims of crime and fraud. Because they are open late, deal with cash, and...
45 Drives 'Lowest Cost' Enterprise Storage Company Profile on Jun 21, 2017
45 Drives claims the "lowest cost per Hard Drive Slot in the industry." But who or what is '45 Drives'? What started as a product design to...
No Hack, Still Liable, Court Finds ADT on Jun 20, 2017
Recently, ADT has been in the news for a $16 million settlement for a cyber security vulnerability class action suit. One of the most important...
Resolver / PPM 2000 Incident Management Platform Profile on Jun 20, 2017
You might have seen the company whose employees wear hockey jerseys at trade shows and wondered "what do they do?" PPM 2000 has been active in...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact