Using Video Surveillance to Fight Terrorism

Author: John Honovich, Published on Dec 03, 2008

The Mumbai attacks raise questions about security enhancements. What can CCTV or video surveillance do to address terrorist attacks such as Mumbai?  While the immediate reaction is always to spend money on new security systems, what is the best way to invest in security?

Here are the central claims this report examines:

  • Video surveillance can be a key tool in allowing responders to intercept and stop terrorist attacks
  • Video surveillance was not optimally used in Mumbai (from what I have read in the New York Times)
  • Video surveillance (specifically video analytics) will generally be a poor tool at detecting terrorist events because of the nature of terrorist events such as in Mumbai

Overview

Video surveillance should be viewed as one element in an overall security plan.  At a higher level, there are a number of key factors for ensuring security:

  • Political/Cultural Tension: The more hatred and tension, the more motivated people are to commit terrorist attacks
  • Public Policy/Police: The more powerful the police and the more controlling the laws are, the less likely terrorists will be successful in attacks or choose to attack (deterence)
  • Barriers/Access Control: The more walls and more checkpoints used, the more difficult it is for terrorists to successfully execute.
  • Detection: The more people and systems (burglar alarms, video analytics, etc) used, the more likely and sooner terrorists will be detected and stopped.
  • Response: Better responders and richer information (like real time video surveillance) improves the probability of terrorists being stopped quickly and without losses.

Of these five, only the last two factors can be impacted by video surveillance. 

The first two factors (culture and policy) are probably the most important long term factors.  These are obviously outside what an individual security manager can do.

The third factor (barriers/access control) are critical and can be impacted by individual organizations and security managers.  Indeed, a huge part of the problem in Mumbai was the incredible lack of barriers and access control (contrast this to the Marriott in Pakinstan - where barricades prevented the bombing from having far more deadly of an impact).  If you don't stop people or check people as they move throughout a facility, terrorist attacks will cause severe losses - there is basically no way around this.

Video Surveillance to Detect

You can use video surveillance to help detect terrorist activities by (1) having people watch the video in real time or (2) by having computers analyze the video for you and sending alerts (i.e., video analytics).

Watching the video in real time is not feasible for any large facility. Unless you want to employ dozens of people to watch monitors - and the economics probably does not support this.

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

You can use video analytics and this will eliminate the problem of having people to watch.  However, video analytics (for security) are only feasible today in areas where no person should be standing or moving.  If you have other people moving, you are likely to have numerous nuisance alerts (e.g., abandoned object detection sounds good in theory but is generally infeasible to use in production) This is why video analytics are almost always used in conjunction with barriers (like fences) or during times when an area is vacant (like an industrial facility after business hours).

Production video analytics are not sophisticated enough to determine who the terrorist is out of a group of people.  Unfortunately, the problem is Mumbai is that, because of the lack of barriers and access control, terrorists can walk right up to victims without any checks or constraints.

While video analytics can solve security problems (such as theft or intrusions), they do not address the core problems in terrorists attacks like that in Mumbai.

Video Surveillance for Response

One of the shocking problems in Mumbai was how long it took to end the attacks and how uninformed it appeared the responders were to the location and activities of the terrorists.

Video surveillance can play a crucial role to help responders quickly and precisely identify terrorists and to marshal responders to the right location and actions. Cameras can be widely distributed and accessed remotely, providing an excellent tool to see where terrorists are and where they are moving. This information can help quickly end attacks.

Unfortunately, in Mumbai, it appears that responders did not have access to those cameras during the fight with the terrorists. The NYTimes claims that the terrorists had much more information on the Taj Hotel and that responders had difficulties determining where to go inside the Hotel.

Access to Surveillance Video

If this is true, this problem must be addressed immediately.  It is a very solvable problem to share video and it does not require massive investments nor science fiction technology.

There is a key challenge - no standards between video management systems (and even with IP camera standards in development, this will not resolve the problem with video management systems). These can be overcome, at least temporarily, by using PSIM systems to facilitate cross vendor video surveillance integration.

 

Thoughts? Disagree?

Related Reports

Access Controller Software Guide on Dec 11, 2017
Properly configuring access controllers software is key to a professional access system. These devices have fundamental settings that must be...
2018 Video Surveillance Cameras Overview on Dec 11, 2017
This report concisely explains the developments for surveillance cameras offered in 2017 and the state of offerings going into 2018, including...
Access Control Course Winter 2018 on Dec 07, 2017
Learn more below about the Winter 2018 IPVM Access Control Course. Register here. IPVM offers the most comprehensive access control course in...
ZKAccess Control Tested on Dec 04, 2017
China manufacturer ZKTeco / ZKAcces has been expanding in the West, offering a low-cost access control platform. But how good is it? And how does...
Hazardous & Explosion Proof Access Control Tutorial on Nov 27, 2017
Controlling access to hazardous environments require equipment meeting specific ratings that certify they will not start fires. Understanding those...
Top Maglock Provider Warns Against Using Maglocks on Nov 21, 2017
Do not buy my company's product. It sounds strange indeed, but a senior Allegion consultant stated that maglocks should not be used in common...
Isonas Cofounders Split, Launch Partner/Competitor on Nov 16, 2017
Breaking up is hard to do, especially when door access security is at stake. But that is exactly what has happened at Isonas. Senior employees...
Mobile Credentials (BLE / NFC / Apps) Guide on Nov 14, 2017
One of the biggest trends in access for the last few years has been the marriage of mobile phones and access cards. In this guide,...
Long Range Access Control Readers Tutorial on Nov 10, 2017
One of the classic challenges for access control are parking lots and garages, where the user's credential is far from the reader. With modern...
Selecting Access Control Readers Tutorial on Nov 09, 2017
Given the variety of types available, specifying access control readers can be a daunting process. However, focusing on a few key elements will...

Most Recent Industry Reports

Startup Flock Declares Itself "The New Standard For Neighborhood Security" on Dec 15, 2017
Mega startup generator YCombinator has backed a startup targeting neighborhood video surveillance and security. Flock Safety is taking a...
Directory of VSaaS / Cloud Video Surveillance Providers on Dec 15, 2017
This directory provides a list of VSaaS / cloud video surveillance providers to help you see and research what options are available. 2018 State...
Integrator Managing Projects Statistics on Dec 14, 2017
Who actually manages projects for security integrators? Does the average security integrator have dedicated project managers, or are technicians,...
Hikvision NVR Load Testing on Dec 14, 2017
IPVM members recently debated Hikvision NVR's performance under load in Hikvision 30+ Cameras On NVR - Apps And Client Really Slow Down And CPU...
This Manufacturer Shuns IP Cameras on Dec 14, 2017
One manufacturer has chosen a bold strategy in avoiding getting caught up in the race to the bottom: shun IP solutions. We spoke with an executive...
Testing DMP XTLPlus / Virtual Keypad Vs Alarm.com & Honeywell on Dec 13, 2017
DMP has a strong presence in commercial intrusion alarms, but not in residential. However, the company's XTLPLus wireless combo panel and Virtual...
BBC Features Dahua on Dec 13, 2017
Hikvision is not the only mega-Chinese video surveillance manufacturer getting global attention. Last month, the WSJ investigated Hikvision and now...
Hiring Camera Calculator Product Manager on Dec 12, 2017
We are working on making the Camera Calculator even better and hoping you can help us find the right person to join our team. IPVM is hiring a...
Testing $20 WyzeCam, The Money Losing Amazon Vet Startup on Dec 12, 2017
This startup is perfecting the old adage: We lose money on every sale, but make it up on volume But it is no joke. The company, Wyze Labs, is...
Xiongmai New Critical Vulnerability - Same Manufacturer Whose Products Drove Mirai Botnet Attacks on Dec 12, 2017
The Chinese manufacturer whose products were primarily responsible for the 2016 Mirai botnet attack has a new critical vulnerability, confirmed by...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact