Within days of the July 7 bombings in London that killed 56 people, images of the perpetrators flew around the world. Within days of the July 7 bombings in London that killed 56 people, images of the perpetrators flew around the world. The four men identified by forensic evidence as having carried bomb-laden backpacks were captured on closed-circuit television at King’s Cross station shortly before 8:30 on the morning of the attacks. They had traveled to London ona train from Luton, where CCTV footage of them was also quickly located. This was the image the world saw.Britons believe no other capital city is as intensively photographed as London. The average Londoner can expect to becaught on surveillance video hundreds of times daily. After the bombings, investigators reviewed well over 6,000 CCTV tapes. Britons also have grown accustomed to seeing CCTV footage of suspectsand victimsin high-profile crimes.From child abductions to murder, CCTV, in the public’s eyes, has become the police’s first port of call and a high-tech crime-fighting tool. The reality is more prosaic. Police receive no special training in analyzing CCTV footage, says Brian Adamson, a technicalsupport officer with the Haringey Borough police, part of London’s Metropolitan Police. Officers learn on the job. Although the force has a good knowledge of the locations and capabilities of the CCTV cameras at major public transit points, and are well-practiced at downloading digital imagery, the process relies on the cooperation of the transit authorities andorganizations that own the cameras involved, Adamson says.Privately owned CCTV cameras pose another challenge. A central database of these cameras is based solely on police onthe beat spotting new cameras and updating the force’s records, Adamson says. When a crime takes place, he adds, officers have to walk the route involved, identifying cameras and hoping to gather evidence.British police encourage shopkeepers and other CCTV camera owners to change their tapes and make sure that the cameras work. “Time and again, there are instances of police officers needing images, only to find out that there wasn’t a recording or that the images were unusable,” says former detective Simon Janes, a 22-year Scotland Yard veteran who is international operations director for computer forensics company Ibas Holding. It turned out the CCTV camera on the bus that exploded in Tavistock Square on July 7 wasn’t operable, delaying identification of the bomber responsible.Police issued more CCTV images after a second group of men attempted and failed to set off four bombs in the London transportsystem on July 21. By July’s end, authorities in London and Rome had arrested all four suspects plus others believedto have helped them. The authorities have sought to reassure the public that no effort would be spared to prevent further atrocities. For that to happen, however, London needs to move from after-the-event analysis to before-the-event anticipation, says Neil Fisher,director of security solutions at British defense contractor QinetiQ. The technology exists. Real-time video analysis is in use at New Jersey Transit’s Secaucus Junction station (see “The Secaucus Model,”). Is it in London’s future?Malcolm Wheatley Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe