Tips straight from the CSO STEP 1: Determine your cameras’ raison d’être.From this you’ll be able to decide just about everything else. In my organization, we concluded that surveillance was primarily for forensic use, which meant it had to:Let us rapidly review detailed footage so that after incidents (accident, crime, terrorism, overcrowding and so on), we could back everyone up from the event to the edge of ourproperty to see who they talked to, what car they drove, where they parked, what bus or taxi they gotout of, what condition the facility was in at the time (icy sidewalk, wet floor, tools in the area and soon).Be on demand, because we can’t watch the cameras all the time. We wanted tobe able to call up the camera with the best coverage to monitor situations if and when we were calledby someone with an incident report.Allow for targeted “smart” cameras for high-risk areas. We wanted the camerasto be able to alarm us when something began to happen.STEP 2: Take an inventory.If you have cameras already, survey what departments own them, what they are for, how they are monitored and what format they use, then decide if any of these cameras can be folded into your newsystem. STEP 3: Get smart on camera technologies.Determine the effect of new technologies on operations, training, maintenance and staffing. Determinehow clear you need the picture to be (as opposed to how clear you want it to be). This will have animpact on costs. Here are some of your choices:Frame rate. The more frames per second (fps) you choose, the morenetwork capacity each camera will require and the more data storage you’ll need. A Fortune 50company I contacted is using 3 fps to watch cash registers. Its studies showed that no human can trickthe camera in a third of a second. We are using 10 fps because our analytics software requires aminimum of 7 fps and we can use only multiples of five. Note here that if you are expecting to catch abaseball in flight you’ll want a high frame rate, possibly 30 fps or full motion video, but that’s going tobe more expensive to operate.Resolution. Similar to frame rate, but this is not a motion issue; rather, it’s aclarity issue. The clearer your picture, the more pixels it will have, the larger the file will be and themore bandwidth it will consume. We determined that Quarter CIF (Common Intermediate Format,352×288, which is the default frame rate for DVR systems and is one-quarter as clear as your TV athome) is perfectly OK to provide an image to the police that they can use to find and apprehend asuspect. If you expect to get mug shot quality out of your video surveillance program then you’ll wantfull CIF (TV quality), but you’ll pay for it in terms of bandwidth and storage.Compression. There are several standard commercial compression algorithms,but the most common, for all the right reasons, is MPEG-4. We went with that because it is economicaland has all the clarity and ease of use we need. You can add a commercial compression package toyour MPEG-4 to further reduce your storage needs.Storage duration. Thirty days of storage is the unofficial national standard.This gives most of us enough time, without overdoing it, to learn of an incident before the data is lost.When you get an event of interest, you should plan on dropping that file onto a DVD and storing itindefinitelyor at least until all criminal and civil proceedings are concluded, including appeals.You can also send events of interest to a separate server for indefinite storage.Storage size. I did the math: A single digital camera running 24 hours at just 5fps, using MPEG-4 at Quarter CIF resolution, creates 11GB of information. That’s 330 gigs per monthfor just one camera! A 500-camera system, not at all uncommon for corporate buildings and campuses,will generate 165 terabytes every month. So it’s easy to see why keeping pedestrian images beyond 30days is economically foolhardy. And remember, this is with cameras running on spare frame rates andresolutions. Full motion video (30 fps) will create 990 terabytes, almost a petabyte, of data. If you alsogo to full CIF, multiply that by four, and you’re talking a few petabytes a month! Stay on top of thecontractors and consultants so that they stick to the original engineering discussions, or they couldeasily overdo your system. Mission creep can be expensive. And remember, it’s not just storage butalso bandwidth you have to consider. How are you going to move 5,500GB of digital video through yournetwork every month?Digital vs. analog. At some point you’ll want to convert your images to digitalto take advantage of its easier storage and better retrieve and search capabilities. But analog imagescan travel farther from the camera, so cable runs will impact your choices. A consultant can advise youon the best route to go.Pan Tilt Zoom (PTZ). There are two ways to do this. The old-fashioned way,which still works really well, is to physically move the camera and change its focus whenever you wantto get a close-up. Dome cameras have a dark bubble over the camera to mask where it is pointed atany given time. Make sure each PTZ has a default “park” position that gives you an optimal view andfocal length. It is easy to forget to do this and leave a PTZ where it was last focused; this will likely notgive you the best coverage when nothing special is happening. The other (more costly) way to do PTZ isdigitally, within the image itself. This will require megapixel images. Zooming in on, say, a licenseplate, will fuzz out the image illegibly if you don’t start with sufficient pixel density in your cameraplatform.Step 4: Wrestle a few more issues to the ground.Monitoring. This is a contentious issue. The public may expect thatcameras are monitored all the time, but it’s neither practical nor possible. The best you can do is putyour high-priority camera images up in your command center for occasional viewing. Even better:Use analytics software to pinpoint an event of interest and call it up with an audible alarm.Decoys. It may be tempting to use dummy camera domes to suggest you havesurveillance, this will give your public a false sense of security. Most competent programs avoid theiruse, except in specific circumstances and then only in concert with live cameras.Staffing. It’s unrealistic to expect to be given additional staff to monitor a newsuite of cameras, and it’s equally unrealistic to expect to get different people than the ones you havenow. For these reasons, you will want to choose a system that has a simple GUI (graphical userinterface), provides out-of-service alarms for cameras and encoders, is low-maintenance and has highmean times between failures.Privacy. Make absolutely certain you supervise the troops who access camerasand images. If you don’t, inevitably, your cameras will be diverted to personal, voyeuristic use, whichcan have serious, negative impacts on your company image once the antics are publicizedandthey will be.Signage. Get advice from your legal counsel regarding signs to announce videosurveillance on your property.Policies and procedures. If your cameras can view geography off your property,consult with your software provider to mask out these areas. This is especially important if you haveline of sight to residential properties. Supervision and the application of swift discipline are veryimportant to avoid inappropriate use.Training. The more complex your system, the more training the staff will need.This takes good time management because unless you have a full shift to go on training rotation, youwill be doing training on overtime.Maintenance. Include in your maintenance contract a service-level agreementthat guarantees your high-priority cameras are fixed promptly. Be sure it requires an adequate stock ofonsite replacement cameras and network encoders and other peripheral devices so that the mostimportant cameras can be restored to service quickly. Your system should open a trouble ticketimmediately upon device failure, and you will want to review the system’s performance monthly toensure you are up to speed on how reliable it is and which parts are giving you the most trouble.li>This article was written by a CSO who requested anonymity to present this level of detail. em> Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe