Sei sulla pagina 1di 52

BIIAB Level 2

Award in CCTV Operations


(Public Space Surveillance)
Working as a CCTV Operator Unit

Learner Materials

Edition 2 – May 2011

© BIIAB May 2011 -1-


BIIAB Level 2 Award in CCTV Operations (Public Space Surveillance)

These learner support materials for the Working as a CCTV Operator Unit have been
produced by BIIAB for use by BIIAB approved centres and the learners who attend training
courses at these centres.

The learner support materials for the Working in the Private Security Unit can be found in the
Award for Door Supervisors workbook available from BIIAB.

BIIAB approved centres are automatically licensed to use the learner support materials in
any way that they wish including:

• Printing hard copies of the materials for use by learners


• Copying the electronic files on to CD to be sent to learners or to nominated tutors
• Using any part of the materials as handouts or as the basis for training slides

However, it should be noted that:

• Copyright on these materials remains with BIIAB


• The materials must not, under any circumstances, be circulated to non-BIIAB
approved centres or any other Awarding Body
• The materials must not be reproduced in any way for sale

Any centre found to be in breach of these conditions will have their licence to use the
materials revoked.

© BIIAB May 2011 -2-


Contents

1 Codes of Practice, Operational Procedures and Guidelines ............................... 4


1.1 Code of Practice ...........................................................................................................5
1.2 Operational Procedures...............................................................................................6
1.3 Assignment Instructions ..............................................................................................8
1.4 Codes of Practice, Procedures and Clear Working Relationships with Partners8
1.5 Confidentiality................................................................................................................9
1.6 The Security of the Control Room ...........................................................................10
1.7 Access Control............................................................................................................10
1.8 Standards of Behaviour .............................................................................................11
2 The Law ............................................................................................................ 12
2.1 Human Rights Act 1998.............................................................................................12
2.2 Data Protection Act 1998 ..........................................................................................14
2.3 Freedom of Information Act 2000 ............................................................................16
2.4 Regulation of Investigatory Powers Act 2000 ........................................................16
2.5 Criminal Procedures and Investigation Act 1996 ..................................................18
2.6 Health and Safety at Work ........................................................................................20
3 Roles and Responsibilities of a CCTV Team .................................................... 23
3.1 The Purpose of a CCTV System..............................................................................23
3.2 The Role of a CCTV Operator..................................................................................24
3.3 The Importance of Timely Communication.............................................................25
3.4 Sharing Information with Other Agencies ...............................................................25
3.5 Continuity of Evidence ...............................................................................................26
4 CCTV Equipment and its Operation .................................................................. 30
4.1 CCTV Equipment........................................................................................................30
4.2 Transmission Method.................................................................................................31
4.3 Using Technology.......................................................................................................33
4.4 Interaction with Third Parties ....................................................................................33
5 Using CCTV Equipment Effectively................................................................... 35
5.1 CCTV Incidents...........................................................................................................35
5.2 Typical Crime Hot Spot Locations ...........................................................................37
5.3 Witnessing an Incident...............................................................................................38
5.4 Assisting Other Agencies ..........................................................................................39
5.5 What Makes Someone a Target for Surveillance? ...............................................39
5.6 Close Surveillance and Tracking .............................................................................41
5.7 Improvised Explosive Devices or IEDs ...................................................................41
5.8 Target Selection..........................................................................................................42
5.9 Equality During Observation .....................................................................................43
6 Emergency Procedures..................................................................................... 45
6.1 Failure of Access Control System............................................................................45
6.2 Bomb Threats..............................................................................................................45
6.3 Searching the Area.....................................................................................................47
6.4 Evacuating the Control Room...................................................................................47
6.5 Re-Occupying the Control Room .............................................................................48

© BIIAB May 2011 -3-


1 Codes of Practice, Operational Procedures and
Guidelines
By the end of this session:

The learner will understand CCTV codes of practice, operational procedures and guidelines
and will be able to:
• Identify the purpose of codes of practice, operational procedures and guidelines
• Identify the impact of codes of practice, operational procedures and guidelines on
CCTV operations
• Identify the value of codes of practice, operational procedures and guidelines to
partners, agencies and the public
• Explain the term “confidentiality” as it applies to the role of a CCTV operator
• State why the control room is kept as a secure environment
• Identify the key features of access control systems
• State the requirements for dealing with authorised and unauthorised visitors to the
CCTV control room
• Describe the operator’s responsibilities within the SIA Standards of Behaviour for
CCTV Operators

Introduction

CCTV is a powerful tool in the security arsenal, but it is also easy to abuse such a tool with
improper use of the cameras. In most cases, CCTV Public Space Surveillance (PSS)
cameras are in areas where the general public can be monitored. It is therefore essential
that the public have a trust in the people that operate the cameras. They must believe that:

• The cameras will be used for the purpose that they were intended
• Any images captured will be stored securely and will be kept for only as long as
necessary
• Only authorised persons may have access to those images.

The Information Commissioner’s Office (ICO) is the UK’s independent authority set up to
uphold information rights in the public interest, promoting openness by public bodies and
data privacy for individuals. In line with this, the Information Commissioner’s CCTV Code of
Practice, Operating Procedure Manuals and Assignment Instructions are all documents that
are designed to provide a framework where the CCTV system is operated effectively and
within the law and as such, provide important guidance to the CCTV operator during their
every day operations. These learner materials will look at each one individually, discussing
the content of each and understanding how each document helps the operator to fulfil their
role.

When CCTV was first introduced into our town centres, many were concerned about the
erosion of civil liberties and the way in which recorded information would be used. In
general, the concerns often related to:

© BIIAB May 2011 -4-


• Intrusion into the personal life of citizens
• The recording and storage of information on the activities of citizens, particularly in
residential areas
• Not being aware of when observation was being undertaken
• Who would have access to the information recorded
• The purposes of use to which such information would be put
• How they might learn about the information held about them
• The purpose of the systems.

CCTV systems have been used to tackle crime and make public spaces safer. Because of
this and the legal constraints that have been reflected in the CCTV Codes of Practice and
Procedures, the fears and concerns outlined above have generally been allayed.

It is necessary to have a number of documents and guidelines that cover operational


procedures within the control room to ensure the integrity of the system and the personnel
that run the system. These documents lay down the rules governing the way that the
equipment is used, how to use it, and what happens to the images that are recorded by the
system. The operating documents also set out the scope of the system and contain all the
necessary contacts to ensure that the system runs smoothly on a day-to-day basis. It is the
responsibility of every operator to familiarise themselves with the contents of each of these
documents.

The Code of Practice and procedures are designed to:

• Interpret legal requirements


• Give the public confidence
• Guide and direct CCTV operational staff
• Define the interfaces between stakeholders in the system
• Protect the system owner and operational staff from claims of malpractice.

1.1 Code of Practice

In the security industry a code of practice is usually established by an industry body or


regulator to deal with common problems of the trade, and describes what is commonly
perceived as good practice. It is usually a public document and whilst not legally binding, is
often considered by a court in relation to the manner in which an organisation acts.

Purpose

In the case of the CCTV industry the key code of practice is the CCTV Code of Practice,
which is published by the Information Commissioner, and defines the expectations of the
industry under the Data Protection Act. As a result, failure to abide by the Code of Practice is
likely to mean a breach of the Data Protection Act.

The Code of Practice has two main purposes:

• To assist the operators of CCTV systems to understand their legal obligations


• To reassure the public about the safeguards that should be in place.

Whilst not legally binding, the CCTV Code of Practice may be considered by a court in
relation to the manner in which an organisation acts. It is designed to provide the public with
information as to how the system is managed and some general details about the system

© BIIAB May 2011 -5-


equipment and functions. It provides details of the law in relation to the installation,
management and maintenance of all CCTV systems under the Data Protection Act 1998.

The CCTV Code of Practice will contain a number of points directly taken from the Data
Protection Act and as a consequence, failure to abide by the Code of Practice may mean a
breach of the Data Protection Act 1998. It also provides guidance on good data protection
practice.

The CCTV Code of Practice only gives general information on access control to the control
room, who may view the images and the storing of images including how long images may
be kept, in accordance with the Data Protection Act 1998.

Impact of Codes of Practice

At a strategic level, the impact of the Code of Practice is that it:

• Provides a framework or outline of procedures which provides the public sufficient


information to induce credibility in the use and management of the CCTV system.
The code of practice will show some of the procedures that are necessary and that
are undertaken
• Defines the information that must be publicly available
• Considers issues of accountability
• Considers data protection implications.

Operationally, the CCTV Code of Practice defines requirements for:

• The publication of a purpose statement


• The publication of details of the owner, scope of the scheme and partnership
information
• Residential safeguards
• A defined complaints procedure;
• The control and operation of cameras
• Access to and security of the CCTV control room
• Procedures for recorded media (typically storage, access, length of time that
information is stored)
• Dealing with incidents and interaction with the police
• Procedures for the third party use of the system.

The Data Protection Act and CCTV Code of Practice will be covered in more detail in
Chapter 2.

1.2 Operational Procedures

In the CCTV industry, procedures are available for the completion of documentation and
access to data. Information such as telephone details, call signs and standard shift
objectives are also likely to be included. Procedures manuals tend to be compiled as a
single document and written as a quality assured document. Procedures manuals are private
documents and are generally not available for public scrutiny.

© BIIAB May 2011 -6-


What is in a procedures manual?

As a general rule, procedures manuals:

• Describe how the CCTV control room is to operate


• Define what the CCTV operator must do and any standards to which it should be
done
• Describe the forms and documentation that must be used. Failure to observe these
procedures could result in a breach of the Data Protection Act, or a number of Acts
which consider the rights of the individual or court procedures
• Define how information must be stored or distributed
• Define the process by which information must be controlled and transmitted in order
that it is admissible in a court of law.

Procedures will be defined for a range of activities including:

• Recording or allowing access to recorded images by third party authorities and


agencies
• Dealing with members of the public requesting access to their personal data
recorded by the system
• Controlling and providing an audit trial for any information that will be used in court
proceedings
• Controlling the use of data processing and recording equipment
• Defining who is responsible for giving certain authorities or approvals under the law
and the process by which these approvals are gained
• Reporting of faults
• Recording maintenance activities
• Dealing with emergencies
• Recording the details of people visiting the control room and the process by which
admission is allowed.

Why should procedures be followed?

Procedures should be followed, without variation and without fail at all times because they:

• Ensure that evidence collected is admissible in a Court of Law


• Ensure that legal requirements in relation to privacy and access to information are
observed
• Are designed to give the public confidence that the system or information obtained is
not abused
• Are a requirement of the CCTV operators contract of employment
• Help to protect the CCTV system owner from any claim of malpractice
• Help to protect the CCTV operator from any claim of malpractice.

By observing the procedures, the CCTV operator will be operating in line with agreed good
practice. CCTV PSS monitoring and the production of evidence are subject to a number of
complicated legal requirements and although CCTV operators are not expected to have a
detailed understanding of the laws, abiding by procedures will ensure that they always work
within the law.

Procedures provide a framework within which CCTV operators, play their part in the efficient
operation of the system, and help to protect them from accusations of malpractice being
made by the public or others.

© BIIAB May 2011 -7-


Remember, working to these procedures is a requirement of your contract of employment
and failure so to do could result in disciplinary action.

1.3 Assignment Instructions

Assignment instructions are usually created when services including CCTV control room
operations are contracted to a third party such as a security company. The assignment
instructions describe the operational expectations of the client as agreed with the supplier,
listing tasks that will need to be undertaken and any limitations on the duties of a CCTV
operator. They are site specific and important as they are usually contractually binding. They
are not a public document. Assignment instructions are often in a similar format to the
procedures manual.

Assignment instructions content

The content of assignment instructions will vary but are likely to include:

• Emergency call out and contact numbers


• Emergency procedures
• Maps and plans of the site/area
• Daily tasks
• Reporting procedures
• Booking on and off procedures
• Camera patrol timings
• Alarm codes and procedures
• Health and safety information
• Shift patterns
• Access control requirements
• Radio procedures
• Details of equipment supplied
• Key issue and control procedures
• Vehicle access and parking
• Fire extinguisher locations
• Evacuation routes and assembly point.

1.4 Codes of Practice, Procedures and Clear Working Relationships with


Partners

Many CCTV PSS systems, especially major systems, are run by local authorities. In most of
these cases it is normal for the police force to be a partner in the system.

The partners in a CCTV system are not necessarily restricted to a local authority and the
police. Other partnerships may include:

• Local authorities that have chosen to outsource the monitoring of cameras to another
authority or third party
• Local transport companies
• Shopping centres
• Hospitals
• Educational establishments.

© BIIAB May 2011 -8-


For these partnerships to operate effectively there needs to be a clear understanding
between partners, which are normally defined through contractual arrangements, procedures
and protocols.
These documents will define the following:

• The management of the system


• Reporting and communication paths
• Expectations in relation to information between partners
• Access to information
• Identification or where authority lies for various aspects of operation
• Complaints and reporting procedures
• Linkages to the police. Legislation permits the Police to have access to and take
temporary control of certain cameras.

1.5 Confidentiality

The term confidentiality is very important when taken in the context of CCTV operations.
It is now included in the SIA Standards of Behaviour which bears reference to the Data
Protection Act 1998.

There are essentially 2 levels of confidentiality that must be respected:

1. The integrity of the system

A CCTV operator must protect the integrity of the system. For example, if there are a
number of cameras in the high street that cannot view a risk area such as cash points at a
nearby bank, this information should never be divulged to any person outside the control
room as it could result in robberies.

Confidential information in the wrong hands can lead to:

• A serious breach of the peace


• Increased crime in areas that cameras cannot view
• Criminals testing the effectiveness of the cameras
• Public loss of confidence in the system

2. The data recorded and what is observed by the CCTV operator

CCTV operators have a duty to keep everything that they see and hear in the course of their
duties confidential. For example, if an operator was to observe a known offender committing
an offence, the operator should never discuss this with their friends at the pub in the evening
after work.

The rule is that what you observe does not leave the control room for anything other than
officially sanctioned reasons. There are three main reasons for this:

1. It helps with public perception of CCTV operations

2. There are a number of areas of legalisation that cover the non-disclosure of


information (these are covered in Chapter 2 of these leaner materials)

3. It protects the continuity, integrity and admissibility of evidence.

© BIIAB May 2011 -9-


Be aware that the Data Protection Act determines that all information should be treated as
confidential especially that related to the images viewed on the screens and recorded by the
system.

Failure to observe confidentiality is a breach of the Data Protection Act and may result in an
employer taking disciplinary action.

1.6 The Security of the Control Room

The control room must be regarded as a secure installation at all times. Admittance should
be restricted, and only those who require access for the purpose of performing services
associated with the operation of the CCTV system should be admitted. The location of the
control room should be treated as confidential.

Computers are used on a daily basis within the CCTV control room environment for a
number or different purposes. They may be used for the recording and storage of images or
simply as a networked system for the recording of information such as:

• Booking staff on and off duty


• Incident reports
• Issuing of keys

In addition to the above, computers are being used in place of some or all of the control
room records. Any information that has been obtained by the CCTV operator in the course of
their duty is strictly confidential and should not be disclosed to any unauthorised person.
Any information collected is covered by the Data Protection Act 1998. It is also important to
remember that the images, however recorded, may become the subject of court action and
therefore their security, validity and the ability to show an authentic audit trail will be very
important.

To help ensure that accusations regarding the recordings or accompanying documentation


are not founded, the CCTV control room environment must be kept secure at all times. Entry
by all non-staff personnel is restricted. Third parties such as police are required to produce
signed documentation to authenticate their admittance

1.7 Access Control

Given the importance of maintaining control room security, whatever means of access
control are in place must be correctly used at all times.

Access control restricts operations by ensuring that only those who are valid are able to
carry out certain duties. The key feature of an access control system is access point control,
which may include:

• Electronic locks on access doors


• Swipe card readers
• Keypad coded access for authorised personnel
• An access control log
• In some very high security environments, biometric technology (computerised
methods to identify a person by their unique characteristics) may be used for access
control where the system will read finger prints, palm prints or other specific data
regarding individuals and match it against the data held in the system.

© BIIAB May 2011 - 10 -


The police do not have automatic right of entry to a privately operated CCTV control room
and may only gain entry if they have:

1. Obtained permission and


2. Access is for a specific operational purpose.

Any unauthorised visitors who wish to enter the control room must be referred to the
operator’s line manager.

1.8 Standards of Behaviour

Standards of behaviour exist to ensure that CCTV operators are professional and behave
with personal integrity. CCTV operators have a responsibility to follow these standards to
ensure that they carry out their duties in line with recognised national standards.

Personal appearance

An operator should at all times:

• Wear clothing which is smart, presentable and in accordance with the employer’s
guidelines
• Be in possession of their SIA licence whilst on duty.

Professional attitude and skills

An operator when on duty should:

• Act fairly and not discriminate


• Carry out their duties in a professional and courteous manner
• Behave with personal integrity and understanding
• Use moderate language which is not defamatory or abusive
• Be fit for work and remain alert at all times
• Be polite, positive and professional.

General conduct

In carrying out their duty an operator should:

• Never solicit or accept any bribe or other consideration from any person
• Not drink alcohol or be under the influence of alcohol or un-prescribed drugs
• Not display preferential treatment
• Never abuse their position of authority
• Never bring unauthorised equipment in to the control room
• Never remove equipment from the control room without authorisation.

Organisation/company values and standards

An operator should comply with the employer’s policies, procedures and objectives. Where a
contracting company is operating a CCTV system for a system owner, policies procedures
and objectives should be agreed as part of the of the contract before taking over
responsibility for the CCTV system.

© BIIAB May 2011 - 11 -


2 The Law
By the end of this session:

The learner will understand relevant Legislation and how it impacts on CCTV operations and
will be able to:

• Identify how Data Protection legislation impacts on the role of the CCTV operator
• Identify how Human Rights legislation impacts on the role of the CCTV operator
• Identify the different types of surveillance described by the Regulation of Investigatory
Powers legislation
• State how the main provisions of Regulation of Investigatory Powers legislation
impact on CCTV operations
• Identify authorisation levels required for surveillance operations under the Regulation
of Investigatory Powers legislation
• Explain the main provisions of Freedom of Information legislation
• State how Freedom of Information legislation differs from Data Protection legislation
• Identify how Display Screen Regulations impact on the role if the CCTV operator
• Identify the causes, key indicators and means of alleviating stress

Introduction

A principle of British justice is that everyone is presumed innocent until proven guilty. CCTV
images are being used more and more to fight crime and provide evidence in an effort to
prove guilt. Therefore, systems must adopt policies and procedures to help ensure that all
evidence gathered by CCTV complies with legislation and can be lawfully used in court.
Most important of all the aims is to ensure that Article 6 of the Human Rights Act 1998, the
right to a fair trial, is adhered to at all times. The following are descriptions of the main
legislations applicable to CCTV operations and operators.

2.1 Human Rights Act 1998

The European Convention on Human Rights was originally drafted after the Second World
War, and over 40 countries are now signatories to the convention. Britain was one of the first
signatories in 1953. The European Court of Human Rights was established to interpret the
convention and comprises of judges from countries that are members of the Council of
Europe (this is a different body to the European Union with a broader membership).

The Human Rights Act 1998 was established to clarify the requirements of the Convention
on UK legislation and give people the right to take action against the British Government in
British courts, with appeal to the European Court of Human Rights should that be necessary.

Which organisations are affected by the Act?

In general, any organisations whose role is of a public nature, or companies undertaking


activities on behalf of the state, or any group that spends taxpayers money or has a statutory
function, or has government appointees on its governing board, are affected by the Act.

© BIIAB May 2011 - 12 -


Some examples include:

• Local authorities
• Government departments
• Police
• Schools, universities and colleges
• Hospitals
• Charities such as the NCPCC
• Security companies performing duties in courts and prisons
• Contract companies undertaking CCTV monitoring work
• The Crown Prosecution Service.

The rights of the individual

The rights of a person under the Human Rights Act are defined by the European Convention
on Human Rights. There are 16 areas of the Convention that have been written into the
Human Rights Act. They are:

Article 2 The right to life


Article 3 A prohibition on torture
Article 4 A prohibition on slavery and forced labour
Article 5 The right to liberty and security
Article 6 The right to a fair trial
Article 7 No punishment without law
Article 8 The right to respect for private and family life
Article 9 Freedom of thought, conscience and religion
Article 10 Freedom of expression
Article 11 Freedom of assembly and association
Article 12 The right to marry and found a family
Article 14 Prohibition on discrimination
Article 16 Restrictions of political activity of aliens
Article 17 Prohibition of abuse of rights

In addition to these articles of the Human Rights Act 1998, there are other ‘Protocols’ that
add to these Rights:

• Protection of property
• The right to education
• The right to hold free elections
• The abolition of the death penalty.

The State’s right to interfere with the rights of the individual

The Human Rights Act 1998 defines the scope of an individual’s rights in respect of their
relation with the State, and in doing so, places limitations on the state in respect of its ability
to interfere with those rights.

To interfere with these rights, the State must demonstrate that:

• It is absolutely necessary (not just desirable or convenient)


• Public interest is balanced against the private rights of the individual (proportionality).

© BIIAB May 2011 - 13 -


This leads to a situation where some of these rights are ‘absolute’, such as the right to life,
the prohibition of torture and the right to a fair trial. Other rights are ‘limited’ or are ‘qualified’
where they compete with other rights and freedoms.

CCTV operators must be aware of the association between Articles 6 (the right to a fair trial)
and 8 (the right to respect for private and family life) of the Human Rights Act. Data
processing must be lawful at all times, and to record an individual’s personal data without
their permission is unlawful. To then use that data as evidence would breach Article 6,
because it had been gathered unlawfully.

CCTV Operators and the Human Rights Act

Under the Human Rights Act, CCTV operators have a responsibility to ensure that all
monitoring and surveillance that they undertake is proportional, legal and non-discriminatory.
They also have to be very aware of the rights of the individual and take care not to infringe
these rights in any way: For example:

• Using CCTV equipment to undertake close up surveillance of an individual in there


car or through the window of their home would be an infringement of that person’s
right to privacy
• Enhancing or altering images in any way or failing to protect the continuity of
evidence would interfere with the right of an individual to a fair trial.

2.2 Data Protection Act 1998

Closely associated with the Human Rights Act 1998 is the Data Protection Act 1998. This
Act supersedes the Data Protection Act 1984 and has brought all aspects of CCTV under its
influence.

The Data Protection Act 1998 controls the processing of all subject data, be that written
and/or images. The Data Protection Act is the first Act of Parliament that has produced strict
controls over the way in which data is used in the CCTV industry. It should be recognised
that the Data Protection Act 1998 is not specific to the CCTV industry and covers a wide
variety of sectors and applications.

Under the Data Protection Act, a person has the right to obtain information personal to
themselves from any data processing system.

The effect of the Data Protection Act 1998 on the CCTV industry

The ground-breaking nature of this Act made it necessary for the then Data Commissioner
(who has since been replaced by a new post called the Information Commissioner) to
produce a CCTV Code of Practice and this document is a very useful document for all
members of the CCTV team. It defines the law as applied to the CCTV industry and it also
provides good practice guidelines where they are available. This document provides
information and guidance to those that are responsible for management and administration
of CCTV.

The Code of Practice also gives practical advice, such as on images captured by CCTV
systems and the impact of the Data Protection Act. The advice is that they should only be
kept for as long as required by the purpose of recording them. For example, images
recorded at a cash machine may be kept for 30 days or more, since suspicious activity may
not come to light until after the victim has received a bank statement. Once the retention
period of images has expired, they should be removed or erased.

© BIIAB May 2011 - 14 -


In addition there are rules regarding the actual collection of data that CCTV operators must
follow. These rules require any data collected to:

• Be adequate
• Be relevant
• Not be excessive.

Initial Assessment Procedures

Data processing can only be achieved if the actions are lawful. This is deemed so in two
ways:
1. The ‘subject’ gives permission to process the data
2. The process is approved in Law.

In accordance with the provisions of the Data Protection Act (DPA):

• The person who will be legally responsible for the scheme must be defined (job title)
• The appropriateness of using CCTV surveillance equipment must be assessed
• The purpose of the scheme must be established - this might include prevention,
investigation and detection of crime, apprehension and prosecution of offenders,
public and employee safety or monitoring the security of premises etc.

Application is made to the office of the Information Commissioner for registration. The
assessment process, purpose of the scheme, responsibility for all aspects of the scheme
and day to day operation by job title(s), security and disclosure policies must be
documented. Equipment should only monitor what it is supposed to monitor, for example:

• Operators must be aware of the purpose of the scheme and are only allowed to use
the equipment for the intended purpose
• Cameras should be restricted so that operators cannot adjust them to overlook
spaces that are not intended to be covered. If restriction is not possible, operators
should be trained to recognise the requirements for privacy
• The DPA states that there must be signs showing the presence of cameras at ‘the
entrance to camera zones’. This offers members of the public the opportunity not to
enter that zone if they do not wish to be captured on camera. Once a ‘subject’ has
entered the designated area, it is considered that they agree to their data being
processed. This is known as ‘implied consent’. All separately owned CCTV systems
should provide signs to show CCTV cameras are present at the entrances to their
premises or property. The DPA does not dictate the shape or colour of signage;
however it does recommend that the size of the signs must be sufficient for persons
to read and understand. Therefore a sign by the roadside should be at least A3 size
to enable motorists or passengers to view it. CCTV cameras are now such a large
part of our lives that the Information Commissioner believes all members of the public
understand that an image of a camera means that CCTV is in operation, therefore it
is not necessary to have these words on the sign if an image is present. However the
purpose of the cameras must be indicated and this is usually done by the words
‘Community Safety and Crime Reduction’ or ‘Crime Prevention and Prosecution of
Offenders’. The name of the system owner must also be on the sign or the logo of
the company or authority. A business time telephone contact number for the CCTV
scheme must be part of that sign. Although not necessary, authorities will often put a
number of signs inside the camera zones to reinforce the deterrent factor and to try
to reduce the fear of crime.

© BIIAB May 2011 - 15 -


2.3 Freedom of Information Act 2000

The Freedom of Information Act 2000 is only relevant to Public Authorities and companies
wholly owned by public authorities. This is a slightly different list to that included under the
Data Protection Act as it does not extend to privately owned or charitable organisations
working on behalf of a public authority. The list is extensive but includes:

• Local authorities
• Government departments
• Police
• State maintained schools, universities and colleges
• NHS
• Prison Service
• SIA.

The Freedom of Information Act gives people a general right of access to non-personal
information held by or on behalf of public authorities, to promote a culture of openness and
accountability across the public sector.

The Act allows access to recorded information such as emails, meeting minutes, research or
reports. There are 23 exemptions from the general right of access, relating to such things as
national security, information that would prejudice international relations and commercially
sensitive and confidential information. Court records are also exempt.

Whilst the Data Protection Act relates to the rights of the individual to find out what
information is held about them on computer and within some manual records, and places
controls on how that information is obtained, stored and used, the Freedom of Information
Act tends to gives access to a wider range of information about the operation of the public
body.

The Freedom of Information Act is rarely used in relation to the CCTV sector, although it
might be used by researchers or journalists seeking information on the expenditure and
decisions taken by a local authority in installing a CCTV system.

Whilst the Data Protection Act and the Freedom of Information Act are closely related in the
context of operating the CCTV system, it is the Data Protection Act that is more significant to
a CCTV operator. Indeed, the Data Protection Act 1998 will be the higher authority if
information is requested under the Freedom of Information Act 2000.

2.4 Regulation of Investigatory Powers Act 2000

The Regulation of Investigatory Powers Act 2000 (RIPA) was introduced to protect police
and intelligence services by making surveillance and similar activities conform to the
principle of ‘legality’ under the European Convention for Human Rights. It controls all types
of surveillance techniques and includes telephone taps, undercover observations as well as
CCTV observation.

The key difference between the Data Protection Act 1998 and the Regulation of
Investigatory Powers Act 2000 as far as the CCTV industry is concerned, is that:

• The Data Protection Act 1998 regulates and controls processing of and management
of images

© BIIAB May 2011 - 16 -


• The RIPA controls covert directed or intrusive surveillance in public and private
places

CCTV systems are not normally within the scope of RIPA since they are overt and not being
used for a specific investigation. However, when a camera is being used for directed
surveillance, the correct authorisations under RIPA will be required. In providing the ‘legal’
means to carry out surveillance against a person in a public or private place and in a vehicle,
RIPA limits the right to privacy in respect of the Human Rights Act and is therefore an
example of a limitation.

Surveillance and the RIPA

Covert Surveillance

This is surveillance that is carried out in a way that helps to ensure that the person who is
the subject of the surveillance is unaware that it is being taken. In order for surveillance to
be of relevance to the RIPA it must be covert. Any covert surveillance of a target must stop
when the subject no longer gives any cause for concern.

Intrusive Surveillance

This is defined as taking place on any residential premises or inside a vehicle or in a way
that information (images) of a quality is gained that the device (camera) may have been
inside those premises or that vehicle.

Directed Surveillance

This is defined as covert surveillance that is undertaken in relation to a specific investigation


or specific operation which is likely to result in the obtaining of private information about a
particular person in a public place. For example:

• Being requested by the police to track, observe and detect the actions of a named
and identified individual(s) whilst they are located within the zone covered by your
CCTV system
• The police have received information that an identified individual is going to take part
in an armed robbery in your area and they wish to use the cameras to keep watch.
This is not direct surveillance if the individual is unknown
• Being asked to watch a named and identified drug dealer’s car, and record all
persons visiting it. This is directed surveillance as the CCTV operator is likely to
obtain personal information about the known drug dealer.

A RIPA authority is not required to observe known ‘hot spot’ areas. For example, if statistics
proved that ‘pick pocketing’ offences were more regularly committed in the High Street
between 10.00 am and 2.00 pm on a Friday, a RIPA would not be required as the system is
not aimed at a particular individual.

Authorisation

Where the police wish to make use of CCTV monitoring in a pre-planned operation (i.e.
directed surveillance) authorisation must be given by a Police Superintendent or above rank.

However, in some circumstances, authorisation for the use of CCTV will be required
immediately and in such cases authorisation may be given by anyone of the rank of
Inspector or above. However, this approval is only valid for 72 hours.

© BIIAB May 2011 - 17 -


In both cases, the grounds for authorisation are as follows:

• National Security
• Prevention and detection of crime
• Preventing disorder
• Protecting public health
• In the interests of public safety

The officer must satisfy the following criteria before issuing an authority. The authorisation is
“necessary” and the activity is “proportionate” to what is being achieved. Under Section 80
of RIPA, it is not unlawful to obtain images without authorisation. However, the Human
Rights Act says it is unlawful to act in any way which is incompatible with a convention right
– Article 6 and Article 8. If actions such as the use of camera equipment are unlawful, the
recorded information may be excluded by the Data Protection Act 1998.

2.5 Police and Criminal Evidence Act 1984, (PACE)

The Police and Criminal Evidence Act 1984 and the PACE codes of practice provide the
core framework of police powers and safeguards, established with the aim of creating a
balance between the powers of the police and the rights of the public. PACE is a fairly wide
ranging piece of legislation, mainly dealing with police powers to search an individual or
premises, including their powers to gain entry to those premises, the handling of exhibits
seized from those searches, and the treatment of suspects once they are in custody,
including being interviewed.

Whilst PACE gives powers for literally anything to be seized by enforcement bodies such as
the police, evidence gathering systems which help prove the 'continuity of evidence' must be
adhered to where they have been implemented.

These systems form part of the 'Subject Access' requirements and, unless there is a
provable need for urgency, such as an ongoing threat to life, requests to view data must be a
planned event. An investigating officer will request for images from certain cameras to be
copied to a viewing DVD or tape. An appointment will be made for the investigating officer to
attend at an arranged time to explore the viewing copy. An appointed CCTV operator will
make the 'viewing copy' and store it securely. On the arrival of the officer at the control
facility, they are admitted to a 'viewing suite' where they investigate the image data stored on
the 'viewing copy'. The officer identifies what data is required for evidence and the CCTV
operator then makes a 'working copy' DVD or tape which is sealed in evidence bags and
handed to the officer against signature. At the point that the officer declares 'initial disclose'
the evidence that is used in the investigation, comes under the controls of the CPIA.

2.5 Criminal Procedures and Investigation Act 1996 (CPIA)

The Criminal Procedures and Investigation Act 1996 gives direction to the police and other
investigating bodies as to what evidence gathered during the course of an investigation
must be disclosed to the defence. This basically involves any information coming into the
possession of the investigating authority, whether or not it will form part of the prosecution
but which may be of assistance to the defence.

© BIIAB May 2011 - 18 -


‘Disclosure’ in relation to a CCTV recording

It is the responsibility of the Disclosure Officer dealing with the incident to decide whether the
contents of the recording would be required to be ‘disclosed’ under the Criminal Procedure
and Investigations Act 1996. This applies to any data/media reviewed by the police during an
investigation.

CCTV Surveillance Techniques

CCTV operators must remain alert at all times and use all their communication skills and
knowledge to assist them to ‘read’ a situation and make the right decisions. Occurrences
that are monitored should be responded to – if they are ignored it will reduce the value of the
CCTV system.

Responding effectively to the incidents will add to the deterrent benefits of the system,
especially if a terrorist or criminal is testing the system. Operators should therefore ensure
that:

• They are familiar with the geographical layout of the area covered by the system
• Incidents requiring investigation should be brought immediately to the attention of
patrolling staff, management or police
• Sufficient appropriate staff are available to respond to an alert
• Detected terrorist actions should be reported in accordance with the Civil
Contingency Act 2004, insomuch as the appointed site ‘Security Co-ordinator' is
notified and a record of this is preserved
• Suspicious events should be fully noted and recorded for future reference. All
incidents should be entered into a log, which should be handed over to staff when
taking over
• Recorded data relating to a suspicious incident should be carefully reviewed by the
appropriate ‘response forces’, whether this is patrolling security officers, or the police.
• The police are contacted as soon as possible if criminal activity is suspected, using
the 999 emergency system or other direct telephone contacts.

A regular camera patrol is one of the most important duties for a CCTV operator to carry out.
By using the CCTV system effectively, large areas can be covered from the control room.

To make patrolling as effective as possible, there are some useful points to consider:

• Be alert at all times


• Be aware of the camera fields of view
• Know your system's limitations
• Know the location of each camera within your system
• Know what the assignment will entail
• Develop effective working relationships with police
• Identify trouble spots
• Be watchful
• Be investigative
• Carry out random patrols
• Improve your local knowledge
• Liaise with other CCTV operators in the area

© BIIAB May 2011 - 19 -


2.6 Health and Safety at Work

The Health and Safety at Work Act 1974 states employers must take reasonable care to
protect their employees from risk, unforeseen injury, disease or death at work. The purpose
of the Act is to promote, stimulate and encourage high standards of occupational health and
safety within the workplace. Everyone who uses the workplace must observe the legislation,
as to not do so can lead to criminal sanctions such as unlimited fines and imprisonment.

Television Screens and Monitors

Television screens and monitors producing pictures are covered by two sets of regulation:

1. Provisions and Use of Work Equipment Regulations 1992. This covers issues such
as lighting requirements in the control room

2. The Display Screen Regulation 1992. This covers issues such as:
- The analysis of workstations to assess and reduce risks
- Ensuring workstations meet specified minimum requirements
- Planning work activities so that they include breaks or changes of activity
- Providing eye and eye-sight tests on request, and special spectacles if
needed. All CCTV operators are entitled to an annual eye sight test paid for
by their employer
- Provide information and training.

Breaks of Vision

A large portion of a CCTV operator’s role will involve monitoring images on-screen.
Constantly looking at a screen can cause the eyes to strain which can also lead to
headaches, eventually resulting in a loss of concentration and/or stress. Although the
images on-screen are constantly changing, other duties that they carry out will automatically
force them to rest their eyes.

If regular breaks aren’t taken, it can result in headaches. Headaches may result from several
things that occur with watching monitors, such as:

• Poor eyesight
• Screen glare
• Poor image quality
• A need for glasses, or a change in prescription
• Stress from the rate of work
• Poor posture
• Dread of new technology.

Certain actions can be taken to reduce eyestrain. Such actions can also help prevent the
operator from getting bored and maintain interest. These actions include:

• Using a different arrangement of the keyboard, mouse and documents


• Making sure the screen surface is clean
• Avoiding or reduce glare by using blinds or curtains if you’re sat near to a window
• Making sure there is enough space under the desk so that you can move your legs
freely
• Avoiding excess pressure from the edge of your seat on the backs of your legs. A
footrest may be helpful to reduce the pressure

© BIIAB May 2011 - 20 -


• Not sitting in the same position for long periods
• Taking regular breaks from watching the monitors
• Organising break times without there being a risk of missing an incident.

If more than one operator is present on a shift then breaks can be taken individually, leaving
the system continually monitored. Being aware of when it is crucial that operators are at their
station will ensure that no incidents are missed.

Recommended Viewing Distances

CCTV monitors vary in size, and operators should ensure that they are the correct distance
away from the monitors to view them comfortably, or that they are using the correct sized
monitor. As a general rule the further away the CCTV operator are from the monitor, the
larger the monitor should be.

One way of determining how far away you should be to comfortably view a monitor is based
on the simple formula:

Monitor screen size (in inches) – 4 = optimum viewing distance (feet)

The upper and lower limits will be +/- 25% of the optimum viewing distance.

Using the formula above, if you were using a 14 inch monitor:

14 – 4 = 10ft viewing distance

To determine the upper and lower limits, multiply the optimum viewing distance by 1.25 and
0.75

• Upper viewing limit - 10 x 1.25 = 12.5ft


• Lower viewing limit - 10 x 0.75 = 7.5ft

By using the formula above, you can now work out that a 14 inch monitor should be viewed
effectively at a distance of 7.5 to 12.5 feet.

Stress

CCTV operators have to be able to deal with several incidents at a singular time, prioritise
surveillance and ensure that they carry out all their duties lawfully. Performing all of these
tasks can lead to a CCTV operator having to work under pressure, which in turn can
promote stress. Maintaining a high level of accuracy and reducing stress effectively is key for
the operator if the best results from their system are to be achieved.

Operators should work well with their system manager by communicating about all aspects
of the job – including negative aspects such as witnessing a traumatic incident. Signs of
such stress could include:

• Avoiding the area where the incident took place


• Making simple mistakes
• Not following procedures
• Avoiding duties at certain times
• Not reporting for duty or being frequently late for duty
• A vast reduction in effort by a normally keen operator.

© BIIAB May 2011 - 21 -


Other signs of stress include:

• Headaches
• Anxiety
• Increased blood pressure
• Being short tempered
• Being forgetful
• Becoming withdrawn.

If a manager, supervisor or colleague notices any change in the behaviour of an operator,


immediate and continued support should be given. They should actively listen to any issues
that the individual may have, showing their interest in hearing the individual’s problems. In
addition to the support provided by the manager, supervisor or colleague, the individual’s
family may also provide support. Support is especially beneficial if there are any court cases
or other events that may remind the individual of the event.

The length of time it takes for people to recover from traumatic events will vary dependent on
the person – sometimes this can be short process, other times it can be much longer.

A CCTV operator can also do things to minimise or reduce stress including:

• Maintaining a positive attitude


• Working as part of a team if possible rather than lone working
• Having good relations with colleagues and managers
• Being relaxed
• Having good time management
• Taking regular breaks
• Avoiding extreme emotional reaction to situations and events.

Good housekeeping practices

It is important for operators to:

• Keep their desk free of rubbish


• Ensure waste bins are regularly emptied
• Report defective equipment.

Keeping the workplace in a clean and tidy condition supports health and safety regulations.

© BIIAB May 2011 - 22 -


3 Roles and Responsibilities of a CCTV Team

By the end of this session

The learner will understand the roles and responsibilities of the CCTV operator and other
CCTV staff and will be able to:

• Describe the purpose of a CCTV system


• Identify the main roles and responsibilities within a typical CCTV control room
team
• State the importance of accurate and timely communication up and down the
reporting chain
• Explain the importance of sharing information between the team and other
agencies
• Explain the importance of the continuity of evidence
• Identify the responsibilities of the operator to produce statements and give
evidence in court
• State the importance of accurate and detailed note taking and record keeping

3.1 The Purpose of a CCTV System

CCTV systems are used in many different ways by different organisations and authorities.
There are however three main purposes of CCTV systems:

1. Detecting crime
2. Preventing crime
3. Promoting public safety.

This is reflected in registrations with the Information Commissioner’s Office which typically
and commonly declare that the purposes of use of a CCTV system is for; ‘The prevention of
crime and prosecution of offenders’

3.2 Roles and responsibilities of a CCTV team

A typical CCTV team consists of the following:

• CCTV Owner - The ‘owner’ is just that, they own the system. They employ the operating
staff either directly or as through a third party contractual agreement. They often occupy
the title of ‘Data Controller’ for the purposes of ICO registration.
• CCTV Manager - The ‘manager’ oversees the system and causes the operational
requirements to be identified. They are also responsible for the necessary services and
administration procedures to be adopted to lawfully and effectively achieve the aim of the
system. They are also commonly responsible for managing the employment of staff.
• CCTV Supervisor - The ‘supervisor’ ensures that the system operates in accordance to
the adopted procedures and registered ‘purposes of use’. They may also be required to
set shift patterns and be the front-line link between staff and management.

© BIIAB May 2011 - 23 -


• CCTV Operator - The ‘operator’ is the data processor – processing the data that the
system obtains. This includes the operation of most of the equipment, including joysticks
and cameras, but only certain ‘operators’ may be authorised to make ‘copies’ of data for
evidential use.

3.3 The Role of a CCTV Operator

The CCTV operator is one of today’s most high profile security positions, despite being
relatively new to the security industry.

CCTV operators are expected to work effectively both on their own initiative and as part of a
team, and certainly will have a role to play as part of the larger police and emergency
services family:

• To observe incidents and occurrences as they happen.


• To record those incidents and occurrences
• To report incidents and occurrences.

These responsibilities are split into four main areas and together constitute the most
important roles that an operator must perform whilst on duty:

1. Screen monitoring
2. Process data
3. Incident reporting
4. Maintain log books.

Additional duties could include:

• Access control
• Message answering
• Switchboard operation
• Key control
• Monitoring of fire and intruder systems
• Monitoring out of hour emergency response service
• Warden controlled schemes (out of hours)
• Liaising with the police and other monitored radio networks.

The Control Room

For the CCTV control room to operate effectively, the CCTV team must work in close
harmony in order to achieve the aims and objectives of the scheme (contained in the
Operating Procedures and Codes of Practice). To ensure that the system runs as smoothly
as possible, it is crucial that information is passed on to all appropriate staff as quickly as
possible.

Any information obtained by the CCTV team during the course of duty, which is stored in the
control room must be treated as strictly confidential and should not be disclosed to any
unauthorised person. (See also Data Protection Act and Freedom of Information Act). All
staff may be required to sign a declaration of confidentiality. System ‘partners’ and ‘visitors’
should be required to sign a Data Protection declaration before admittance is approved.

© BIIAB May 2011 - 24 -


Reporting Pathways

CCTV operators are very likely to be involved in very serious situations where it is important
to understand the need to pass on information in a timely manner. However, there is also
the need to understand the reporting chain for incidents. This is usually:

• Operators; report to the


• Senior operator or supervisor; who reports to the
• CCTV or system manger; who reports to the
• Head of Service e.g. housing manager; who reports to the
• Deputy Chief or Chief Executive.

3.4 The Importance of Timely Communication

When monitoring CCTV systems, the operator is observing events and situations unfold in
real time. Events being observed may include:

• Death or injury
• Loss
• Damage
• Waste
• Illegal activities
• Intimidation
• Anti-social behaviour.
.
The CCTV operator is responsible for communicating issues that arise in a timely manner to
their supervisor, other members of the security team and the emergency services, following
the reporting chain. This will ensure the integrity of the CCTV system and its operators.

The safety and security of others can be dependent upon your actions, and those actions
may form part of any future legal case that might arise from what has been observed, so it is
vital that messages are communicated to the right people, at the right time and in a clear,
concise and informative manner. Remember to keep communication:

Accurate
Brief
Clear

Timely communication is also important to maintain customer care and will enable CCTV
teams to deal effectively and efficiently with any complaints that may arise.

3.5 Sharing Information with Other Agencies


CCTV teams do not work in isolation and it is vital that they communicate with other
agencies such as the police, the emergency services, HM Revenue and Customs, the
immigration authorities and so on.
Sharing information in this way promotes a spirit of teamwork between the CCTV operators
and external agencies all of whom have the objective of preventing crime and protecting
public safety. Other benefits of working in this way include:

• Increasing the effectiveness of the system


• Identifying potential crime hotspots
• Providing continuity of evidence.

© BIIAB May 2011 - 25 -


3.6 Continuity of Evidence
The continuity of evidence is vital, as if procedures are not followed correctly, and the case
goes to court, the defence then has an opportunity to criticise the prosecution evidence.
This could result in the evidence being ruled inadmissible.

The continuity of evidence chain begins as soon as the CCTV operator is alerted to the need
to preserve images/data. This may be as the result of:

1. The operator witnessing the commission of the crime


2. A request from the police
3. A ‘subject access request’ from the person identified by the data.

If copies of media are created, operators must complete a 'media log' and record the basic
information that identifies what the data refers to. Information should include:

• Time and date of media production, e.g. 2.10 am on 26/12/10


• Time, date and location of the incident, e.g. 11.17 pm on 25/12/10 at The Kings Head,
Queen Street, Prince Town
• Name of subject (if known), e.g. Rob Emblind
• Type of offence/incident, e.g. Theft of mobile phone from the person
• Evidence value, 100% coverage of commission of offence

Some digital systems adopt copying methods that permit the data to be copied to designated
'encrypted folders' on computer hard drives. Proof of such actions can be evidenced using
computer software to support conventional systems used to prove continuity of evidence.

'Hard' media copies, such as DVD or VHS and photographs must be marked in a manner
that identifies the data/imagery, but does not breach human rights legislation or other
legislation. Once suitably marked, the media copy must be stored securely within the
confines of the Control Room suite and access to it is controlled by entries in the media log
which demonstrates documented proof of the location of the media copy. Any further access
of the media must also be recorded

If the media copy has been made a the result of a lawful request, be that from the police,
another recognised 'partner' or the 'subject' themselves, then this information must also be
recorded in the log and evidence to prove that the request was lawful must also be produced
and stored.

'Subject Access Request' forms will be processed through the system supervisory structure
and approved operators will be tasked to search the systems stored data. Identified personal
data of the 'subject' will be recorded into media copies and passed to supervisors for
distribution. All details relating to such searches must be entered in the media log.

Police media requests are subject to the same requirements. Such requests commonly ask
for imagery/data produced from cameras covering all possible angles between 5 to 10
minutes before and after the event is copied. On receipt of the lawful request, operators will
produce media by copying data produced by cameras covering the area between the
relevant times.

It is commonplace that the CCTV operator does nothing more than produce the media copy,
secure it until the investigating officer arrives, when it is taken from storage against signature
to allow the officer to view it.

© BIIAB May 2011 - 26 -


Once the police officer has identified what data is to be used as evidence, declaring 'initial
disclosure', an authorised CCTV operator will produce a 'working copy', using either a DVD
or VHS and possibly 'still imagery' in the form of photographs.

The produced media, the 'working copy' is then sealed in appropriate containers, labelled
accordingly and then handed to the police officer against signature. This is often referred to
as being 'bagged and tagged'.

As well as recording required details on the labelling, the producing operator must also
record the actions in the media log.

It is important to remember that the all lawfully produced 'data' processed by the 'Data
Controller', belongs to them at all times until it is destroyed. When the police have finished
using the media copy it should be returned to the Data Controller to allow storage or
destruction.

Because of the laws regarding the right for convicted persons to appeal, some data may be
required to be stored securely for long periods. In the event of a 'life sentence' then the
period of retention will be for the life of the convicted person.

All this information must be effectively recorded in the media log.

CCTV operators and court

CCTV operators may be requested to produce a witness statement describing their personal
involvement in a case. For this reason, it is considered good practice that operators should
be trained to produce their own statements. However, the police will record them for you if
required, especially in complicated or serious criminal cases.

Witness statements are required to comply with Section 9 of the Criminal Justices Act and
will carry a declaration that the evidence you have given is true to the best of your
knowledge and belief. This is to allow statements to be used in the case without requiring the
author (the operator) to attend. However, people charged with committing crime have the
right to contest the accusation and the evidence that is submitted. If an operator’s statement
is contested, the operator will be required to attend the court case as the ‘author’ must be
present before the evidence can be tested.

In such cases, a summons will be posted to the operator, demanding their attendance. This
information should be passed to your supervisor so attendance and shift cover can be
achieved. Operators must make every effort to attend as failure to comply with such a
summons may result in the court taking action against them.

When giving evidence in court you must:

• Conduct yourself in a professional manner at all times


• Speak clearly and at a level to allow all parties attending the court to hear you
• Reflect the image of the private security industry in your appearance and manner. If
you have a uniform, then wear it to the court, ensuring that it is clean and smart (with
your shoes polished)
• Be available for consultation with the prosecution before the case is heard.

© BIIAB May 2011 - 27 -


Once you are called to give evidence:

• You will be asked to enter the witness box and take the oath or affirmation
• You will be asked your name and address. In the case of your address, give the
company’s address and not your private address for security reasons
• You may be permitted to refer to notes that you have made at the time or
immediately afterwards, but only if neither party objects
• Try to give evidence from memory. Constantly referring to notes will give the
impression that you are not clear about the events contained within your evidence
• Only give the facts contained within your statement, pocket book or any other
documentary evidence called upon by the court. Your pocket book may only be used
for reference purposes when permission by the court is given. Remember that giving
a false statement (lying) in court is a criminal offence
• Be polite and courteous at all times
• Ensure you face the person asking the questions and turn and face the ‘bench’ (the
Judge or the Magistrate) to give your answers
• If you do not know the answer to a question posed to you or you are unsure of a
particular fact, say so. Do not make things up
• When both prosecution and defence have finished examining your evidence, you will
be excused. You must remain in the court until permission is given for you to leave.

Additional preparation for attending court:

• Pay attention to appearance and hygiene. Courts can be very stressful places and
the body will react accordingly
• Plan the journey to allow punctual attendance
• Read any notes and pocket book entries to refresh memory of the event

Notes and records

In the past, every detail was recorded in an occurrence book. This came from police systems
when each police station had its own occurrence book, and an officer would make
handwritten entries for everything relevant to that station or the officers working there. Logs
are used and are essential to support recorded images and provide an audit trail to prove the
continuity of evidence. In addition to these logs, computer technology may provide effective
audit trails, proving data access and processing.

The logs that a CCTV operator is likely to experience are as follows:

• CCTV authorisation form: request to view


• Access control log: visitor log
• Daily occurrence log
• Incident log
• Media production, processing and movement logs
• Maintenance and repair log

When completing handwritten logs, these rules must be followed:

1. All entries are to be made in chronological order


2. No empty lines are to be left between entries
3. Make all entries clear using dark ink, no erasers
4. No personal notes, dates, times or numbers
5. Entries to be made at the time of the incident or as soon as possible afterwards

© BIIAB May 2011 - 28 -


6. To make an alteration, draw a line through the incorrect information and note your
initials next to it to show who made it
7. Do not remove pages.

© BIIAB May 2011 - 29 -


4 CCTV Equipment and its Operation

By the end of this session

The learner will understand the characteristics of a CCTV system and will be able to:

• Identify the main components of the CCTV system


• Describe the main types of CCTV cameras and mountings
• Describe how technologies such as ANPR, biometrics, visual recognition and digital
recording are used with CCTV equipment
• Explain the importance of dedicated communication links with third parties

4.1 CCTV Equipment

In the simplest type of CCTV system, there is a camera that sees a picture. This then
converts the picture into electrical signals that are passed through a cable to a monitor. The
monitor then re-converts the signal and displays the picture seen by the camera.

When we refer to a CCTV system it should be recognised that it does not just refer to the
CCTV operating equipment, but includes all the support services as well. However much
technology develops, operators will always require the response forces (security guards or
police) to respond to requests to attend and deal with incidents.

Similarly, we have to recognise the importance played by the adopted policies and
procedures, in particular the Codes of Practice which is the over-arching mechanism that
helps ensure the legality of the system. When considering the component of a typical
system, the value of all these needs to be recognised.

There are commonly 2 types of CCTV systems:

1. Analogue – which uses VHS tapes and a VHS video recorder to produce media
copies
2. Digital – which uses a computer based hard drive and DVR recorder to produce
digital media copies.

A CCTV operator must carry out functional checks at regular intervals of all the relevant
equipment to ensure that it is all working correctly. Any faults that are found must be
reported as detailed in the assignment instructions.

The equipment that should be checked includes:

• Keyboards
• Joysticks
• Cameras
• Monitors
• Recording devices
• Lighting (this should be tested when it is dark).

© BIIAB May 2011 - 30 -


4.2 Transmission Method
A number of transmission, or signalling, methods are available for CCTV, which can be split
into two categories:

1. Cable
− Fibre Optics: used to provide the transmission links in the majority of CCTV
systems, either in private networks or through the main British Telecom or cable
company systems. The ease with which the 'fibre' can be installed in existing
ducting often means minimum groundwork or digging
− Coaxial: often limited to very short runs, normally within a building.
− Public Switched Telephone Network (PSTN) and Intergral Services Digital
Network (ISDN) ‘networks’: through British Telecom with ISDN being the favourite
because it offers fast digital transmission against the much slower PSTN
analogue system
2. Airborne
− Microwave, Infrared, FM Radio, Laser links: a large number of airborne links
require “line of sight”, which is not always possible to achieve in one link. This
means that a number of links may be required to achieve the complete signal
from camera to control room.
Cameras

The standard camera used by the industry is the CCD (Charged Couple Device) camera.
The body of the camera itself contains no moving parts, only electronic circuit boards and
the lens of the camera focuses light onto a silicon chip with a photosensitive surface. This
type of camera requires very little maintenance due to the lack of moving parts.

A pan tilt zoom camera (PTZ Camera) is a CCTV camera with remote directional and zoom
control.

The phrase PTZ Camera has two uses:

1. PTZ stands for pan, tilt, zoom and may refer merely the way that some CCTV
cameras move
2. PTZ may also be used to describe an entire category of cameras where a
combination of sound and/or motion and/or change in heat signature may enable the
camera to activate, focus and track suspected changes in the video field. By
activating only during times of change, systems can notify human monitors and
minimise storage requirements.

The Monitor

Once the signal received from the camera has been converted, it is displayed on a monitor.
Most control rooms have two types of monitors:

1. Overview monitor - this is usually a large monitor displaying a single, quad, or


multiple pictures. Depending on the type of system installed, these might be
single or multiple in a ‘bank’
2. Spot or event monitor: these monitors allow the operator to view a specific area
in detail. This monitor is usually used to patrol, search, or view an actual incident.

© BIIAB May 2011 - 31 -


The Multiplexer

Pictures transmitted from the cameras may be received by a multiplexer before they are
passed to the recorders. A multiplexer enables up to 32 separate camera images to be
recorded onto a single recorder. This is achieved by passing a frame from each camera in
turn for recording. When there is a requirement to replay the recorded data, only pictures
from the selected camera are displayed. This provides 'real time' playback.

Another feature of the multiplexer is the ability to simultaneously display a number of image
sources on to a monitor in various formats. However, the more images are displayed, the
smaller and less visible each picture will be.

Digital Video Recorder (DVR)

A Digital Video Recorder (DVR) is a machine which can accept a number of video input
signals, record them in digital format and store them on a hard drive. The industry specialists
have recognised that DVR’s are much more effective than VHS systems and many systems
are being upgraded to digital.

The advantages of DVR over VHS;


• Video signals compressed in to digital storage
• Audit trail provided by ‘hard drive’ memory
• No VHS tape cassettes.

As no VHS cassette tapes are used, there is therefore:


• No tape rotation
• No need for tape storage
• Reduced written audit trail
• Valuable space is more available as multiplexers can manage multiple inputs.

DVR’s also allow systems to benefit from improved technology such as motion detection and
programmed remote operation.

Finally, a major improvement is the production of media copies. VHS tape copies can only
be recorded in real time. DVR’s create copies much quicker by ‘downloading’, ‘burning’,
images to discs using ‘bits’ and ‘bytes’. The greater the capacity of the hard drive, the
quicker the copy is produced, but it must be remembered that any printed or displayed
media image created from the original data will always be defined as a copy.

Video Recorder

Every CCTV system should be able to record all of the pictures seen by all the cameras all
the time. This means that there will often be a number of recorders in the system to be able
to achieve this.

Time lapse video recorders are now available to record from 3-hour mode (real time) to 960
hour (40 days). These allow pictures to be recorded over a much longer period than the
normal 3 hours of a standard 180 minute tape, by only recording a small percentage of the
picture or frames received.

Therefore a tape recording in 6-hour mode will record half the number frames per hour than
a tape that is recording in 3 hour/real time mode. The time-lapse mode used is normally
determined by the shift patterns used by the operators. For example, if operators are
working 9 hour shifts then the recording mode should ideally be 12 hours. The event

© BIIAB May 2011 - 32 -


recorder(s) will be linked to the spot or event monitors, which will allow real time recordings
of individual images being displayed on the monitors.

Recording Images

Although there are many different CCTV systems in operation, most have a recording facility
linked to a computer system. This computer system will either be recording all of the time or
the operator will activate them once an incident is discovered. Regardless of the system in
place it is essential that the operator is aware of what to do to correctly in order to record the
incident which is unfolding.

The assignment instructions will detail what action an operator has to take in order to
reproduce images for evidential purposes. As for who can reproduce any of the images that
are captured, this may be limited to being a supervisor or designated operator. This is
usually the case with digital recordings, in order to reduce the risk of interference with an
original image.

Degausser

This is a piece of equipment that is use to delete images from analogue video tape by
interfering with the magnetic field on the tape and leaving previously stored data
unrecoverable.

4.3 Using Technology

CCTV systems use a number of different technologies to enhance the service offered by the
control room. Some of these include:

• Automatic Number Plate Recognition (ANPR) or Vehicle Number Plate Recognition


(VNPR), help to track vehicle movements across an area, in real time. This helps to
manage traffic congestion, but can also be used to locate specific vehicles if required
to do so by the police
• Visual or face recognition technology, also know as biometrics, is a system that
matches the characteristics of a face to identify or verify an individual. If the CCTV
operator witnesses or suspects an individual of suspicious behaviour, the camera is
used to capture an image of the face, which is then processed and analysed to
identify the biometric characteristics. If required, the characteristics of that individual
are then stored. When identification or verification of a person on camera is
requested, the image of their face is compared to entries in the database.
Identification or verification is successful when the image characteristics match with
an entry. Face recognition is currently widely used in access control and criminal
detection areas. However this technology only works on a system which has the
appropriate specialist software installed
• Digital recording equipment.

4.4 Interaction with Third Parties


It is important that the CCTV system and staff interact effectively with other agencies to
obtain or provide the best value service. The CCTV operator will interface with a range of
agencies and organisations, including:

• Police, Immigration, HM Revenue & Customs, Port Authorities


• Health & Safety Executive
• The media

© BIIAB May 2011 - 33 -


• Ambulance and Fire Service
• Other prosecution agencies.

Clearly the common interface is with the police and almost every CCTV system has a
dedicated video link with either the force headquarters control room or the local police
station. This will allow police officers to view live images and deploy their staff to incidents
and instruct staff through their own radio systems.

There are many reasons why it is important to have dedicated communication links with third
parties. For example it:

• Improves communication and ensures that information is passed on quickly and


accurately
• Provides a secure link which protects confidentiality
• Allows third parties to quickly take command and control of an incident when
required.

© BIIAB May 2011 - 34 -


5 Using CCTV Equipment Effectively
By the end of this session:

The learner will understand how to make effective use of CCTV equipment and will be able
to:

• Identify the main types of incidents that a CCTV operator may assist with
• Identify typical crime hot spot locations
• Describe how local crime and disorder issues affect CCTV operations
• Explain how CCTV operators interact with third parties during an incident
• Identify the appropriate options available to the CCTV operator when the law is
broken
• Identify ways in which the CCTV operator can assist the statutory enforcement
agencies
• Describe how to recognise an improvised explosive device (IED)
• Explain how CCTV can assist external agencies during a bomb alert
• Explain the reasons for and methods of target selection including equality issues

5.1 CCTV Incidents

The dictionary definitions of ‘incident’ are:

• An event, an occurrence or a hostile clash


• A public event causing trouble
• A detached event attracting general attention
• A distinct piece of action.

For a CCTV operator in the private security sector, these may include:

• A fight, or crime
• An accident, an emergency (a non-crime incident)
• A suspicious act, person or vehicle.

A CCTV operator may witness such crimes as:

• Shoplifting: a person commits theft if they dishonestly take property belonging to


another person with the intention of permanently depriving the owner of it
• Burglary: a person commits burglary if they enter any building or part of a building as
a trespasser either with intent to commit theft, GBH, rape or damage, or having
entered as a trespasser, they then steal or attempt to steal or cause or attempt to
cause GBH
• Theft of and from vehicle and Taking a vehicle Without the Owner’s Consent
(TWOC): Stealing a vehicle or stealing things from a vehicle constitutes theft.
However, because vehicles are commonly ‘dumped’ by the offenders, the ‘intention
to permanently deprive’ is difficult to prove. Therefore, the offence of TWOC was
created. Also, because it is difficult to prove a person acted as an accomplice, the
following offence of ‘allowing oneself to be carried on a TWOC vehicle’ is created

© BIIAB May 2011 - 35 -


Non-crime incidents may include:

• Traffic – either general monitoring of traffic flow or specific monitoring of an incident


• Emergencies – fire or monitoring evacuations in the event of bomb threats or other
emergencies
• Missing persons – CCTV operators may be asked to keep a look out for a named
individual who has gone missing.
• Accident – an accident may result in a claim for compensation, such as a pedestrian
falling on a footpath, subsequently requiring media copies to be produced by the
Local Authority, by the subjects themselves or their solicitors
• Trespass – trespass can be a problem common to many. CCTV can provide
effective support for a patrolling Security Guard who acts in response to the incident

© BIIAB May 2011 - 36 -


5.2 Typical Crime Hot Spot Locations
LOCATION SHOPLIFTING BURGLARY THEFT VIOLENCE ROBBERY CRIMINAL DRUGS ANTI SOCIAL SAFETY
ASSAULT DAMAGE BEHAVIOUR ISSUES

Town centre HIGH LOW HIGH LOW LOW LOW MED MED HIGH
Daytime

Town centre N/A HIGH MED HIGH MED HIGH HIGH HIGH HIGH
Night (with shops
closed)
Rear of building N/A LOW LOW LOW LOW LOW LOW LOW MED
whilst in
Operation
Rear of building N/A MED MED MED LOW HIGH MED MED LOW
after hours

Car park N/A LOW HIGH LOW LOW HIGH MED LOW MED

Pubs/night clubs N/A LOW HIGH HIGH HIGH HIGH HIGH HIGH HIGH

Shopping N/A HIGH MED MED MED HIGH HIGH HIGH MED
precincts after
dark (with shops
closed)
Factory / N/A MED LOW LOW LOW HIGH LOW LOW LOW
commercial
premises
After closing

© BIIAB May 2011 - 37 -


Sometimes the localised nature of crime and disorder can have a direct bearing on
CCTV operations as the police or other enforcement agencies may request operators
to concentrate on particular areas during their monitoring. This does not mean that
operators do not continue to perform general monitoring, but is does mean that ‘hot
spots’, places where crime is more likely to occur, are monitored more closely.

The table on the previous page identifies common ‘hot spots’ for particular types of
criminal activity. Knowing where these hot spots are is important for CCTV operators
as they are likely to need to focus their attention on such areas in order to detect and
prevent crime and to protect public safety.

As the table shows, hot spots change depending on the time of day and the type of
crime. For example, a car parked on an industrial estate on a weekday during
working hours is unlikely to be subject to car crime. However, the same vehicle
parked in the same place at night or over the weekend when there are no people
around is a target for theft and also for joy riders.

With town centres hot spots will also change depending on the time of day. For
example, most pubs are not hot spots for crime on weekday lunchtimes. However, at
1.00 am on a Saturday night, things can be very different with the area directly
outside the entrance to the pub being the focus of any trouble.

5.3 Witnessing an Incident

If a CCTV operator observes a crime or incident in progress, they should carry out
the following actions:

• Use real time recording


• Note the time
• Make every effort to ensure the continuous viewing of the offenders actions,
or the incident
• Inform police by monitor, radio and/or telephone
• Search methodically for the incident using the cameras
• Maintain contact during the incident so that the police can pass on
instructions as required
• Obtain the best identification images possible
• Request a colleague to assist if available
• Radio for security assistance if available and applicable
• Retain suspect in view for continuity
• Do not stop recording when the police arrive
• Complete logs.

There will be occasions when you will be required to deal with more than one incident
at the same time. When there is only one operator on duty this can be challenging.
For example, there may be two simultaneous incidents that both require action by a
CCTV operator, and there is only one incident recorder.

The actions to take are:

• Use real time recording on the incident monitor - this provides enhanced
images which are more useful as evidence
• Let the police advise which incident takes precedence

© BIIAB May 2011 - 38 -


• Try to keep the second incident action on camera so that this would be
recorded in time lapse mode
• Use a second close viewing monitor for second incident
• Switch or resume recording when one incident finishes
• Enter log records on completion.

The same situation will require different actions if there are more than one incident
recorders:

• Ensure real time recording on two monitors


• Police will advise which incident has priority
• Display the incidents on adjoining monitors
• Change from real time recording when the incident finishes
• Complete log records.

Digital systems can alleviate some of the issues of dealing with multiple incidents.
Computer-based hard drives provide a greater storage ability, recording all the
images produced by all of the cameras. Whilst operators may be challenged to
manage continuous camera coverage, at least all the images produced by all
cameras may be continuously recorded.

5.4 Assisting Other Agencies

The CCTV operator provides a very useful service to statutory enforcement agencies
through their ability to monitor a wide area and detect the potential for criminal
activity. They also assist greatly in managing incidents, through the surveillance and
tracking functionality of the CCTV system and network of cameras available.

Some agencies which commonly make use of CCTV operators are:

• The police – mostly for the prevention and detection of crime. CCTV
operators often spot potential trouble and by pre-warning the police can
prevent escalation. As covered earlier in these learner materials, the police
also use CCTV in specific, targeted operations
• The emergency services – CCTV is an invaluable tool in emergency
situations. It can be used to monitor the movement of people and vehicles to
allow fire and ambulance crews to operate in the most efficient way possible
to protect public safety and reduce harm. A CCTV operative’s knowledge of
evacuation procedures and camera locations is also be invaluable during an
emergency situation
• HM Revenue and Customs, Immigration and the Port authorities – tackling the
trafficking of people, drugs and other contraband is a constant battle for these
agencies and CCTV is very important to enable the tracking of suspects and
the provision of evidence.
• Local Authority – Highways issues. Traffic monitoring. Accidental injury claims

5.5 What Makes Someone a Target for Surveillance?

Body language is a very useful method for anticipating incidents and/or criminal acts,
especially as the audio capability of cameras is not used and therefore the operator
cannot hear verbal exchanges that might be happening out in the street.

© BIIAB May 2011 - 39 -


For example, space management can help operators ‘read’ a situation. Generally
people only let those they trust get close to them and instinctively react when others
enter their ‘intimate’ or ‘personal’ spaces un-invited or unexpectedly. However, there
are times when an ‘invasion’ of this space is acceptable, such as in queues or in
crowds.

The main body language indicators to look for are:

• A person hiding could mean that they are under physical threat, have been
involved in a fight, or are hiding from authorities due to criminal activity
However, it could b something quite innocent, such as someone playing or
avoiding somebody that they do not want to meet. The operator should scan
the environment to determine who might be searching for the person,
therefore determining whether any further action is required
• Staring could be a sign of aggression. It could be a question of checking out
activity in the immediate location perhaps for criminal activity. The operator
should check out what they are staring at and try to identify why they are
staring
• An aggressive stance could be the sign of impending trouble. Is the
aggressive stance focused at a particular subject or group of people?
• If a person has a defensive stance, the operator should try to determine if the
person is under imminent threat and if so, from what?
• Someone running fast could indicate a misdemeanour or perhaps that the
person is under threat. It could also mean that they are late for the bus. The
operator should observe if anything is being carried and try to identify what
the person is running from, or perhaps to
• A person looking behind them often could be the result of guilt or fear. It
could also be because the person is nervous or uncertain or perhaps even
aware of their own security or vulnerability. Again, the operator should try to
identify the reason for this action
• Exaggerated actions to show innocence could be the result of having
undertaken a misdemeanour. The CCTV operator should try to ascertain
whether there is any activity around the person that would indicate that they
have been involved in a misdemeanour
• Someone taking a repeated route on foot could be walking backwards and
forwards past a potential target. Remember, this might be undertaken over a
short or an extended period of time, perhaps even a few weeks
• Someone taking a repeated route by vehicle, meaning that they are leaving
and returning to the same or similar location, again, over a short or longer
period, could mean that they are ‘staking out’ a target or checking a get away
route
• If close observation is undertaken, quick eye movements may reveal: fear;
agitation, or that the person is getting ready to escape. Other facial
movements should also be observed, such as muscle movements for fear or
anger.

© BIIAB May 2011 - 40 -


5.6 Close Surveillance and Tracking

When carrying out close surveillance it is important that the operator is aware of a
number of points that may impact on that particular operation:

• Why? What is the reason for close surveillance


• Where? Is the surveillance across a public or private area, or a static
location
• When? Does the time of day, or day of the week affect the reasons
• How long? Will the surveillance be over a period of time? If so, for how
long?

Then the operator needs to decide, if the surveillance will be proactive, zoomed in
close onto the target, or if the camera will be in a parked position at a particular
location to record movement.

5.7 Improvised Explosive Devices or IEDs

IED’s are commonly connected with terrorist action. Terrorist crime is a major global
issue, practised by individuals or groups seeking to promote their political, religious
or ideological aims. Despite increased concerns about terrorism it is important to
keep the threat in perspective.

Fortunately violent terrorist incidents are rare and for most of the population,
terrorism will only remain something seen or heard about in the news.

However, CCTV systems can play a major role in the fight against terrorism and
operators should be constantly alert to associated terrorist activity.
An IED can be almost anything with any type of material and initiator. It is a
‘homemade’ device that is designed to cause death or injury by using explosives
alone or in combination with toxic chemicals, biological toxins, or radiological
material. IEDs can be produced in varying sizes, functioning methods, containers,
and delivery methods. IEDs can utilize commercial or military explosives, homemade
explosives, or military ordnance and ordnance components.

They are unique in nature because the IED builder has had to improvise with the
materials at hand. Designed to defeat a specific target or type of target, they
generally become more difficult to detect and protect against as they become more
sophisticated

The major approaches for those wishing to use an IED are:

• Concealment of the device in an object such as a bag or pipe and planted into
position
• Inclusion in a letter or package bomb sent or delivered
• Device placed inside a vehicle
• Explosives strapped to an individual (suicide)
• Projected missile.

© BIIAB May 2011 - 41 -


IEDs can gain be taken into a control room by being:

• Smuggled in and planted


• Walked in
• Posted in.

An IED can generally be recognised through these main identifiers:

• Grease marks on wrapping if wrapped


• Unusual odour (although this is not guaranteed)
• Visible wiring
• Unusual sound (although this is increasingly unlikely).

Mailed IED – Letter bombs

Operators should be suspicious of letters and packages that:

• Have an uneven weight distribution


• Are heavy for their size
• Are from an unknown source or have no return address
• Have excessive wrapping
• Have the address written with poor spelling or handwriting
• Where the addressee does not normally receive mail at that address
• Have an unidentified person call to ask if the letter or package had been
received.

5.8 Target Selection

CCTV operators will encounter many different situations that require them to make
quick decisions on which action to take and whether or not it is necessary to report
the matter to other agencies. You will also have to decide if the persons involved or
vehicles used have been identified previously as targets and whether or not it is
necessary to track them using the CCTV system.

The following are examples of situations that may arise:

• A stationary vehicle is only suspicious if it is in a sensitive location; is an


unusual vehicle for the environment; the departure of the occupants gives
grounds for suspicion; if the vehicle is parked strangely; if the vehicle has
exceeded its parking period, or is a particular type of vehicle that the police
are monitoring. A stationary vehicle could be the transportation for a bomb; an
abandoned stolen vehicle or be one that has been involved in a criminal
offence. Alternatively, it could be an entirely innocent situation
• A person appearing to be drunk, may actually be drunk. Alternatively the
person might be ill and in need of assistance. The operator may observe and
monitor the reaction of others to the person concerned or, if they are alone,
the person should be monitored for safety purposes
• People in a store doorway after closing could indicate burglary, drug activities
or indecency (sexual activity); alternatively the people concerned might be
window shopping or seeking shelter. The operator should monitor the
situation and the body language of those concerned

© BIIAB May 2011 - 42 -


• A person or persons running could indicate: criminal activity; minor
misdemeanour, or actual/threat of violence. Alternatively it could indicate that
the persons are late for an appointment or perhaps playing
• Smoke or flames, if out of the ordinary, could indicate an emergency, or it
could be a controlled process. The operator should monitor the situation and
call the emergency services if there is any doubt
• A crowd of people gathering could indicate an accident, a fight or somebody
being taken ill. It could also be a street entertainer. The operator should
observe and make a judgement on the situation
• A person wearing an oversized coat could be concealing stolen items,
offensive weapons or perhaps even be involved in potential terrorist activity.
Alternatively it could be a matter of fashion, personal taste or the weather!
The operator should monitor body language and where the person is going
• A group gathering round a person who leaves a store might indicate theft. It
could, however be friends sharing purchased goods or peer interest in
legitimate purchases. The operator should observe the body language of
those involved and monitor any items changing hands
• Many people visiting a person or vehicle could indicate drug dealing or the
distribution of stolen property, or it could just be part of a social gathering. The
operator should observe the actions of the participants and monitor any items
that might be changing hands
• A person or people loitering close to a cash machine could indicate the
intention of robbery or fraud. Alternatively, it could be entirely innocent. The
operator will need to make a judgement on the body language of those
involved
• Someone observing police or security officers could be an indication of
current opportunist or planned criminal activity, but could also be entirely
innocent.

5.9 Equality during Observation

Even before the Human Rights and Data Protection Acts came into force, equality
was an important factor for all CCTV operators to be aware of and practice when
performing CCTV monitoring duties. The SIA Standards of Behaviour for CCTV
operators highlights this particular point and makes it a condition of employment.

However, although it is important to be committed to equality, do not become unsure


about what and when you may view, which would weaken the value of CCTV
surveillance.

Aspects to be mindful of include:

• Gender: concentrating on either men or women because of the way that they
look, or as a result of their sexuality, is not part of the job. CCTV systems
were installed to reduce crime and increase public safety, not to help spot
particular types of individual. If this happens, that individual’s privacy has
been invaded for no legitimate reason, and security has been reduced as the
wider environment is then not being monitored
• Ethnicity: a person’s national origin. People should not be treated any
differently as a result of their ethnicity
• Religion: followers of some religious groups are easily identified due to the
clothes that they wear. Again, these people should not be treated any
differently

© BIIAB May 2011 - 43 -


• Clothing: many different fashions provide the ‘uniform’ to be worn by those
who are intent on causing trouble, violent behaviour and/or committing crime.
Historically these have included: mods and rockers, punks, members of the
National Front, animal rights activists, hoodies, yardies etc. There is nothing
wrong in zooming into these people to record the time, date, location,
description, association with others, when first located, but if no suspicious
behaviour takes place, justification to continue close observation will be
difficult to prove and routine camera patrols should resume. There is no harm
in returning to review the situation but they should not be followed unless a
justifiable request is made by the police
• Age: there is nothing wrong in zooming in on groups of young people to
record the time, date, location, description, association with others, when first
located, but if no suspicious behaviour takes place, then continue patrolling
with the cameras. There is no harm in returning to review the situation but
they should not be followed unless a request is made by the police. When
systems view very young people, operators must give consideration to
actions that may be considered inappropriate
• Previous convictions: even if it is known that a person in view has previous
convictions, this is not a reason to follow them using the camera system. If,
however, it is known that the person has convictions for thefts from cars and
you spot them in a car park or close to parked cars on the street, that may be
a reason for observing that person over a longer period. Remember, though,
that these actions may have to be explained in the future.

The important thing to remember is that the actions or locations of the subject will
determine the period of monitoring, but be aware that it is not necessary to stay
zoomed into the subject unless there is a real need to gather evidence.

Remember! The recording system will provide a record of that close


monitoring and you may be required to give reasons for your actions.

© BIIAB May 2011 - 44 -


6 Emergency Procedures
By the end of this session:

The learner will understand emergency procedures in the CCTV control room and will
be able to:

• State actions to be taken in the event of an access control systems failure


• State the actions to be carried out following receipt of a telephone call
warning of a bomb in the CCTV control room
• State the actions to be taken if a suspicious object is found in the CCTV
control room
• State the actions to be carried out if an evacuation is ordered
• State the procedures to be followed on re-occupying the CCTV control room
after an evacuation

6.1 Failure of Access Control System

In the event of the access control system failing, the first thing that a CCTV operator
should do is to report to their manager and then monitor all external access points.
Other detailed access control systems failure procedures will be laid down in the
assignment instructions, and may include any or all of the following:

• Inform the police of the system failure


• Informing other members of the CCTV team
• Switch off all monitors
• Follow procedures with regards to checking and/or resetting fuses
• Re-boot the system
• Inform the system maintenance company
• Conduct face-to-face checks to establish authorisation to access the site
• Record the situation and actions in the daily log book.

6.2 Bomb Threats

It is unlikely that you or the control room in which you operate will receive a bomb
threat, however, your response will be critical in the event of such an occurrence.

There are essentially three classifications of bombs, or explosive devices:

1. Bombs that cause blasts


2. Bombs that cause fire
3. Bombs that cause blasts and fire.

There are also hoax and/or threat situations.

© BIIAB May 2011 - 45 -


Receipt of a telephone bomb warning

If a telephone call is received that warns of a bomb in the control room or


surrounding area, the response of the person taking the call is critical. Professionally
produced documents, approved by The National Counter Terrorism Security Office
(NacTSO) which helps operators to record relevant information are commonly
available in control rooms. However, if you receive such a call, you should:

• Ask the caller:

- When the device is due to go off - this must be the first question asked so
that valuable time is not wasted
- Where the device is located - so that it can be found swiftly
- What type of device it is and how will it be detonated - this will assist the
emergency services in dealing with the device
- Why they are doing this - information that can be used by agencies to
evaluate the validity of the call
- If they have a code - some extremist groups will give a code or a coded
warning to the intended victim, which assists in identifying the
perpetrators and assessing the authenticity of the threat

• Take note of:

- Is the caller male or female?


- Do they have a regional or foreign accent?
- Are there any identifiable background noises?
- Are they using a pay phone?
- Were names used during the call?
- During or after the call the number of the phone used to make the call
may be obtained by the on screen display on the telephone or by dialling
1471. Take careful note of the number if obtained, but under no
circumstances call that number. Mobile phones can be used to detonate
IEDs.

Handy hints

Do:
• Remain calm at all times
• Ask the caller all of the above questions
• Make notes as the call takes place
• Call 999 if the situation is an emergency
• Contact your ‘Security Co-ordinator’ in accordance with procedure
• Evacuate in accordance with procedures

Don’t:
• Become aggressive with the caller
• Treat the call as a hoax
• Try to find the device
• Use your radio or mobile phone until the all clear has been given
• Handle or move the device if it is in view
• Cause panic when raising the alarm
• Evacuate the area until authorised or advised to do so

© BIIAB May 2011 - 46 -


6.3 Searching the Area

If it is deemed safe that a CCTV operator becomes involved in a search, the


search should be planned and undertaken in a specific manner.

The CCTV operator should:

• Be familiar with the layout of the building or area that is being searched
• Be aware of what they are searching for
• Not alter existing environmental conditions
• Listen for suspicious sounds and be aware of unusual smells
• Be systematic by searching from floor to waist, waist to chin and then chin to
ceiling, in a pattern that covers the whole of the area concerned
• Be aware of the possibility of concealment in false ceilings and floors
• Inspect wall hangings, plants and other decorations
• Not use mobile phones or radio equipment.

Actions that must be taken if a suspicious object is encountered:

• Do not move it or touch it


• Leave a distinct marker and move away
• Inform your supervisor
• Initiate evacuation of the area, dependent on procedures
• Provide details of the device to the NacTSO representative or the police
• Be available to the police and/or bomb squad.

6.4 Evacuating the Control Room

There will be clear instructions to follow when an emergency occurs in your control
room. This may be as simple as evacuating the area and assembling at the
evacuation point with others. However, a CCTV operator may be more directly
involved in the event. The evacuation routes and assembly points will be clearly
identified in the control room’s operating procedures or assignment instructions.

If you are allocated a task in the event of an emergency situation occurring, it is


important that it is carried out effectively and in a timely way. Carry out the task fully,
step-by-step.

Remain focused on the instruction and do not attempt to carry out other tasks.

On evacuation of the control room:

• Follow instructions
• Undertake any task that has been allocated to you
• Ensure that you know the evacuation procedure
• Proceed to the assembly point
• Remain composed, do not run, do not shout
• Assist others where appropriate and safe to do so.

© BIIAB May 2011 - 47 -


When the evacuation of an entire building or site is required, CCTV operators also
need to evacuate by the approved routes and go directly to the designated assembly
points. Under no circumstances should they continue to monitor the
situation/evacuation or wait for the emergency services to arrive before they
evacuate. This could put the safety of the CCTV operator at risk.

6.5 Re-Occupying the Control Room

Once the authority in charge has given the all clear to return to the control room,
there will be an established set of procedures for re-activation. These procedures
are likely to include the following:

• Determine the systems operational status and conduct a full fault finding
routine Re-establish police control contact
• Undertake a new search to determine current situation
• Review recorded data for any unusual occurrences that might have happened
during the period of evacuation
• Update logs to show the elapsed time since the evacuation.

© BIIAB May 2011 - 48 -


Learning Outcomes and Assessment Criteria

Working as a CCTV Operator

Learning Outcomes Assessment Criteria

The learner will: The learner can:


1.1 Identify the purpose of codes of practice,
1. Understand CCTV Codes of operational procedures and guidelines
Practice, Operational
1.2 Identify the impact of codes of practice,
Procedures and Guidelines
operational procedures and guidelines on
CCTV operations.
1.3 Identify the value of codes of practice,
operational procedures and guidelines to
partners, agencies and the public
1.4 Explain the term “confidentiality” as it applies
to the role of a CCTV operator
1.5 State why the control room is kept as a secure
environment
1.6 Identify the key features of access control
systems
1.7 State the requirements for dealing with
authorised and unauthorised visitors to the
CCTV control room
1.8 Describe the operator’s responsibilities within
the SIA Standards of Behaviour for CCTV
Operators
2. Understand relevant Legislation 2.1 Identify how Data Protection legislation
and how it impacts on CCTV impacts on the role of the CCTV operator
operations
2.2 Identify how Human Rights legislation impacts
on the role of the CCTV operator
2.3 Identify the different types of surveillance
described by the Regulation of Investigatory
Powers legislation
2.4 State how the main provisions of Regulation of
Investigatory Powers legislation impact on
CCTV operations
2.5 Identify authorisation levels required for
surveillance operations under the Regulation
of Investigatory Powers legislation
2.6 Explain the main provisions of Freedom of
Information legislation
2.7 State how Freedom of Information legislation
differs from Data Protection legislation

© BIIAB May 2011 - 49 -


Learning Outcomes Assessment Criteria

The learner will: The learner can:


2.8 Identify how Display Screen Regulations
impact on the role if the CCTV operator
2.9 Identify the causes, key indicators and means
of alleviating stress

3. Understand the Roles and 3.1 Describe the purpose of a CCTV system
Responsibilities of the CCTV
3.2 Identify the main roles and responsibilities
Operator and other CCTV Staff
within a typical CCTV control room team
3.3 State the importance of accurate and timely
communication up and down the reporting
chain
3.4 Explain the importance of sharing information
between the team and other agencies
3.5 Explain the importance of the continuity of
evidence
3.6 Identify the responsibilities of the operator to
produce statements and give evidence in court
3.7 State the importance of accurate and detailed
note taking and record keeping

4. Understand the characteristics 4.1 Identify the main components of the CCTV
of a CCTV system system
4.2 Describe the main types of CCTV cameras
and mountings
4.3 Describe how technologies such as ANPR,
Biometrics, Visual Recognition, Digital
Recording are used with CCTV equipment
4.4 Explain the importance of dedicated
communication links with third parties
5. Understand how to make 5.1 Identify the main types of incidents that a
effective use of CCTV CCTV operator may assist with
equipment
5.2 Identify typical crime hot spot locations
5.3 Describe how local crime and disorder issues
affect CCTV operations
5.4 Explain how CCTV operators interact with third
parties during an incident
5.5 Identify the appropriate options available to the
CCTV operator when the law is broken

5.6 Identify ways in which the CCTV operator can


assist the statutory enforcement agencies

© BIIAB May 2011 - 50 -


Learning Outcomes Assessment Criteria

The learner will: The learner can:


5.7 Describe how to recognise an Improvised
Explosive Device (IED)
5.8 Explain how CCTV can assist external
agencies during a bomb alert
5.9 Explain the reasons for and methods of target
selection including equality issues
6. Understand Emergency 6.1 State actions to be taken in the event of a
Procedures in the CCTV access control systems failure
Control Room
6.2 State the actions to be carried out following
receipt of a telephone call warning of a bomb
in the CCTV control room
6.3 State the actions to be taken if a suspicious
object is found in the CCTV control room
6.4 State the actions to be carried out if an
evacuation is ordered
6.5 State the procedures to be followed on re-
occupying the CCTV control room after an
evacuation

© BIIAB May 2011 - 51 -


Learning Outcomes and Assessment Criteria

Practical Operation of CCTV Equipment

Learning Outcomes Assessment Criteria

The learner will: The learner can:


1. Be able to operate CCTV 1.1 Carry out functional checks of the CCTV
Equipment system
1.2 Explain equipment fault reporting procedures
1.3 Demonstrate appropriate use of keypads and
joysticks to operate cameras, monitors and
associated equipment
1.4 Demonstrate how to overcome poor weather,
lighting and positioning
1.5 Produce images of sufficient quality for
evidential purposes
1.6 Record images onto storage media in an
evidentially sound manner
1.7 Complete relevant documentation associated
with an incident
2. Be able to demonstrate 2.1 Demonstrate correct radio procedures with a
operational use of a CCTV third party
System
2.2 Explain how to work with the control room
team to deal with multiple incidents
2.3 Identify body language and behaviors that
could indicate unusual or suspicious activity
2.4 Give clear and accurate descriptions of
people, vehicles and events
2.5 Locate and track a suspect who is on foot or in
a vehicle
2.6 Use cameras to view a suspect entering or
leaving an area
2.7 Carry out lost contact drills
2.8 Use cameras to search the outside of
buildings, streets and open spaces for
suspected IEDs

© BIIAB May 2011 - 52 -

Potrebbero piacerti anche