Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Special Event? Go for Special Security

October 4, 2006
Security camera domes peppered the site of the Commonwealth Games’ opening and closing ceremonies, the Melbourne Cricket Ground (MCG). The system contained 350- cameras to monitor more than 70,000 people in the MCG, along with thousands of performers and around 600 people on the security staff.


Networked surveillance systems can be as complex as they are effective, and the sprawling solution that provided video surveillance for 6,000 athletes from 71 countries and tens of thousands of patrons for the 18th Commonwealth Games was highly ambitious. Linking not only several remote sites at the Melbourne, Australia-based Games, it also incorporated existing infrastructure and video surveillance solutions owned and managed by a number of different corporations and government departments.

The networked solution, comprising hundreds of cameras, was designed to do the essential work of securing venues, athletes and visitors. It combined new security video installations with existing surveillance systems to give organizers and security personnel unprecedented views and control during the 12-day event. Not only were there technical and organizational challenges, but also installation challenges from inception to commissioning, which needed to be completed in just three months

The Telstra Dome in Melbourne, Australia was home to many of the events at the Commonwealth Games.

SECURITY NO GAME

The centralized location of key venues and the many parallel cultural events turned the whole Melbourne Central Business District into a celebration – wonderful for those attending but the sheer size of the coverage area and the many venues made planning and executing a highly effective security system a major challenge. The eventual system combined a number of key remote elements controlled by a single user interface and a management solution running on multiple workstations in a central location.

The management software was the DVTel intelligent Security Operations Center, with its network video management component. Integrated camera surveillance of key sites included the 50-acre Athletes Village; the “Public Domain” area with the Melbourne Cricket Ground, which hosted the opening and closing ceremonies; and coverage for Vic Roads (the highway authority) and the Victoria Police Center. All video was feed into a central location called the Games Operations Center, or GOC, where cameras were monitored and in some cases, recorded.

The Office of Commonwealth Games (OCGC) oversaw management and coordination of all relevant government departments and corporations to deliver a successful event. The OCGC is not a technical entity so it chose a company with the technical expertise to ensure an effective, timely video surveillance solution: Communications Design and Management (CDM). CDM’s first job was to write bid specifications covering two key areas of the Games’ security system that did not yet exist: security video for the Athletes’ Village and the Public Domain.

Designing and installing the solution for the Public Domain area and buildings involved designing and building the GOC and its integrated pathway to Vic Roads and Victoria Police security video networks. What had been a proposed wireless solution for the transmission of video from the Public Domain cameras to the GOC was converted to transmission over an existing, dedicated 1GB LAN, delivering an abundance of bandwidth for exceptional video transmission and quality. Due to the system’s reliability, connectivity was never lost at any stage throughout the Games.

The Games Operation Center had an integrated connection, including security video, to the local police surveillance systems.

IT TAKES A SAFE VILLAGE

For the Public Domain, all the dome cameras were Pelco Spectra III SEs. The installation at the GOC included an internal 1GB fiber LAN for 50 operator workstations and six projector workstations and the storage unit with a two terabyte NAS. Video images from all of the Games’ and surrounding area cameras, as well as other data, would flow into the GOC.

At the Athlete’s Village, PTZ, fixed cameras and all related infrastructure were installed and integrated with the perimeter intrusion detection system. The 6,000 athletes and officials had to be protected by the highest possible security, including access control and a strong presence of security officers and police. There were fixed cameras at each of the entrances with Pelco PTZs and domes also used to protect fence lines.

The security video software enabled integration to the perimeter intrusion system; alarm triggers were handled by macro-programmed presets that linked events to PTZ cameras. If an alarm went off a camera would pop video to the screen and display the preset related to that alarm event.

Another vital aspect of the system was video analysis software, which was used to monitor the Village’s four access points for things like unattended baggage, loitering, and other activities. With redundancy of control, management and integration with the perimeter security systems, and video analysis, this was a complete end-to-end solution capable of meeting any security challenge. In terms of system performance, images were viewed and stored at 4CIF and 25 frames per second (PAL) locally, while offsite storage was at CIF and 20 fps.

“We don’t think anyone else has a dome system like this one,” said Simon Langdon, of Landmark Security. “Our installation used all the capabilities in terms of remote management, alarm interface and presets.”

The site of the opening and closing ceremonies, the Melbourne Cricket Ground’s 350-camera system played a significant role at the Commonwealth Games. There were more than 70,000 people in the MCG for the opening and closing ceremonies, along with thousands of performers, and around 600 security staff.

The opening ceremonies were held in the Melbourne Cricket Grounds, which was under surveillance thanks to a 350-camera system

FINAL ANALYSIS

A highly complex and integrated networked video surveillance system managing hundreds of cameras covering wide areas and protecting many thousands of people was successfully installed on time, and provided highly effective protection for 12 days of competition and entertainment.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Blog Logo

    Never Too Soon to Prepare for a Special Event

    See More
  • Special Events, Special Needs: Technology Teams Transportation, Safety and Security Agencies

    See More
  • Generic Image for Enterprise Services

    Baltimore Re-Evaluating "Special Police" Program for Security Officers

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!