Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Neighborhood Video Grows

August 1, 2007
Baltimore’s security video plan started as a relatively small initiative aimed at high profile tourist areas but has expanded to high-risk neighborhoods where about 275 look over city streets.


What started out as a relatively small video surveillance initiative aimed at high profile tourist areas has expanded to high-risk neighborhoods where about 275 cameras prevent and investigate crime on Baltimore’s streets.

Baltimore Mayor’s Office chose the equipment and the Baltimore Police Department operates the gear in six different locations, each dedicated to “pro-active monitoring” of suspicious activity. In addition to the neighborhood surveillance cameras, software also manages an additional 91 cameras - all wireless - in four Baltimore housing projects.

Many of the city surveillance cameras are also wireless, which was part of the appeal of the solution. “We don’t have optic fiber running under the streets once we expanded outside of downtown,” said Beth Hart, manager of CCTV for the Mayor’s Office of Information Technology. “We couldn’t be trenching for blocks and blocks, so the combination of wired and wireless technology was very appealing to us.”

All cameras are pan-tilt-zoom and located in high traffic areas. Each neighborhood is monitored at a dedicated monitoring station. Pro-active monitoring is done for an extensive amount of time each day and all cameras record 24 hours a day at 30 frames per second to maximize the effectiveness of post-event investigation.

PROACTIVE DESIGN

But post-event analysis isn’t the primary focus.

Hart commented, “We’re actively looking for suspicious activity and our monitoring personnel are skilled in knowing what to look for. Once they pick something up, they monitor live, as well as do playback, then they are in direct contact with officers called to the scene. When those officers arrive they receive as complete a brief as possible on what happened, who’s involved, and what possible next steps are.”

The system and the policy of pro-active monitoring are proving effective. Recently, a man was found dead in the street. Fortunately, a camera had been trained on the area and an investigation turned up video showing the incident and providing important information that lead to identification of the suspects. Numerous violent acts like his have been successfully investigated and are often caught live so monitoring personnel can effectively support police reaching the scene of an incident.

“On other occasions,” Hart continued, “the video has been advantageous in encouraging witnesses to cooperate. We know they were on the scene because we have video showing them at the incident.” Video surveillance has been used to monitor gang activity and identify license plates as well people involved in incidents.

“We have to be careful: Cameras aren’t the total solution, they are a tool. As the Police Commissioner has said, our goal is to deter crime, but if the cameras don’t deter it, then we want to use the video to solve crimes. The (security video) system has worked well, our operators are pleased.”

The city’s long-term goal is to change behavior, to make people realize if they commit crimes in these neighborhoods they will be caught. Thus far, the city’s program has been effective: Year-to-date violent crime has fallen 17 percent and just as important, false claims of excessive force have dropped as have false reports of crimes. These positive developments mean higher police productivity and more hours spent fighting crime. “When we have 25 cameras on an area, that’s 25 extra pair of eyes on the street," contended Hart.

About the Installation

The City of Baltimore works with DVTel in the development and delivery of intelligent security solutions over IP networks using the intelligent Security Operations Center. Systems integrator Tele-Tector of Maryland designed the dedicated fiber backbone and served as project manager, responsible for installation coordination with the various Baltimore City departments and sub-contractors.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Hail to the Chief -- 2017 Inauguration Day Security

    See More
  • Vision, Passion: When Good Isn’t Good Enough

    See More
  • Feature image, American Flag

    Proud To Be Security: How Roles Changed After 9/11

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing