This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • Building AppSec in Enterprises
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Leveraging Surveillance Technologies for Safer Cities
Video SurveillanceColumns

Leveraging Surveillance Technologies for Safer Cities

Most U.S. cities are currently experiencing historic lows in crime rates.

Safe City
Safe City
Safe City
Safe City
September 1, 2014
Bob Liscouski
KEYWORDS Atlanta Operation Shield / city security / citywide surveillance / Safe City surveillance
Reprints
No Comments

Most U.S. cities are currently experiencing historic lows in crime rates. However, at a time of shrinking budgets and resources, evolving threats such as acts of terrorism and natural disasters challenge cities and local law enforcement to achieve and maintain low crime rates.  

Innovative surveillance methods and technologies can provide targeted and more cost-efficient services that build safety and security capabilities and measurable success.  As city budgets are always tight, the acquisition of high-technology surveillance and security systems has been out of reach for most communities.  

However, creative public-private partnerships make it possible for communities to have access to surveillance technologies and analytics. A shining example is Atlanta’s Operation Shield, a partnership between the Atlanta Police Department and the Private Sector that has provided close to 5,000 cameras to be deployed from private sector and public sector participants to create a Safe City. (Read more about Operation Shield on page 42.)

So what constitutes a “Safe City?”  While there is no specific formula for Safe City best practices, there are baseline capabilities that public safety jurisdictions should start with. 

 

Security Cameras

Safe City initiatives typically start with the integration of security video. In most cases the cameras are operated by the police department or other local government entities such as Departments of Transportation, or Emergency Operations Centers. Increasingly, cameras are not limited to those controlled by government institutions.  More and more, private companies and commercial entities are using surveillance technologies and are increasingly providing law enforcement with  access to their cameras to increase domain awareness on public streets. 

 

Information-Driven Policing

However, cameras only provide a “static” view and can only do so much. This means that operators have to be directed independently if they are not continuously monitoring the camera feeds, and there is no protocol to initiate an “alarm” in the event of an incident.  Camera feeds coupled with additional technology has allowed more  monitoring centers to evolve to a “response mode” in which alarms or visual/video analytics direct operators to a camera in order to view real-time events.

Even with smarter monitoring, surveillance alone has in the past been limited to a reactive action – perpetrators still have the advantage.  Today there is an opportunity, more than any time in history, to integrate data correlation, analysis and predictive indicators to actually predict and prevent crime. Information-driven policing efficiently and effectively integrates camera and sensor technology with social media and big data analytics to enable a more predictive approach to security and policing.

Information-driven policing combines the power of big data, with social media analysis, license plate readers, geo-spatial location and correlation, facial recognition cameras, gunshot detectors and CBRNE (chemical, biological, radiological, nuclear, explosive) sensors to give police and private security forces the “knowledge advantage” to interdict crime before it becomes serious or to appropriately respond to a crime armed with a full understanding of all aspects of it. The challenges of today’s environment in which political and law enforcement leadership face man-made and natural disasters are in fact opportunities for a city to bring stakeholders together, create platforms for collaboration and information sharing, and identify efficiencies and cost savings.  

 

About the Author: Bob Liscouski has more than 30 years of experience in security and law enforcement, and is the founder and Managing Partner of Integrated Strategies Group. Liscouski and ISG have founded four additional firms  – Steel City Re, Edge360, Axio Global and Convergent Risk Group. 

Subscribe to Security Magazine

Recent Articles by Bob Liscouski

10 Factors to Assess Your Integrator's Cyber Skills

Using Continuous Evaluation to Thwart Insider Threats

Crowd-Sourced Surveillance: A Public Threat or a Public Service?

Finding the Right Technology to Unlock Cloud and Mobile Surveillance

How to Use Smarter Surveillance to Close Intelligence Gaps

Liscouski-200px

Bob Liscouski has more then 30 years of experience in security and law enforcement, and he is the Executive Vice President of Integrated Strategies Group. Liscouski and ISG have founded four additional firms — Steel City Re, Edge360, Axio Global and Convergent Risk Group.

Related Articles

Right-Sizing Technology for Agile Surveillance Success

Finding the Right Technology to Unlock Cloud and Mobile Surveillance

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

cybersecurity breach

The Top 12 Data Breaches of 2019

ransomware-enews

British American Tobacco Suffers Data Breach and Ransomware Attack

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

Major Retailer Macy's Is Hacked

server room, cybersecurity, penetration testing,

Explained: Firewalls, Vulnerability Scans and Penetration Tests

SEC1219-Cover-Feat-slide1_900px

Contracted vs. In-House Guarding: No Universal Right Answer

SEC2019_Everbridge_1119_360x184customcontent

Events

December 17, 2019

Conducting a Workplace Violence Threat Analysis and Developing a Response Plan

There are few situations a security professional will face that is more serious than a potential workplace violence threat. Every security professional knows and understands that all employers have a legal, ethical and moral duty to take reasonable steps to prevent and respond to threats of violence in their workplace.
January 23, 2020

The Value of a Unified Approach to Critical Event Management

From extreme weather to cyberattacks to workplace violence, every organization will experience at least one, if not multiple, critical events per year. And in today’s interconnected digital and physical world, the cascading safety, brand, and revenue impacts of critical events are more severe. Organizations need to be prepared through a unified and rapid response to these events.
View All Submit An Event

Poll

Emergency Communications

What does your enterprise use to communicate emergencies to company employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
SEC500_250x180 clear

Security Magazine

SEC-December-2019-Cover_144px

2019 December

This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing