Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsVideo Surveillance

Leveraging Surveillance Technologies for Safer Cities

Most U.S. cities are currently experiencing historic lows in crime rates.

By Bob Liscouski
Safe City
Safe City
Safe City
Safe City
September 1, 2014

Most U.S. cities are currently experiencing historic lows in crime rates. However, at a time of shrinking budgets and resources, evolving threats such as acts of terrorism and natural disasters challenge cities and local law enforcement to achieve and maintain low crime rates.  

Innovative surveillance methods and technologies can provide targeted and more cost-efficient services that build safety and security capabilities and measurable success.  As city budgets are always tight, the acquisition of high-technology surveillance and security systems has been out of reach for most communities.  

However, creative public-private partnerships make it possible for communities to have access to surveillance technologies and analytics. A shining example is Atlanta’s Operation Shield, a partnership between the Atlanta Police Department and the Private Sector that has provided close to 5,000 cameras to be deployed from private sector and public sector participants to create a Safe City. (Read more about Operation Shield on page 42.)

So what constitutes a “Safe City?”  While there is no specific formula for Safe City best practices, there are baseline capabilities that public safety jurisdictions should start with. 

 

Security Cameras

Safe City initiatives typically start with the integration of security video. In most cases the cameras are operated by the police department or other local government entities such as Departments of Transportation, or Emergency Operations Centers. Increasingly, cameras are not limited to those controlled by government institutions.  More and more, private companies and commercial entities are using surveillance technologies and are increasingly providing law enforcement with  access to their cameras to increase domain awareness on public streets. 

 

Information-Driven Policing

However, cameras only provide a “static” view and can only do so much. This means that operators have to be directed independently if they are not continuously monitoring the camera feeds, and there is no protocol to initiate an “alarm” in the event of an incident.  Camera feeds coupled with additional technology has allowed more  monitoring centers to evolve to a “response mode” in which alarms or visual/video analytics direct operators to a camera in order to view real-time events.

Even with smarter monitoring, surveillance alone has in the past been limited to a reactive action – perpetrators still have the advantage.  Today there is an opportunity, more than any time in history, to integrate data correlation, analysis and predictive indicators to actually predict and prevent crime. Information-driven policing efficiently and effectively integrates camera and sensor technology with social media and big data analytics to enable a more predictive approach to security and policing.

Information-driven policing combines the power of big data, with social media analysis, license plate readers, geo-spatial location and correlation, facial recognition cameras, gunshot detectors and CBRNE (chemical, biological, radiological, nuclear, explosive) sensors to give police and private security forces the “knowledge advantage” to interdict crime before it becomes serious or to appropriately respond to a crime armed with a full understanding of all aspects of it. The challenges of today’s environment in which political and law enforcement leadership face man-made and natural disasters are in fact opportunities for a city to bring stakeholders together, create platforms for collaboration and information sharing, and identify efficiencies and cost savings.  

 

About the Author: Bob Liscouski has more than 30 years of experience in security and law enforcement, and is the founder and Managing Partner of Integrated Strategies Group. Liscouski and ISG have founded four additional firms  – Steel City Re, Edge360, Axio Global and Convergent Risk Group. 

KEYWORDS: city security citywide surveillance Safe City surveillance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Liscouski 200px

Bob Liscouski has more then 30 years of experience in security and law enforcement, and he is the Executive Vice President of Integrated Strategies Group. Liscouski and ISG have founded four additional firms — Steel City Re, Edge360, Axio Global and Convergent Risk Group.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Surveillance Strategies Liscouski default

    Right-Sizing Technology for Agile Surveillance Success

    See More
  • Surveillance Strategies Liscouski default

    How the Internet of Things Impacts Surveillance

    See More
  • Post 9/11 Surveillance

    In Defense of Post-9/11 Surveillance

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 9780367667887.jpg

    Surveillance, Privacy and Security

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

See More Products

Events

View AllSubmit An Event
  • July 17, 2025

    Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

    ON DEMAND: What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing