Control Room Ergonomics 101: F.A.S.T

IMG_20180225_155012

It should be remembered that the key goal of decision makers at times of crisis is to consider information rather than to derive it, so the control room, equipment and systems in place should be set up to facilitate this. FAST information can make the difference in critical situations. It needs to be registered and easily accessible – in other words it should be Frequent, Accurate, and Systematic and in a Timely manner. Fast information gathering is a CCTV surveillance operator’s core function.  Surveillance is the operation of learning trends, behavioural traits and activities that change in a given environment. Collecting information from CCTV surveillance and other resources is essential for building a detailed knowledge of persons, vehicles and areas under surveillance.

There are two types of information that a surveillance operator requires when executing surveillance:

• Basic Information Requirements and

• Priority Information Requirements – PIRs

In Basic Information Requirements, you determine what you need to know. It also enables you to answer your Priority Information Requirements (PIRs). PIRs are mostly driven by your Surveillance Supervisory Team (SST) who determines what they want to confirm, deny, or where to fill-in the gaps. This information helps the SST in determining a course of action and be able to make the key decisions during the execution. Some information derived from the execution of information gathering will be converted to PIRs:

Prioritize and then develop your PIRs

Once you have compiled your information requirements, determined your Surveillance Supervisory Team’s requirements first and rank in order information requirements from most critical to least critical. You can’t answer all of them due to time constraints and resources. These are the tasks that you just do not have the time or resources for. They should be put at the bottom of the list of priorities.

In crafting your information requirements, you want to address the following five “W’s”:

  • What is it you are looking for?
  • Where is it that you want to look?
  • When is it that you want to look?
  • Why is this information so valuable to achieving your Primary Goal?
  • Who is it that needs the information?

However, you can collect all the information you require, but if there is no plan to get it to the right people at the right time to make operational decisions – it is fairly useless.

Advertisements

Control Room Ergonomics 101

IMG_20180219_182456.jpg

Human Factors in any control room environment has been the focus of my research into trying to understand what makes the job of an operator relatively challenging and how to mitigate options for better job satisfaction.

CCTV surveillance is a relatively new concept of security support in Papua New Guinea. Bearing in mind that,  internet and social media, email and blogs have transformed business through  computers and mobile phones making online marketing and advertising to be competitive inside the international information arena in recent years of cyber activities which inevitably brought about the introduction of the Cyber Law by the government in 2016.

So as far as CCTV monitoring is concerned, we only have a handful of trained operators in the country who really understand and appreciate the function of CCTV surveillance from a control room and dedicated CCTV workstations.

In 2005 a fully functional CCTV control room with an arsenal of 126 analog cameras, digital video recording,  two workstations and the pioneering CCTV operators without any formal CCTV operator training embarked on the job of CCTV monitoring of high security assets in the mining operations situated in Enga Province. That job since has expanded to a little over 400 analog and digital cameras, recruiting and training of more operators and a state of the art CCTV control room in the country along with its own technical support team.

The expansion came with increased workload and stress on the operators whom I have had the privilege and opportunity of supervising and managing the day to day operations on a 21 days FIFO roster. Remuneration is an issue but the last eight months have been the reason for understanding and implementation of standards, training and health requirements in improved work performance of the operators and increased job satisfaction.

Stay with me because I am going to post more articles about the ergonomics of a CCTV control room and functions with some CCTV surveillance training that I developed throughout the pursuit of improving job satisfaction as opposed to financial appraisal.

“Remember the SCOPE.”

How to Turn an Old Android Device into a Security Camera

anroid to cctv

One of the best uses for an old Android device is to turn it into a security webcam that can be accessed over the internet. But most of the time, this is a rather difficult process, because existing apps usually require you to mess around with network settings and configure a personal web server.

Thankfully, a new app from Perch Technologies has finally taken all of the hassle out of setting up a home monitor. It lets you turn your old phone or tablet into a live-streaming webcam, complete with cloud DVR features and motion detection, and I’ll show you how to set it up.  Read more…

Buy Surv Equip

 

Fiber Optic Hack

Fiber

You would think Fiber optic systems were the solution to optimum data security since the replacement of hard wire. However, it is possible that intruders can tap into a fiber optic system without detection. Some loop holes were identified by Kimberlie Witcher at the University Mary Washington in a submission titled “FIBER OPTICS AND ITS SECURITY VULNERABILITIES”  It may not be a completely simple task, but with the right equipment,knowledge and access, it could probably be achieved by a mid-level hacker. Data security will always be a problem. Intruders not only have a variety of reasons for stealing or manipulating data, but also a variety of methods to obtain the data. Constant and up to date awareness and knowledge of the current risks and solutions is essential to ensure that all data is as secure as technically and financially possible.