PIR stands for Priority Information Requirements and it is a list of information gathering tasks listed in order of priority depending on the urgency, necessity and availability of resources required to support the execution of an operational decision. An effective support function of a CCTV control room is to deliver PIRs to all members of an organisation. PIRs is the key to facilitating visibility and support from an organization, particularly senior management.
The key issue is to determine the nature of the security support that the CCTV control room is to fulfil, and then support CCTV operators in fulfilling this function by ensuring that security is appropriately prioritised in their day to day working routines. In practice it is rarely the case that CCTV control rooms fulfil only a security function – in addition they may act as an information point for queries, or a gatherer of evidence or provide administrative duties to the organisation in which they are based. A CCTV operator, undertaking a variety of tasks that fall under each of these functions, will inevitably have to prioritise particular tasks over others when the control room gets busy. This is discussed further in the WATCH components.
Three-time Oscar winner Oliver Stone and the cast of his upcoming film Snowden discussed the privacy issues that affect everyone with a smartphone—especially those playing Pokemon Go—during a panel for the film at San Diego Comic-Con on Thursday. The film follows the story of NSA whistleblower Edward Snowden, who after initial hesitations cooperated with Stone…
via Snowden’s Oliver Stone and Joseph Gordon-Levitt on Pokemon Go and Surveillance — TIME
You would think Fiber optic systems were the solution to optimum data security since the replacement of hard wire. However, it is possible that intruders can tap into a fiber optic system without detection. Some loop holes were identified by Kimberlie Witcher at the University Mary Washington in a submission titled “FIBER OPTICS AND ITS SECURITY VULNERABILITIES” It may not be a completely simple task, but with the right equipment,knowledge and access, it could probably be achieved by a mid-level hacker. Data security will always be a problem. Intruders not only have a variety of reasons for stealing or manipulating data, but also a variety of methods to obtain the data. Constant and up to date awareness and knowledge of the current risks and solutions is essential to ensure that all data is as secure as technically and financially possible.