California PD Implements Surveillance Camera Registry Mapping System

California PD Implements Surveillance Camera Registry Mapping System

In an effort to deter crime and expedite investigations, the Santa Maria Police Department invites residents to register their home surveillance cameras, and maps the location of every registered camera in the city

Since it began its surveillance camera registry six months ago, the Santa Maria Police Department has added more than 80 homeowners and businesses and implemented a system mapping the location of each surveillance cameras throughout the city.

The program, which began last August, invites any business or homeowner with security cameras to register online with the city, providing the PD with their address, contact information and the number and kind of cameras they own. If police officers need access to any captured footage, they can contact the camera’s owner to request it.

The goal of the program and map is to deter crime and make investigations more efficient, according to St. Eligio Lara.

“It sends a strong message to the criminal element that the community and law enforcement are working as a team,” Lara said. “It’s not big brother watching you — it's neighbors watching out for each other.”

During the last two months, the police department has rolled out a mapping system that plots the location of each of the registered cameras, as well as 35 cameras owned by the city. The map color-codes the cameras to indicate whether they belong to a resident, a business or the city.

Based on the map, almost all of the city’s neighborhoods are covered by cameras registered with the police department. When a dot signifying a camera is clicked, it provides officers with the owner’s name, address and contact information.

Lara said the camera registry will help guide the beginning of police investigations.

“If we have a shooting, we’re going to canvas the area and go house by house,” Lara said. “But at the beginning, we’re going to look at this map and start there because we know there’s a camera there for sure. So that’s where we’re going to send officers to start off the investigation because, in investigations, the first 48 hours are the most important.”

Lara noted that when people register their cameras, it means they are likely to cooperate with the police.

“If people are willing to register them, more likely they are law enforcement supporters,” he said. “So it’s easier for us to work with them. Sometimes we find certain cameras but people don’t want to answer the door or this or that.”

Lara said the other law enforcement agencies have requested their help with investigations.

“[The California Highway Patrol] has already called about our registry system,” he said. “They were investigating an accident or something where the car went through Broadway and wanted to know which businesses to go to for footage.”

There are currently about 115 cameras registered and mapped, and Lara said the goal is to expand to more than 200 across the city.

“The technology is out there — let’s take advantage of it,” he said.

About the Author

Jessica Davis is the Associate Content Editor for 1105 Media.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3