Solving the Challenges

Beyond solving crimes, surveillance video can serve as client’s protection against liability

Security managers, CSOs and other personnel tasked with mitigating risk at an organization are the first link in a long and vitally important chain. Starting at the surveillance camera and running all the way through to a criminal conviction or acquittal, this chain can be considered critical infrastructure for keeping all individuals safer and more secure.

As a security professional, you choose to purchase and deploy solutions and products based on their ability to solve the problems that are specific to your organization. You need to be able to discover unfolding incidents, alert personnel to problems and identify individuals involved in criminal actions, among other things. Still, your responsibility as the first link in that important chain goes further.

Securing a Conviction

In order to ensure that the information generated by cameras, readers and other devices can be used by law enforcement to get that conviction, it must be usable and admissible as evidence in a criminal trial. For that to happen, there must be a verifiable chain of custody that goes from your camera all the way through to the presentation of evidence. For electronic security devices, the chain of custody is dependent on data.

Today’s security systems create a wealth of information that is fundamental to identifying and convicting criminals so that the threat they represent is mitigated. For surveillance cameras, this information includes both the video itself and its associated metadata.

Beyond solving crimes, your surveillance video and metadata can also be a vital piece of information when it comes to liability – both your organization’s and your own – in civil lawsuits.

Surveillance metadata contains a wide variety of information relating to the video itself. This may include time and date stamps, location, and any analytics content such as a license plate identified by LPR technology or the identity of an individual verified by facial recognition software. While the video itself is crucial to understanding the unfolding of events in perspective, the metadata is equally important for the critical intelligence it delivers to law enforcement – including its ability to verify a chain of custody.

Video information is extremely important as it often provides some of the strongest evidence available to help identify, arrest, indict and convict. There have been many cases over the past years which have turned on surveillance or other video footage. In some situations, the video cements the prosecution’s case, while in others it provides the evidence needed to exonerate an innocent person. Either way, it has become one of the most important avenues of investigation for the visual confirmation it provides.

When surveillance video is used as evidence in a criminal or civil proceeding, it is not enough to simply play the footage for the court. While the video itself may be highly informative and compelling, on its own it may not be considered acceptable as evidence. For it to be useful, like all evidence there must be a demonstrable chain of custody for surveillance video.

Chain of custody is a term of art which refers to the verifiable and documented handling of evidence. Every piece of evidence in a crime is subject to tampering, altering or falsifying in some way. Every Step of the Way

To ensure proper chain-of-custody protocol is followed, law enforcement officers are responsible for maintaining and documenting evidence at every step of an investigation. They must be able to show who collected, handled, transferred, or analyzed each piece of evidence, beginning at the crime scene itself.

The following example will illustrate the importance of this. In 2018, the Supreme Court of South Carolina overturned an earlier conviction and sentence on a charge of trafficking crack cocaine. After the suspect was stopped by two police cruisers for speeding, cocaine was discovered in a bag inside his vehicle. During the criminal trial, defense counsel was able to show that the chain of custody of the cocaine had been disrupted, and there was not a clear possession between its discovery and its placement in the police department’s evidence locker.

After the state failed to provide a complete chain of custody of the evidence, the Court ruled that the evidence was inadmissible. The perpetrator, who had originally been convicted in 2015, walked out of prison.

In any criminal case, a vigilant defense attorney will make chain of custody a central point of their defense if they can establish any doubt or weakness in the chronology or authenticity of evidence. For this reason, it is important to make sure that any security products or solutions you deploy offer the kinds of verifications needed to help confirm the veracity of the data they provide.

For surveillance video, this means that any video taken on-site at the scene of an incident must be verifiably authentic for it to be considered acceptable as evidence. This is particularly relevant for right now, as bleeding-edge technology has enabled the astonishingly realistic counterfeits known as deepfakes.

Deepfakes are videos that replace the face of one person with another using artificial neural networks. Using this technology, it is possible to make any individual appear to be saying anything at all; for example, a CEO could be shown making racist or explicit comments. With this new threat, chain of custody becomes even more of a critical issue for surveillance video.

The best video surveillance solutions ensure that all video and audio captured during an event are protected and securely stored, creating evidence files that are easily managed and validated. This should be equally true for the metadata contained within the video, which as noted can be a highly significant element of the evidence needed for court. The chain of custody should be automatically logged by the system, making it easy and fast to comply with any requested audits and documentation.

A Complex Function

In order to demonstrate that the files have not been tampered with, it is ideal to have the video stored in a proprietary and encrypted format. Hashing, a complex function used to defeat hacking, is another strong protection for stored video. When a specific piece of video is needed, you should be able to pull an unencrypted copy, redacted as needed, without affecting the integrity and authentication of the original. Each required redaction and edit should happen on a separate tracked file, so that it is possible to trace all changes.

Most organizations are now moving towards some type of combination of local and cloud storage rather than keeping all video on local servers. Cloud storage delivers both cost and time savings and makes it more convenient to retain video for much longer periods of time.

This is essential as it may be years between the time when an incident takes place and the need for specific evidence in an arrest or trial. In order to best retain video, it makes sense to use a hybrid solution that automates storage and archiving while preserving all verification of evidence.

Ultimately, the accountability for risk mitigation at any organization falls to the security department, IT and the C-suite. All three are similarly potential targets for personal liability in the case of any criminal activity. This considerable responsibility includes being tasked with the ability to maintain video evidence that is impeccable and unimpeachable.

By choosing a video surveillance solution that enables spotless storage, archiving and transferring, you can minimize any potential chain of custody issues that could invalidate the video as evidence. It’s the most responsible way to manage video documentation across your entire organization.

This article originally appeared in the May/June 2020 issue of Security Today.

Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.