University is often the first time that many young adults spend prolonged periods away from home. This newfound freedom is an exciting time, as they learn new skills, develop new social circles and continue their educational journey.
However, there are risks to students and university staff as often campuses do not have walls and a true cross-section of the public have access, not all of whom have good intentions. Unfortunately this means that university can be the first time that young adults come into contact with crime.
The complete University Guide compiled reported crime statistics and created a league table for universities looking at reported crime in areas where students live.* The data they provide shows three core crime statistics including robbery, burglary and violent or sexual offences and gives values of victims per 1000 people.
The headline figures for universities in England and Wales in 2019 are as follows.
On average (acknowledging the data set is not perfect) there is approximately a 5% chance of being a victim of crime whilst on or near a university campus in term time while the worst-case scenario is as high as nearly 10%.
How can Police forces, institutions and university security help protect staff and students from such criminality and provide a safer public space?
By working together, Police, Public Safety and university security organisations can establish a system of security with layers of redundancy. Creating a database of safe-designated and threat-designated individuals and vehicles allows the Police, University or Campus location oversight teams to develop watchlists of sex offenders, known criminals, disgruntled former employees, barred community members such as gang members and drug dealers, non-custodial parents or estranged partners and ensure they cannot gain access to the most vulnerable campus areas.
The best approach is a multilayered system of passive and active checks that protect against unauthorised access and provide multiple intervention opportunities.
Protection starts off-site and extends right up to your building entrances
All roads approaching and surrounding your university campus or target areas act as an outer perimeter. By placing fixed ANPR cameras in this outer perimeter you can catch a potential threat before it enters the campus proper or simply look for trends of unauthorised vehicles.
The middle perimeter consists of roadways and parking areas that have been identified as high risk or prone to crime. Place additional fixed ANPR cameras in the middle perimeter to let you know when an unauthorised vehicle is on location or take your protection one step further with CCTV security cameras to allow oversight of on-site activities.
Entrances to buildings and sensitive locations are the last line of defence against a potential threat. By utilising an inner perimeter facial recognition system that connects to existing IP CCTV you can identify problematic individuals before they have the chance to act.
By enacting a layered approach and integrating it with an active watchlist, police and on-site security can better monitor ongoing activities while protecting those most vulnerable to crime. To learn more about physical security solutions for universities and educational institutions, visit Vigilant CampusWatch
Strategic Alliance Manager, Video Security & Analytics at Motorola Solutions
Connect with Chris on LinkedIn
*Official data for crime specifically against students at university is not available.
The availability of digital assets in UK policing is on an exponential rise. Members of the public expect to see digital solutions in place by their local police force for supporting crime prevention and community engagement. With the common use of smartphones, body-worn video and CCTV, the physical drain on the police service to gather, manage and disclose digital assets has never been higher.
When a digital asset has been created and identified as a potential piece of evidence to be included in an investigation, that asset along with its original meta-data is now part of an important story. The asset will travel through a sequence of important events; a police investigation, become referenced and linked to a case file and eventually be disclosed as evidence in a criminal trial.
Today, we have the ability to technically support every step of that journey by streamlining workflows between platforms based on business rules, provide a secure audited chain of custody, and enable the public, police forces and judicial partners to work seamlessly to gain successful outcomes and prosecutions.
Streamlining workflows within digital evidence and asset management solutions needs to carry four immediate business benefits for the police in the UK today:
In December 2018, the UK Crown Prosecution Service updated several official guidelines due to a significant number of criminal trials collapsing due to the lack of disclosure of digital evidence. Evidence integrity was key to this, with a call to support search strategies, analytics and the ability to isolate certain elements of key evidence that may have specific privileges but still be disclosed as used or unused evidence material.
CommandCentral has been designed to support the Policing Vision 2025 in England and Wales and the Digital Strategy for Justice in Scotland along with national standards due to be published by the Digital Policing Portfolio (DPP) including the following national programmes: Digital Intelligence and Investigation (DII, Digital First (DF) and Single Online Home (SOLH). CommandCentral has also been designed to specifically meet the secure authenticated access and sharing requirements of the CPS, particularly defence practitioners and legal barristers.
Solution Manager, CommandCentral Suite
Kelly is presently responsible for managing the end to end portfolio of CommandCentral Suite at Motorola Solutions. An innovative software specialist with 10 years experience in Public Safety solutions including Command and Control, Communications, Mobility, Evidence and Records Management Solutions. Kelly prides herself on driving operational outcomes, in particular in overcoming complex requirements for customers with multiple ICT challenges.