Video or electronic surveillance
Video or other electronic evidence of activities is captured to support a fraud investigation. Surveillance can also deter fraud.
Some examples of this type of countermeasure include:
- Closed circuit television surveillance of each building access point
- Mobile Device Management software on mobile devices allows for tracking and disabling.
- In-Vehicle Asset Management for monitoring the use of fleet vehicles.
Purpose of this countermeasure
A lack of video or other electronic evidence can make it difficult to investigate and disrupt fraudulent activity.
The Commonwealth Director of Public Prosecutions may also reject a Brief of Evidence if you have not captured sufficient evidence to prove an offence.
Under the Criminal Code Act 1995, the prosecution bears a legal burden of proving every element of an offence relevant to the guilt of the person charged. Furthermore, the offence must be proven beyond reasonable doubt.
This type of countermeasure is supported by:
- System or physical access controls
- User permissions
- Privileged access restrictions and monitoring
- System testing
- Data protected from manipulation or misuse
- Internal or external audits or reviews
- Documentation and evidence storage
- Tip-offs and Public Interest Disclosures
How do I know if my countermeasures are effective?
You can apply the following methods to measure the effectiveness of these types of countermeasures:
- Confirm that surveillance is switched on.
- Consult with investigators about evidentiary requirements.
- Review the surveillance output to confirm it would capture sufficient evidence to support an investigation.
- Check the method of surveillance. Is it reliable?
- Confirm surveillance output is stored securely. Test this if required.
- Confirm that surveillance output is available to investigators.
- Confirm that surveillance cannot be switched-off, deleted or altered, even by staff with privileged access.
- If surveillance can be switched-off or altered, confirm that these actions are logged and that back-up copies are retained.