Skip to main content

Set up video or electronic surveillance

Type of countermeasure

This is a response countermeasure. Response countermeasures respond to fraud after it has occurred. They help to reduce the consequences or disrupt further consequences.

Summary

Capture video or other electronic evidence of activities to support a fraud investigation and prosecution.

Why this countermeasure matters

The prosecution must prove every element of an offence beyond reasonable doubt to convict someone. Poor or no video or electronic surveillance may lead to:

  • difficulty in conducting investigations and prosecutions¬†
  • briefs of evidence being rejected by the Commonwealth Director of Public Prosecutions.

How to put this countermeasure in place

Some ways to implement this countermeasure include setting up video or electronic surveillance like:

  • surveilling each building access point with closed circuit television
  • putting Mobile Device Management software on mobile devices to track and disable
  • monitoring the use of fleet vehicles with In-Vehicle Asset Management.

How to measure this countermeasure's effectiveness

Measure the effectiveness of this countermeasure using the following methods:

  • Confirm that surveillance is switched on.
  • Confirm surveillance processes are in compliance with the Australian Government Investigations Standards and other national guidelines or frameworks.
  • Consult with investigators about what evidence is required to support an investigation.
  • Review the surveillance output to confirm it would capture enough evidence to support an investigation.
  • Check if the method of surveillance is reliable.
  • Confirm and test (if required) surveillance output is stored securely.
  • Confirm that surveillance output is available to investigators.
  • Confirm that surveillance cannot be switched-off, deleted or altered, even by staff with privileged access.
  • Confirm that surveillance when switched-off or altered is logged and that back-up copies are retained.

Related countermeasures

This type of countermeasure is supported by:

Limit and control functionality within systems with user permissions. Assign permissions to users based on specific business needs such as making high-risk functions limited to specialised users.

Limit and monitor privileged system accesses (those that allow staff, contractors and providers to perform special functions or override system and application controls). The Protective Security Policy Framework outlines the government protective security requirements to safeguard information from cyber threats, including to restrict administrative privileges.

Conduct system testing to identify vulnerabilities prior to release. Untested systems can allow vulnerabilities to be released into production environments.

Conduct internal or external audits or reviews to evaluate the process, purpose and outcome of activities. Clients, public officials or contractors can take advantage of weaknesses in government programs and systems to commit fraud, act corruptly, and avoid exposure.

Related Fraudster Personas

Was this page helpful?