Showing posts with label CCTV. Show all posts
Showing posts with label CCTV. Show all posts

Sunday, May 5, 2019

8-steps System Integration Model

8-steps System Integration Model

BEMS, BMS, BAS, EMCS, and this list goes on and on. Welcome the acronym-filled wasteland know as building automation. What you are about to read may seem high-level, but I promise if you follow these steps you will take your skills to the next level. Let’s begin.
One of the persistent challenges I hear from my audience is around the topic of systems integration. Automated Buildings readers you’re in luck! Today I am going to give you a high-level overview of my 8-step process for systems integration.

The Systems Integration Model
Using this process I have personally done some of the most complex integrations in the smart building space.

OPC integration bringing 13 different Building Automation systems AND THEIR DATABASES into a single front end. Check!
Tying together Lighting, Physical Security, Video Management, BAS, Maintenance Management Software, and Google Calendars for scheduling. Check!
Writing applications that consume XML data feeds from clinical systems and then convert this data into a BAS system. You Bet!
What you are about to read may seem high-level, but I promise if you follow these steps you will take your skills to the next level. Let’s begin.

Step #1: Define the Business Challenge 
This may seem like an odd step especially for technical folks. The reality is without defining the business challenge you will never get adoption and support from all of the different stakeholders.


Step #2: Create the Use Case 
Now that you have defined the business challenge you need to create the use case. I prefer to use the UML modeling method for my use cases but you can use whatever method you and your customer are comfortable with. The key point is to:

·         Capture what the outcome is
·         How the outcome is reached
·         Who is taking the action
·         What action they are taking

Step #3: Identify the Systems 
You now have a functional use case. We will now begin to dive into the technical aspects of integration. It is here that you will go and dig into the use case and identify the systems that are being used. You need to be very detailed in this step. Often times there will be systems that are being used that are not called out in the use case. You want to:

·         Identify the systems in the use case
·         Identify any systems required but not detailed in the use case
·         Identify any people in the use case

Step #4: Detail out the Data Flows
Now that we have the systems detailed out we need to define our data flows. Where is data flowing? I like to use Crow’s Foot notation to show how my data flows are laid out. Essentially what you are trying to do at this point is to detail out:

·         Who is the master system and who is the slave system
·         Which way data flows in the integration
·         If the data will be one-to-one, one-to-many or many-to-many

Step #5: Build the Data Model
Great! We know which way data is flowing. Now we need to detail out our data model. 

What points do we need from each system? 
How will the points be formatted? 
What protocol will the points use? 
It is here that we detail out our “data model”. For this I like to use the UML class diagram. It may seem like overkill but a class diagram is a great tool to avoid having systems that won’t map to one another.

In the class diagram I map out:
·         The points that will be available at each system
·         How the points are formatted
·         The frequency of the points being sent

Step #6: Map out the Network Connections
Naturally we need to send data to and from our systems. The way we do this is via the network. Now you may be wondering why I waited to do a network map until now.

The reason I waited is because I wanted to know which systems needed to talk with one another. By first detailing out my data models and my data flows I defined who really has to talk to who. 
Many folks will look at the use case and immediately start mapping out their network connections. This results in people missing key systems that the use case did not actively mention.

Step #7: Prepare the Physical Integrations
It is at this point that we will want to begin to prepare the physical integrations. Here we will setup any integration cards, protocol gateways, etc. At this point in the process you should have a clear path to finishing your integration. This step usually includes:

·         Setting up any integration gateways
·         Configuring IP addresses
·         Working with IT to get any routing setup

Step #8: Implement the Integration
This almost isn’t a step! You simply need to implement your network map and data model. Really at this point you simply need to show up and coordinate the other vendors. It’s funny to me because this is the step so many people try to do first and then they wonder why this step is so hard. 

Honestly, if you’ve done each of the steps up to this point this step should be a non-event.
Artical Publish by Safe Secure Magazine in May 2019 edition.

Saturday, November 3, 2018

Video Security Dual Responsibility GDPR

Video Security Organizations’ Dual Responsibility Under GDPR

GDPR - the EU General Data Protection Regulation - is now in effect (on May 25th, 2018). The regulations are designed to protect the data privacy of European Union (EU) residents, but because the rules affect  any company handling EU data, the true influence of the GDPR is international in scope.

GDPR affects security technologies like video surveillance systems. Here’s what you need to know to improve your GDPR compliance.
GDPR is a regulation set forth to protect personal data and ensure the privacy of individuals within the European Union (EU), which is deemed to be a fundamental human right. The primary driver behind the regulation is to give individuals greater control over their personal data and how it is used. Despite its roots in the EU, GDPR also addresses the collection or storage of personal data from any EU citizen, as well as the export of data outside the region. Therefore, given the scope of GDPR, compliance is a global concern.

Because cybersecurity was a main driver behind GDPR, one of its mandates is that in the event that a data breach occurs, companies that collect personal data are mandated to report it in to the supervisory authority within 72 hours. Failure to comply with this regulation could result in penalties equaling 4 percent of a company’s global annual revenues or 20 million euros, whichever is greater.

Given the importance of individuals’ privacy and the potential penalties for non-compliance, these are important discussions; however, this focus is not enough for those of us in the security industry, who have a dual responsibility under GDPR. Why is that?

In practical terms of protecting individual privacy, GDPR places much of the responsibility and obligation on businesses and other organizations that deal with personal data. One of the key features of the new regulation is that those who are being monitored need to be fully informed about what data is being held on them and how it is being used.

Under GDPR, this “personal data” is defined very broadly as “any information relating to an identified or identifiable natural person,” referred to as the “data subject.” Naturally, the first types of personal data that come to mind are the classic examples such as name, physical address, phone number and email address, all of which meet the criteria. But these are only starting points, as the range of personal data types is expansive, encompassing more than simply text-based data.

As security professionals, we must recognize the reality that video in which a person can be identified is also considered personal data and is therefore subject to GDPR guidelines and requirements. Therefore, as organizations, we need to determine how best to become compliant with how we handle customer and employee data, including surveillance video. This dual responsibility must come into play when we consider how we design and operate security systems and collect video data through surveillance, including how we store and manage that video data after collection.

To do so, it is important to explore how many of the steps organizations must take to become GDPR compliant are also necessary to ensure that video surveillance data is compliant as well. These steps surveillance operators must take – and how they can be applied to collected video – are outlined below.

Administration
In general, the first step in ensuring GDPR compliance is to choose an administrator and record data processing activities. As an organization seeking to become GDPR compliant, it is essential to have a person on staff – known as a data processing officer – who will ultimately be responsible for data integrity. Each company providing video surveillance must choose an administrator.

In a security environment, choosing this administrator allows for an open way to publicly identify the person who is responsible for data collected from the surveillance systems and provide that detail to anyone who is monitored by video upon their request. In doing so, it is key to also make the name of this data processing officer available to every person who requests data as prescribed under GDPR.

Every organization should also have a procedure in place for when an individual chooses to exercise their right of access to personal data or request its deletion, which allows them to stay within the monthlong window within which GDPR requires them to comply with these requests. When making such a request, it is reasonable to expect an individual to provide adequate information in order to locate this data – for example, an approximate timeframe, and the location where the footage was captured.

Documentation

GDPR also recommends that record of processing activities (ROPA) documentation be maintained and the following information be made available upon request:
  • Category of individuals that processed personal data relates to
  • Purpose for which collected data is used
  • Whether personal data will be transferred (to whom and for what reason)
  • How long personal data will be stored
  • Description of technical and organizational measures to ensure privacy

According to GDPR, administrators should take all appropriate measures to provide this information concerning the processing of their data by surveillance systems to monitored individuals in a brief, transparent, comprehensible and easily accessible manner.


ROPA documentation must also include a risk assessment for individuals’ rights and freedoms and planned measures to address these risks, which include safeguards and mechanisms to ensure the protection of personal data and compliance with GDPR. This should take into account the rights and legitimate interests of individuals and other affected persons.

In a surveillance environment, these items are equally important. Focusing for a moment on purpose and extent of surveillance, it must be clear why and how much video is being collected, and for what reason. One thing to discuss with potential solution providers is the concept of privacy by design and “GDPR-ready” product features. In evaluating solutions, organizations should look for those that will help them more easily become GDPR compliant. An example would be technology supporting defined view of a specific perimeter. By leveraging solutions to define the perimeter, organizations adhere to GDPR in that they can more easily specify the extent of video surveillance.

Data Processing Inventory Assessment (DPIA)
Once an administrator has been chosen and ROPA documentation is complete, a DPIA is required for cases of “extensive systematic monitoring of publicly accessible premises.”


This requires specifying in writing why and for what purposes the camera system is recording. For example, a city needs to manage electrical and water utility stations and must ensure the utilities provide residents with dependable service. Therefore, the perimeter of these utility stations must be protected against crime and theft. Under GDPR, the city can specify that the surveillance is provided for this purpose. Another example would be to ensure the safety of citizens during public events, as surveillance video may be used by the police to provide real-time situational awareness for officers in the field. In this case, it can be specified, in accordance with GDPR guidelines, that video is being collected to support public safety.


This information directly correlates to ROPA documentation, so again we can see the connection between becoming compliant as an organization overall, as well as ensuring compliance for GDPR with information and data collected in a surveillance environment.

Data Security
Cybersecurity has been a major topic within the security industry for some years now. The importance of a surveillance system being cyber secure extends to compliance with GDPR, with tight control of video data being another key recommendation. It is vitally important when specifying a system that these critical measures are taken into account. The less data that is readily accessible to those outside the scope of an organization’s video data management procedures, the less risk there is of becoming non-compliant. The same philosophy applies to data breaches; administrators must report any leaks within 72 hours of notification.


To ensure GDPR compliance, companies should employ strong measures to prevent unauthorized access to the personal data they store, including video. The specific tools and tactics used by each company will be unique to the challenges they face. In all situations, however, companies must employ robust security controls, stay up to date with cybersecurity best practices and ensure they are working with trusted partners that provide secure hardware and software, as well as thorough aftercare. Therefore, organizations must work with security professionals and partners to better understand potential cybersecurity risks and talk about ways they can harden their systems to ensure GDPR compliance.

From a compliance perspective, the processes that must be put in place to ensure the “right to be forgotten” in an organization are very similar to those necessary to ensure a surveillance system is also in compliance. This requires taking a systematic approach to how video data is stored, transferred and deleted. These methodologies will ensure that if an individual requests his or her video footage be deleted, business systems and organizational structure will be in place to adhere to this request in an efficient manner. The concept of “right to be forgotten” is a significant part of the GDPR guidelines, and as we are just months into this new guideline, the impact on organizations and system operators after requests are submitted still remains to be seen.

Data audit
The first step toward cybersecurity risk management knows what data your company is collecting and how it is stored. A comprehensive data audit is fundamental because you’ll need to discover what information your company handles that could create liability under the GDPR. The GDPR is very inclusive in its scope, so a data audit should look at all platforms, device types and departments.

Risk assessment

Once you've done a data audit to establish a clear picture of how your company’s data management works, you’ll be in a position to make a risk assessment:
  • What cyber-threats could your company face?
  • Where are the security weak-points in your technology infrastructure?
  • Do you have effective cybersecurity measures in place?

End-to-End Compliance
It is important to consider the full scope of video surveillance. As a surveillance operator collecting video about living individuals, an organization will fall under the category of data controller and be held responsible for data management in accordance with GDPR. Anyone having access to video data, including subcontractors and hosted service providers, must meet requirements as well. These companies or individuals who have access to recorded video on behalf of an organization, such as hosting providers, fall under the category of data processors. In terms of company compliance, when reviewing contracts to ensure all companies comply in the same way as an organization has planned. In terms of surveillance, be sure to check that any persons or organizations who have access to video are also compliant and that contractual relationships reflect these obligations.

Ultimately, it is the surveillance system user (i.e., data controller) who is responsible for GDPR compliance and safeguarding the rights of individuals whose personal data the user collects and processes. While the data controller has ultimate responsibility to follow GDPR, data privacy is a team effort. Remember: We are all in this together.

Therefore, for users of surveillance equipment, solutions and services, it is important to partner with suppliers that are committed to respecting and safeguarding individuals’ privacy and protecting personal data. Users should also be able to rely on suppliers and vendors for the support and technical assistance necessary to facilitate GDPR compliance.

Due to its intent, the onset of GDPR is a positive one. It will allow data processors and controllers to use data in appropriate ways and have clear guidelines/procedures in place for data collection, management and surveillance. Many companies follow guidelines such as the UN Global Compact when it comes to sustainability and environmental responsibility. The UN Global Compact provides 10 clear principles to help guide companies in their sustainability efforts. GDPR provides similar clear direction to companies looking to protect individual privacy, a fundamental human right.

Information on individuals is a valuable asset and needs to be properly protected. Apart from making good business sense, the reputation and success of your organization can be under threat if personal information isn’t managed appropriately. Organizations can demonstrate effective management of personal information with BS 10012 from BSI.

It helps you:
  • Identify risks to personal information and put controls in place to manage or reduce them
  • Demonstrate compliance with data protection legislation and gain preferred supplier status
  • Gain stakeholder and customer trust that their personal data is protected 
  • Gain a tender advantage and win new business
  • Safeguard your organizations reputation and avoid adverse publicity
  • Protect you and your organization against civil and criminal liability
  • Benchmark your own personal information management practices with recognized best practice.

Basic Principles of the GDPR

Clearly Justified Purpose

All organizations must have a valid lawful basis for collecting and processing personal data
·         
Privacy by Design

The GDPR mandates that privacy must be a priority throughout system design and commissioning. The approach taken with respect to data privacy must be proactive, not reactive. Risks should be anticipated and the objective must be preventing events before they occur.
  
Right to Access

Under Article 15, the GDPR gives individuals control over their personal data including the right to see that data.

Right to be Forgotten

Under Article 17, the GDPR gives individuals control over their personal data including the right to have their personal data erased if it is no longer necessary for the intended purpose of the system.

Security

The GDPR requires organizations have comprehensive policies and procedures ensuring personal data remains within control of the organization at all times. Additionally, personal data breaches must be reported within 72 hours to the competent supervisory authority appointed by their country’s government.

Reference:
  1. https://www.mailguard.com.au/blog/gdpr-security-responsibility
  2. https://www.bsigroup.com/en-IN/
  3. https://edps.europa.eu/sites/edp/files/publication/10-03-17_video-surveillance_guidelines_en.pdf
  4. https://gdpr-info.eu/art-13-gdpr/



Saturday, July 7, 2018

Choose ONVIF Prescribe ONVIF

Choose ONVIF Prescribe ONVIF

As an eSecurity Professional I always prefer to use ONVIF. ONVIF allows me to be truly independent of brands and recommend a way forward for customers that is not going to tie them in to a single, specific manufacturer. As I work as a System integrator in last 12yr found purchasers have probably all heard of ONVIF, but in my experience, the high level of competition in the CCTV market drives many manufacturers to attempt to differentiate themselves to understandably stay ahead of the pack. Unfortunately, I have seen many cases where the manufacturer tells the customer they make ONVIF-conformant products, but they then upsell additional features for their product and in many cases will say how that method is better than ONVIF. This doesn’t help many buyers of CCTV products today as they are not always experts in the field of CCTV or in the business of security, so they don’t see the strategic benefits of employing an ONVIF approach. We also see that the end users do not yet see the wider benefits of using an open standard and what that can offer them in the longer term.  They are instead more focused on the short term project, so there are many strategic influencers who are not yet aware of ONVIF.
Many projects I work which under government-funded customers that have long approval cycles and need to be able to have longer term plans. ONVIF allows this, as it has a stable roadmap and retains backwards compatibility in most things, so I am able to set a roadmap and a vision for a customers that they can plan around whilst having access to a large range of vendors and innovative new products. Government-funded long term projects will benefit the most from using ONVIF-conformant componentry. In India very few consultant prescribe ONVIF product, basically they still not clear about spec of ONVIF profiles. In UK, USA, Australia whether it is rail, roads, national or local projects, ONVIF has to be a key consideration in government-funded projects.

More systems will be ONVIF conformant and people buying products will be able to choose new and innovative solutions – like thermal cameras – as they become available, based purely on quality and cost instead of the manufacturer. That is a much simpler decision for them to make and the best products will rise to the top and remain in the market. There will also be more opportunities for systems to interoperate so that systems can be shared.

Each ONVIF profile has a fixed set of features that must be supported by a conformant device or client. Realizing a need for the standardization of communications between IP-based physical security products, Axis Communications, Bosch Security Systems and Sony Corp. in 2008 formed the Open Network Video Interface Forum (ONVIF).

ONVIF has surpassed 10,000 conformant products that meet its global interoperability standards, further broadening the organization’s offering and relevance in the IP-based physical security marketplace.
Membership is open to manufacturers, software developers, consultants, systems integrators, end users and other interested groups. The organization’s membership base covers six continents and offers more than 9,000 profile-conformant products.

How important is it for devices to be able to openly communicate, with some sort of standardization in effect? The technology researchers at the Gartner Group predict that by 2020 there will be 50 billion devices connected over IP networks, or what’s known now as the Internet of Things (IoT).
As ONVIF standards have evolved they have been designed around a list of performance profiles. Each ONVIF profile has a fixed set of features that must be supported by a conformant device or client. An example would be that an ONVIF Profile S device must work with other ONVIF Profile S devices.
Within each profile are product features listed by ONVIF and classified as mandatory (M), conditional (C) or optional (O). You can check online at the ONVIF Conformant Product List page and search for compliance confirmation. Do remember smarter video systems play a clear role in generating data.
To get an idea where products for your next project stand, here’s a look at current ONVIF profile specifications.
ONVIF Profile Specifications
For electronic access control systems:-
  • Profile C conformant devices and clients support site information, IP door access control and event and alarm management.
  • Profile A devices can retrieve information, status and event, and configure entities such as access rules, credentials and schedules. Conformant clients can provide configurations of access rules, credentials and schedules. The client can also retrieve and receive standardized access control-related events.
For IP-based video systems:-
  • Profile S could be a camera or video encoder that can send video data over an IP network to a Profile S client. A client might be video management software (VMS). This profile also covers pan/tilt/zoom control, audio, multicasting and relay outputs for conformant devices and clients that support such features. So it addresses common functionalities of IP video systems, such as video and audio streaming, PTZ controls, and relay activation.
  • Profile G products such as a camera or video encoder device can record video over an IP network or on the device itself. A Profile G VMS client is one that configure, request and control recording of video data over an IP network. Profile G also includes support for receiving audio and metadata streams. So it addresses video storage, recording, search, and retrieval.
  • Profile Q aims to provide quick discovery and basic configuration for Profile Q-conformant products. Profile Q also covers specs for TLS (transport layer security) configuration. TLS is a secure communication protocol to protect against tampering and eavesdropping.
  • Profile T is a release candidate for IP-based video systems. It supports video streaming such as the use of H.264 and H.265 encoding formats, imaging settings, and alarm events such as motion and tampering detection. This profile is designed to work with Profile S and not replace it.
The most majority IP-based security products claim to compliant with ONVIF standard. However, when end-users try to install these devices marked with this standard might encounter some problems, such as network video recorder can't discover the IP cameras in the same LAN network, motion detection doesn't work. Why is this happening?

First, you need to verify that your installed devices are truly compliant with ONVIF standard. Some manufacturers often mark their products as compatible with ONVIF, although this is not true. It's better to buy/use the IP-based security products from members of ONVIF. You can find the full list of members/manufacturers who are verified to offer ONVIF compliant products.

Second, it's not possible to be ONVIF compliant only; the IP-based security products need to be compliant to a Profile as well. You can be ONVIF conformant only, but if you are it is not guaranteed that you would get interoperability between other ONVIF devices and clients. To truly reap the benefits of ONVIF, you need to be Profile S compliant as it dramatically increases the chance of things like video and audio streaming or video configuration and multicast actually working well together.
One may encounter cases within a set of devices with Profile S, having no problems with connectivity and video streaming, but with some functions (e.g. motion detection). It is usually caused by errors of the standard or, more often, by an incorrect implementation of the standard/profile made by the manufacturer. Such problems should be immediately reported to the manufacturer that, in turn, should release improved software. ONVIF forum is heavily working on new, improved versions of the standard, which will be debugged and more precise in terms of terminology.

ONVIF has suspended Dahua & HikVision on October 9, 2019.

ONVIF Benefits to End Users:
  • Greater flexibility
  • Increased product choice
  • Future proof

ONVIF gives you the flexibility to pick and choose optimal products for your needs without being locked into a specific brand. An ONVIF conformant video management software, for instance, will allow you to integrate ONVIF conformant devices from different hardware manufacturers. With software that supports both ONVIF and proprietary application programming interfaces (APIs), you can choose to use the ONVIF interfaces for certain functionalities and the proprietary API for other features at the same time. Having ONVIF conformant products is like having an insurance policy that future-proofs your system for a more secure investment.

ONVIF offers thousands of conformant products from different vendors that support one or more.

ONVIF Benefits for System Integrators/Specifiers:
  • Greater product choice
  • Assured interoperability
  • Easier integration

ONVIF conformant products allow you to create a flexible, cost-effective and future-proof system. ONVIF enables you to choose optimal products from different vendors. The conformant products allow you to be confident in their interoperability and makes integration of products from different vendors easier. The interoperable functionalities are determined by a conformant product’s ONVIF profile(s). 

Please share this handy guide to all consultant, System integrator & customers. After reading this guide if you ask any of them, what would make your life easier? They’ll likely reply with open source integration of systems. Well, it’s been some time coming, but it looks like that wish is becoming more of a reality these days.

Thursday, August 18, 2016

সিসিটিভি দেখে ৮ ঘণ্টায় ধৃত দুষ্কৃতীরা

সিসিটিভি দেখে ঘণ্টায় ধৃত দুষ্কৃতীরা

ক্লোজড সার্কিট ক্যামেরা দেখে ঘটনার আট ঘণ্টার মধ্যে এটিএম লুঠের চেষ্টায় যুক্ত দুষ্কৃতীদের চিহ্নিত করে গ্রেফতার করল পুলিশ বুধবার ঘটনাটি ঘটে কোচবিহারের দিনহাটা থানার ভেটাগুড়িতে ঘটনার আট ঘণ্টার মাথায় জনকে গ্রেফতার করে পুলিশ
পুলিশ সূত্রের খবর, ভোর সাড়ে টে নাগাদ একটি রাষ্ট্রায়ত্ত ব্যাঙ্কের এটিএমের ভিতরে ঢুকে যায় পাঁচ দুষ্কৃতী। আধ ঘন্টার মধ্যে এটিএম মেশিন খুলে নিয়ে বাইরে বেরিয়ে যায় তারা। মেশিনটি গাড়িতে তোলার চেষ্টা শুরু করে তারা। কিন্তু ভোর হয় হয় দেখে সেই মেশিন রাস্তায় ফেলে রেখেই চম্পট দেয় দুষ্কৃতী দল
এর আগেও দুবার কোচবিহার শহর সংলগ্ন এলাকা থেকে আস্ত এটিএম মেশিন নিয়ে চম্পট দেয় দুষ্কৃতীরা। কোচবিহারের পুলিশ সুপার সুনীল যাদব বলেন, পাঁচ জনকে গ্রেফতার করা হয়েছে। তাদের জিজ্ঞাসাবাদ করা হচ্ছে।
পুলিশ সূত্রের খবর, ধৃতদের নাম রফিক আহমেদ, লোকমান হাকিম, ইসমাইল রহমান, জমির হোসেন এবং বিশ্বজিৎ কার্জী। রফিক টাকাগছের বাসিন্দা। লোকমানের বাড়ি খারিজা নলধন্দরা গ্রামে। ইসমাইল নতুনপল্লির এবং বাকি দুজন কালাপানিরর বাসিন্দা
তদন্তে নেমে পুলিশ জানতে পেরেছে, ভেটাগুড়ি প্রধান সড়ক থেকে একটু ভিতরে গলিপথে ওই এটিএম কাউন্টার। সেখানে ক্লোজড সার্কিট টেলিভিশন বসানো থাকলেও রাতে কোনও নিরাপত্তা রক্ষী থাকে না। মঙ্গলবার রাত ১০টা নাগাদ ওই এটিএম মেশিনে দশ লক্ষ টাকা রাখা হয়। রাতে সেখান থেকে কিছু টাকা গ্রাহকরা তুলে নেওয়ার পরে লক্ষ ৭৯ হাজার ৬০০ টাকা ছিল
পুলিশের সন্দেহ, ওই এটিএম মেশিনে আগে থেকেই নজর ছিল দুষ্কৃতীদের। টাকা রাখার বিষয়ে নিশ্চিত হওয়ার পরেই লুঠের ছক কষে তারা। সেই হিসেবেই রাত সাড়ে ৩টে নাগাদ এটিএমে হানা দেয় ওই দলটি। সঙ্গে একটি গাড়িও নিয়ে যায় তারা। ছক অনুযায়ী, আস্ত মেশিন গাড়িতে তুলে কোথাও লুকিয়ে রাখার পরিকল্পনা করেছিল তারা। পরে সুবিধে মতো ভল্ট ভেঙে টাকা বের করে নিত তারা
তদন্তকারী পুলিশ অফিসারদের ধারণা, এই দলটি অপরাধের সঙ্গে যুক্ত থাকলেও আগে কখনও এটিএম মেশিন লুঠ করেনি তারা। বিষয়টি ধারণাও কম ছিল তাদের। সে জন্যই ভোর রাতে অপারেশন শুরু করে তারা। ওই ধরনের এটিএম মেশিন ভেঙে গাড়িতে তুলতে কম করে হলেও দুই ঘণ্টা লাগার কথা। তাতে ভোর হয়ে যাওয়াটা স্বাভাবিক ছিল
ছাড়া এটিএমের ভিতরে সিসিটিভি ক্যামেরাতে যে তাদের ছবি উঠে যাবে, তা নিয়েও সঠিক ধারণা ছিল না দুষ্কৃতীদের। তাই সেগুলি নিয়েও তারা চিন্তিত ছিল না। ভেটাগুড়ি বাজারে দুজন সিভিক ভলেন্টিয়ার পাহারায় থাকেন। বাসিন্দারা জানান, ভোরে রাস্তার মধ্যে মেশিন পড়ে থাকতে দেখে তারা সিভিক ভলেন্টিয়ারকে খবর দেন। তারা পুলিশকে খবর দেয়
ধৃতদের কাছ থেকে এটিএম মেশিন ভাঙার যন্ত্রপাতি উদ্ধার করা হয়েছে। মেশিনের কিছু যন্ত্রপাতিও উদ্ধার হয়। বাসিন্দারা বলেন, এটিমগুলির নিরাপত্তা বাড়ানো উচিত। না হলে যেখানে এটিএম মেশিন আছে সেখানে পুলিশি নিরাপত্তা বাড়ানো উচিত।