How Video Surveillance Will Help Police ID Those Responsible for the Siege of the U.S. Capitol

Umbrella Technologies CEO Thomas Carnevale explains how law enforcement will likely leverage video and facial recognition to ID the Capitol attackers.

How Video Surveillance Will Help Police ID Those Responsible for the Siege of the U.S. Capitol

In the days immediately following Wednesday’s siege of our National Capitol by rioters who support President Donald Trump, the primary footage that has aired on the news and social media comes from news cameras and phone recordings by individuals located on the scene. While this footage provides a piece of the story, the story’s best perspective will come from the congressional building’s security cameras.

Surprisingly, the media so far is not reporting the insurmountable evidence that will be reviewable by law enforcement based on the video recordings from the congressional video surveillance systems.

As of Thursday night, 82 people had been arrested in connection with the violent mob that overran the U.S. Capitol, according to the Metropolitan Police Department. The majority of these arrests were for curfew violations; however, it is not a stretch to say that law enforcement agencies will be able to identify and charge hundreds or thousands more.

I am confident that if the video surveillance recordings are utilized to their fullest extent, the puzzle pieces will come together. Law enforcement agencies will understand the criminal activity that occurred within the Capitol building and be able to identify individual perpetrators. The video recordings will also provide primary evidence in the trials to convict the individuals who assaulted our democratic institutions and vandalized federal property.

The video surveillance systems located throughout the Capitol building do not use cheap residential security cameras. The equipment that monitors the high traffic and priority spaces is top-of-the-line. The consumer equivalents of these security cameras offer 4K HD video resolution capable of identifying individuals with a level of detail, efficiency and accuracy that was unthinkable a few years ago. There isn’t a fuzzy picture that needs to be “enhanced, enhanced, enhanced”; this is likely a security camera feed with HD resolution.

Here are some other related topics to examine:

What role will facial recognition technology play in identifying individuals that are involved in criminal activity? 

You may have seen law enforcement using facial recognition software in nearly every fictional law enforcement TV show. In reality, facial recognition technology will likely play an important role in sorting out the situation that occurred within the capital. It will be critical to identifying individuals and attributing specific actions to those individuals.

Facial recognition technology utilizes individual physical and biometric characteristics to create a measured and mathematically calculated unique facial signature. The unique facial signatures identified on video surveillance footage are then matched to a database of recognized faces. The database of individuals’ faces could be sourced from governmental databases such as police mugshots of arrested individuals, publicly available social media pictures, or evidence reported to the FBI and law enforcement.

A less well-known feature of advanced security camera technology is rapid forensic search. This feature enables reviewers to find a needle in a haystack and quickly review hours or days of video surveillance evidence in seconds. For example, if reviewers want to see all of the footage of a man wearing a specific outfit, they would be able to rapidly search for that outfit across multiple camera feeds and track that individual’s movements without hours of work.

If you want to help the law enforcement investigation, review the publicly available video footage and photographs and report any individuals you recognize. In your report, I recommend providing your supporting evidence and the name, city, and links to social media profiles of the individual you are reporting. Plus, if you want an example of facial recognition technology in your everyday life, you can look at the technology that is used to recommend tags for your friends in photographs on social media.

You may be wondering if this is legal. Can the government use video surveillance on its citizens who attacked the Capitol?

Yes. Although each state has its legislation on video surveillance in public places, the general rule of thumb across the United States is that video recording (without audio) is allowed — except for places where someone has a reasonable expectation of privacy (e.g., bathrooms, hotel rooms, shower areas, changing rooms, etc.). That means the public hallways throughout the Capitol building and the surrounding grounds can be legally recorded and analyzed to identify criminal activity.

To support this perspective, it is worth referencing the archived version of the Department of Justice Criminal Resource Manual, which states the following:

“Video surveillance, which is the use of closed-circuit television (CCTV) to conduct a visual surveillance of a person or a place, is not covered by Title III. Rather, its use is governed by the Fourth Amendment and, therefore, when a reasonable expectation of privacy exists, a search warrant should be sought pursuant to Fed. ‘…’ 

Accordingly, a search warrant requesting to use video surveillance must demonstrate not only probable cause to believe that evidence of a Federal crime will be obtained by the surveillance, but also should include: (1) a factual statement that alternative investigative methods have been tried and failed or reasonably appear to be unlikely to succeed if tried or would be too dangerous; (2) a statement of the steps to be taken to assure that the surveillance will be minimized to effectuate only the purposes for which the order is issued; (3) a particularized description of the premises to be surveilled; (4) a statement of the duration of the order, which shall not be longer than is necessary to achieve the objective of the authorization nor, in any event, longer than 30 days, measured from the date of the order (without any 10-day grace period to begin interception, but with 30-day extension periods possible); and (5) the names of the persons to be surveilled, if known. 

The Department requires that the investigative agency seeking to use court-ordered video surveillance obtain prior approval from the appropriate Department official. That policy appears at JM 9-7.200.”

I am not a lawyer, but if I review this from a commonsense perspective, it means that law enforcement will be able to use the video surveillance recordings to successfully and thoroughly investigate the acts that occurred during the attack on the U.S. Capitol.

Diving deeper into the video surveillance requirements, criteria #1 is met by law enforcement’s inability to detain and arrest thousands of individuals during the event, given the law enforcement ratios and potential dangers to all involved. Criteria #2 can be met by describing the use of the footage. Criteria #3 and #4 can be specified given that the attack took place in a known location and at a limited time. #5 is written such that it only requires the names of known individuals and does not exclude the use of video surveillance to identify unknown individuals for further investigation.

In some cases, the individuals within the Capitol building were wearing masks. Will those individuals be able to avoid detection due to the masks worn for COVID-19? 

It is highly improbable that a mask that covers part of the individual’s face will make it impossible for law enforcement to identify the person. Even if the individual could keep their mask on during the entire time spent on camera, that doesn’t mean they are unidentifiable. A half-covered face still shows half the face. The person’s eyes, face shape, and facial structure are all still clearly visible to cameras.

These security cameras also recorded the individual from multiple angles for an extended amount of time. Software programs are available to recreate an approximation of what the remainder of the face looks like behind the mask. When you combine that with the additional evidence from data location and social media sharing, law enforcement will still be able to identify the majority of individuals involved in the riotous behavior in Washington D.C.


Thomas Carnevale is CEO of Aurora, Ill.-based Umbrella Technologies, a commercial security consulting and integration firm. This article originally was published in CS sister publication, Security Sales & Integration, and has been edited.

If you appreciated this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!

Leading in Turbulent Times: Effective Campus Public Safety Leadership for the 21st Century

This new webcast will discuss how campus public safety leaders can effectively incorporate Clery Act, Title IX, customer service, “helicopter” parents, emergency notification, town-gown relationships, brand management, Greek Life, student recruitment, faculty, and more into their roles and develop the necessary skills to successfully lead their departments. Register today to attend this free webcast!

One response to “How Video Surveillance Will Help Police ID Those Responsible for the Siege of the U.S. Capitol”

  1. DEREK TRIMBLE says:

    I have had the privilege of being in the high end of the security industry for over 40 years and find myself constantly trying to separate fact from fiction. It is impossible to identify a person using facial recognition when they are wearing a full facial mask/gas mask. There are just not enough reference points to extract accurate information …..and yes I have done sites where that is necessary (Ebola level 3 to level 4 containment) and in those instances used Iris Recognition viewing the eyes (Iris) through a gas mask and done sites where we have in fact used four factor authentication. As a publisher you are put in a difficult role trying to identify fact from fiction – especially if they bring financial gain to your publication. To the reader – their reading and subsequent lean based on the content brings challenges. If you are to be a “factual source for content” – it is critical that you are accurate.

Leave a Reply

Your email address will not be published. Required fields are marked *

Get Our Newsletters
Campus Safety Conference promo