Bearing in mind that this is a 30 billion dollar industry, casino surveillance and security is extremely important to the casino world. A physical security force watches the floor and takes action if there are calls for help and reports of illegal and/or suspicious activities, while the specialized casino surveillance section works the closed circuit television system in an attempt to spot any wrongdoing by visitors or staff.
Billions of dollars go through casinos every year. Twenty-four hours a day, 365 days a year, surveillance staff must ensure that no one enters or leaves the casino without the knowledge of management. How is this gargantuan feat in casino surveillance accomplished? Casino security teams use different types of cameras, including PTZ (point, tilt and zoom), and megapixel technology, which consumes less bandwidth, allowing for cheaper and more extensive video surveillance.
In addition to casino camera security, employees are expected to keep their eyes on the games and patrons to make sure everything goes well. The routines and patterns of casino games is another, more subtle aspect to security. The surveillance team monitors the reactions and motions of the players, so that when someone does something out of the ordinary, it’s easy for them to spot.
Here are some guidelines on casino rules that will keep you on the good side of security:
• Never handle any game equipment with both hands
• It’s all right to watch if you’re not playing a game, but don’t distract the other players
• Once you’ve placed your bet, don’t touch your chips
• Wait until all bets have been paid up to collect your winnings
• Ask the dealer to place bets for you
• Never place any items other than chips on the gaming table
Casino security must also extend to electronic games, whether in the building or online. The industry is now in the throes of moving its slots, video poker and other electronic game machines to more sophisticated, networked, interactive, centrally-managed server-based games. Security requirements have grown more complex, taking in the principles of cryptography, digital signatures and private access keys.