SlideShare una empresa de Scribd logo
1 de 5
City Wide Surveillance Using Search Based Video <br />Drinking from a Video Fire Hose Can be Tricky<br />London’s city-wide transit surveillance system, the ‘ring of steel,’ includes more than ten thousand cameras.   And three thousand plus cameras have been deployed in Chicago, as well, with three thousand more soon coming to New York City.  New Orleans, Baltimore, Philadelphia and more have all moved forward with new city-wide and transit authority surveillance projects too.  Internationally, Taipei recently announced a thirteen thousand camera city-wide initiative, and largest of them all, Beijing deployed a staggering 300,000 cameras prior to Olympics.  <br />Collectively more cities have deployed more cameras to more purposes in the past few years than in previous decades combined.  And with fast networks and hi-resolution cameras, surveillance video spigots are on and running at full blast.  <br />Now we just need to figure out how to take a drink. <br />Cities and transportation authorities are fast discovering that in addressing security and safety problem through video surveillance, they have created another: information overload.  It’s the same problem folks at the NSA, CIA, and in signal intelligence realized they had many years ago after proliferating their countless satellites and listening posts.  What were they going to do with all that information?  How could they sift through countless hours of nothing looking for that rare something? Today this problem has led many to question the ultimate efficacy of video as a security tool in human and cargo transit systems.<br />In London the opponents of the so-called ‘Ring of Steel’ argue that despite their 10,000 plus cameras more than 80% of crimes remain unsolved.  And after the London bombings in 2005, it literally took thousands of investigators more than six weeks to actually comb through the cities vast surveillance archives looking for clues to the bombing and its perpetrators.  Clearly this isn’t the kind of effort that can be deployed in more routine circumstances, and so it’s no wonder that despite massive camera proliferation in London so most crimes go unsolved. <br />In some enterprising small cities such as Lancaster, Pennsylvania, citizens are given the ability to access and manipulate the cameras in an attempt to address these kinds of problems giving new meaning to “neighborhood watch.”   Still many studies question whether enough has been done to really make video surveillance ‘effective.’  For instance, recent studies in San Francisco and Los Angeles claim zero impact on crime.<br />This will remain a problem so long as these deployments are hampered by an unmanaged and unmanageable deluge of video.   You can’t find what you can’t see.<br />How many cameras do you need to have before you can’t see ANYTHING?<br />The critical question that no one is asking is how do you make the captured video relevant to safety and security? While many articles and studies focus on how to network cameras effectively, how to cover hard to reach spots with specialized cameras, whether to locate intelligence at the edge or on a server, and how video analytics will magically find a terrorist in the act of contemplating a catastrophic attack, no one has put forward a workable model for making video useful in a transportation safety related scenario. <br />How will video technology stop the assault of a citizen? How can we foil the plots of those bent on mass destruction, and how can we do it in such a way that salvages the millions of dollars spent to implement these extensive camera systems. <br />Making Good on Transportation Safety Claims<br />The problem with big video really comes down to its inherent lack of structure.  Analog or IP, standard resolution or megapixel, surveillance video is all essentially unstructured stuff.  In contains no notes, no tags or descriptions, and no keywords to help you separate what’s important from what is not.  That is a problem.  It means that for the most part video is useless without a person to make sense of it, and we just don’t have enough people to keep up with all the video we are generating.  Estimates are that we’ve deployed about 30 million cameras in the world; that works out to be more than 250 BILLION new hours of recorded video every year.<br />But if we could teach computers to make sense out video, even a little, that means we could make it searchable.  And a good search engine, we have learned, can change the world.  Imagine the internet without a search engine.  There are over ten billion web pages…more.  Users would sift aimlessly through content rarely striking on something useful and necessary to their point of interest. If they did, they would not be able to indicate their interest in topics like this and find similar content. In short, search makes the internet usable. <br />And yet, somehow this information revolution that improved productivity in other knowledge management industries has not yet to transform our approaches to surveillance.  Law enforcement and security staff are often left to sift through countless hours of video footage in order to pinpoint those vital few moments of video. Once found, the process of finding more video related to the same person or event is often just as arduous as the first inquiry. <br />Video search technology exists to make video relevant. Searching on an event by time and place, license plate, serial number, face, color, toll transaction, or other relevant data point can rapidly narrow the video data set down to a volume that can quickly be sifted and analyzed by the human eye. <br />Take for example a purse is stolen on the subway. The victim reports the time and location of the assault, but the actual assault did not happen in an area in the field of view of a camera. In most instances, the victim would have little recourse other than to complete a crime report. <br />With search based video surveillance, however, the investigating party could rapidly pull up video from motion events in the surrounding area and times, broadening the search to achieve more results presented in an easy to scan form. In less than a few seconds, they spot the perpetrator exiting the subway with the purse. Without search, the operator would only have been able to find this video if he had the time and willingness to manually review video from each possible camera feed. <br />Searching for Faces, License Plates, Objects, Colors and More<br />But search for what?  Search engines like Google rely on things like keywords and page ranks and the fact that web page text can be analyzed and cross indexed to make meaningful searches possible.  Video is completely different, but it too can be analyzed for things like faces, license plates, colors, object tracks, and more.  And when this data is processed and cross indexed an incredible understanding of activity and identity can emerge from video.<br />Once relevant video analytics are implemented and tuned, the game changes entirely in favor of law enforcement. License plate recognition, commonly used to stop toll evaders, is often dismissed as a crime stopping tool because the technology requires highly tuned and expensive cameras to be implemented. Technology now exists that allows common cameras to track license plates anywhere from a car rental agency to a city intersection. <br />And while facial recognition is a dirty word in some video surveillance circles, the technology’s promise to deliver more criminals to justice is being realized in transit scenarios. Much of this can be attributed to the dramatic increase in accuracy of face finding technologies in recent years. Where tests of facial recognition in German subways in 2006-2007 yielded accuracy rates of around 60%, recent studies conducted in South Korea show that new technologies can achieve accuracy of closer to 85% with very low instance of false positives.  <br />Moving from Reactive to Pro-active<br />We will all know that our efforts at developing transportation based video surveillance systems will be reached when we read the headline “Terrorist Plot Foiled, Suspects Captured using Video Surveillance, No Citizen Harmed.” <br />For this to happen, search is simply not sufficient as it is by its nature a forensic tool. But, if you turn search on its head, you have alerts. Just as Google can send you information pertaining to topics of interests, so can advanced video surveillance systems provide alerts related to events, people, cars, and other items of interest. <br />For transit security professionals this answers the question “what should I be looking at?” Rather than asking security staff to stare dumbly into monitors hoping to see something that may or may not be happening, why not provide that staff with a steady stream of events (face events, motion events, license plate events, etc) that point to activity that might be of interest. <br />Visiting the example of our ill intentioned thief again, let’s assume that he did indeed get away with stealing the woman’s purse, and we now have isolated three instances of him on video that provide evidence of three different thefts. Flagging this video we ask the system to alert us the next time he enters the transportation system.  True to his pattern, he returns to the subway and attempts to position himself in the same “off camera”  location where he committed his other crimes. This time, monitoring staff are alerted to his presence in the system before he has a chance to act, and they are able to apprehend him. <br />While video analytics can surface suspicious activities, objects, and people, the trick to making alerts work is managing false positives. If every alert turns out to be a false positive and actual criminal behavior is missed, then the system is no more useful than the proverbial sleeping security guard.  In the Korea subway use case mentioned above, in each case that a “watchlist” suspect entered the subway, the system accurately alerted staff to the presence of the individual. While alerts did come through that turned out to be false, the volume was at a tolerable level that did not reduce the efficiency of the operation. <br />Key Considerations in Using Video Analytics in Transportation Use Cases<br />The Minority Report is just a movie. What you see on CSI, NCIS, Las Vegas and any other crime television drama is also fake.  Though these images often form the basis of what users expect to be able to do with a system, they are not realistic use cases for video technology. However, never before have so many valuable use cases been within our grasp allowing safety and security professionals to gain the upper hand and narrow the chances of a criminal’s escape. <br />To successfully leverage intelligent video in a transportation setting, it is important to simplify and integrate.  Find a system that provides a platform for the integration of a wide variety of cameras, data systems, and analytics.  By starting with a platform that is easy to integrate to,  they system will be able to flex to meet several use cases. <br />Uses cases are the crux of an effective implementation. Transportation surveillance by its nature focuses on the rapid motion of a large number of people and objects over a wide area. Too often, video systems are installed in such a way that they see too much of the very big picture and not nearly enough of the detail. While tracking a wide area is a catch all use case, it does nothing to solve the problem of too much video. To create effective use case, institutions should not to implement a wide reaching dragnet but rather should address individual use cases, develop, implement, and tune them until they work. <br />As New York found in the 1990’s, the key to overall crime reduction was to crack down on specific small crimes – graffiti, littering, public drunkeness. Define the use case, how you would solve it, and then determine the proper equipment, search tools, and analytics that will allow your organization to address the behavior effectively from a reactive and proactive stance. Toll jumpers, freight from a suspicious location, or unattended bags are good examples of use cases that can be addressed and managed with video analytics. Once you conquer one, move on to another. Soon enough you will see that you have solved several individual problems, but what you have really done is created fewer and fewer options for criminals to destabilize transit systems and endanger the people and cargo that move through them. <br />Surfing the Tidal Wave<br />We stand at a turning point in the development of video as a tool to stop crime in our nation’s transportation systems.  Cameras have created a tidal wave of near indecipherable visual information.  To surf it, we are going to have to combine the knowledge from our intelligence communities, the most innovative system design, and the best and brightest from the IT industry.  It will require us embrace and hone new tools and technologies, teaching the right video to surface itself. But in the end, making sense out of video and making it searchable is the only way to begin to fulfill on the promise of video as a tool to keep travelers, trade, and our nation safe. <br />
City Wide Surveillance Using Search Based Video
City Wide Surveillance Using Search Based Video
City Wide Surveillance Using Search Based Video
City Wide Surveillance Using Search Based Video

Más contenido relacionado

Similar a City Wide Surveillance Using Search Based Video

Body Cameras For Police Could Be One Smart-Step
Body Cameras For Police Could Be One Smart-StepBody Cameras For Police Could Be One Smart-Step
Body Cameras For Police Could Be One Smart-StepBrenda Thomas
 
RTCC Stakeholder BLOG_V1
RTCC Stakeholder BLOG_V1RTCC Stakeholder BLOG_V1
RTCC Stakeholder BLOG_V1Jeff Menken
 
ASI Intelligent CCTV article
ASI Intelligent CCTV articleASI Intelligent CCTV article
ASI Intelligent CCTV articleEugene Gerstein
 
Modern trends in police force
Modern trends in police forceModern trends in police force
Modern trends in police forceK J Singh
 
The 5 Biggest Tech Trends In Policing And Law Enforcement
The 5 Biggest Tech Trends In Policing And Law EnforcementThe 5 Biggest Tech Trends In Policing And Law Enforcement
The 5 Biggest Tech Trends In Policing And Law EnforcementBernard Marr
 
Beyond Surveillance Data Control and BodyCameras Joh, .docx
Beyond Surveillance Data Control and BodyCameras  Joh, .docxBeyond Surveillance Data Control and BodyCameras  Joh, .docx
Beyond Surveillance Data Control and BodyCameras Joh, .docxtangyechloe
 
Accenture video-analytics-operational-marketing-and-security-insights-from-cctv
Accenture video-analytics-operational-marketing-and-security-insights-from-cctvAccenture video-analytics-operational-marketing-and-security-insights-from-cctv
Accenture video-analytics-operational-marketing-and-security-insights-from-cctvSunanda Balla
 
In More Cities, a Camera on Every Corner, Park and Sidewalk NPR Article
In More Cities, a Camera on Every Corner, Park and Sidewalk NPR Article In More Cities, a Camera on Every Corner, Park and Sidewalk NPR Article
In More Cities, a Camera on Every Corner, Park and Sidewalk NPR Article ctpeterson
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxwebb00704
 
Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial RecognitionJennifer York
 
sousveillance and surveillance
sousveillance and surveillancesousveillance and surveillance
sousveillance and surveillancemseabarbosa
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docxmayank272369
 
AnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTraffickingAnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTraffickingTurner Sparks
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docxhyacinthshackley2629
 
CitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_AnalysisCitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_AnalysisPatrick Floto
 

Similar a City Wide Surveillance Using Search Based Video (20)

Body Cameras For Police Could Be One Smart-Step
Body Cameras For Police Could Be One Smart-StepBody Cameras For Police Could Be One Smart-Step
Body Cameras For Police Could Be One Smart-Step
 
RoboCop World
RoboCop WorldRoboCop World
RoboCop World
 
Surveillance
SurveillanceSurveillance
Surveillance
 
RTCC Stakeholder BLOG_V1
RTCC Stakeholder BLOG_V1RTCC Stakeholder BLOG_V1
RTCC Stakeholder BLOG_V1
 
ASI Intelligent CCTV article
ASI Intelligent CCTV articleASI Intelligent CCTV article
ASI Intelligent CCTV article
 
Modern trends in police force
Modern trends in police forceModern trends in police force
Modern trends in police force
 
The 5 Biggest Tech Trends In Policing And Law Enforcement
The 5 Biggest Tech Trends In Policing And Law EnforcementThe 5 Biggest Tech Trends In Policing And Law Enforcement
The 5 Biggest Tech Trends In Policing And Law Enforcement
 
Developing technology
Developing technologyDeveloping technology
Developing technology
 
Beyond Surveillance Data Control and BodyCameras Joh, .docx
Beyond Surveillance Data Control and BodyCameras  Joh, .docxBeyond Surveillance Data Control and BodyCameras  Joh, .docx
Beyond Surveillance Data Control and BodyCameras Joh, .docx
 
Accenture video-analytics-operational-marketing-and-security-insights-from-cctv
Accenture video-analytics-operational-marketing-and-security-insights-from-cctvAccenture video-analytics-operational-marketing-and-security-insights-from-cctv
Accenture video-analytics-operational-marketing-and-security-insights-from-cctv
 
Techtalk february 2018
Techtalk february 2018Techtalk february 2018
Techtalk february 2018
 
In More Cities, a Camera on Every Corner, Park and Sidewalk NPR Article
In More Cities, a Camera on Every Corner, Park and Sidewalk NPR Article In More Cities, a Camera on Every Corner, Park and Sidewalk NPR Article
In More Cities, a Camera on Every Corner, Park and Sidewalk NPR Article
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial Recognition
 
sousveillance and surveillance
sousveillance and surveillancesousveillance and surveillance
sousveillance and surveillance
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
Pros and cons of today
Pros and cons of todayPros and cons of today
Pros and cons of today
 
AnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTraffickingAnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTrafficking
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
CitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_AnalysisCitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_Analysis
 

Último

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

City Wide Surveillance Using Search Based Video

  • 1. City Wide Surveillance Using Search Based Video <br />Drinking from a Video Fire Hose Can be Tricky<br />London’s city-wide transit surveillance system, the ‘ring of steel,’ includes more than ten thousand cameras. And three thousand plus cameras have been deployed in Chicago, as well, with three thousand more soon coming to New York City. New Orleans, Baltimore, Philadelphia and more have all moved forward with new city-wide and transit authority surveillance projects too. Internationally, Taipei recently announced a thirteen thousand camera city-wide initiative, and largest of them all, Beijing deployed a staggering 300,000 cameras prior to Olympics. <br />Collectively more cities have deployed more cameras to more purposes in the past few years than in previous decades combined. And with fast networks and hi-resolution cameras, surveillance video spigots are on and running at full blast. <br />Now we just need to figure out how to take a drink. <br />Cities and transportation authorities are fast discovering that in addressing security and safety problem through video surveillance, they have created another: information overload. It’s the same problem folks at the NSA, CIA, and in signal intelligence realized they had many years ago after proliferating their countless satellites and listening posts. What were they going to do with all that information? How could they sift through countless hours of nothing looking for that rare something? Today this problem has led many to question the ultimate efficacy of video as a security tool in human and cargo transit systems.<br />In London the opponents of the so-called ‘Ring of Steel’ argue that despite their 10,000 plus cameras more than 80% of crimes remain unsolved. And after the London bombings in 2005, it literally took thousands of investigators more than six weeks to actually comb through the cities vast surveillance archives looking for clues to the bombing and its perpetrators. Clearly this isn’t the kind of effort that can be deployed in more routine circumstances, and so it’s no wonder that despite massive camera proliferation in London so most crimes go unsolved. <br />In some enterprising small cities such as Lancaster, Pennsylvania, citizens are given the ability to access and manipulate the cameras in an attempt to address these kinds of problems giving new meaning to “neighborhood watch.” Still many studies question whether enough has been done to really make video surveillance ‘effective.’ For instance, recent studies in San Francisco and Los Angeles claim zero impact on crime.<br />This will remain a problem so long as these deployments are hampered by an unmanaged and unmanageable deluge of video. You can’t find what you can’t see.<br />How many cameras do you need to have before you can’t see ANYTHING?<br />The critical question that no one is asking is how do you make the captured video relevant to safety and security? While many articles and studies focus on how to network cameras effectively, how to cover hard to reach spots with specialized cameras, whether to locate intelligence at the edge or on a server, and how video analytics will magically find a terrorist in the act of contemplating a catastrophic attack, no one has put forward a workable model for making video useful in a transportation safety related scenario. <br />How will video technology stop the assault of a citizen? How can we foil the plots of those bent on mass destruction, and how can we do it in such a way that salvages the millions of dollars spent to implement these extensive camera systems. <br />Making Good on Transportation Safety Claims<br />The problem with big video really comes down to its inherent lack of structure. Analog or IP, standard resolution or megapixel, surveillance video is all essentially unstructured stuff. In contains no notes, no tags or descriptions, and no keywords to help you separate what’s important from what is not. That is a problem. It means that for the most part video is useless without a person to make sense of it, and we just don’t have enough people to keep up with all the video we are generating. Estimates are that we’ve deployed about 30 million cameras in the world; that works out to be more than 250 BILLION new hours of recorded video every year.<br />But if we could teach computers to make sense out video, even a little, that means we could make it searchable. And a good search engine, we have learned, can change the world. Imagine the internet without a search engine. There are over ten billion web pages…more. Users would sift aimlessly through content rarely striking on something useful and necessary to their point of interest. If they did, they would not be able to indicate their interest in topics like this and find similar content. In short, search makes the internet usable. <br />And yet, somehow this information revolution that improved productivity in other knowledge management industries has not yet to transform our approaches to surveillance. Law enforcement and security staff are often left to sift through countless hours of video footage in order to pinpoint those vital few moments of video. Once found, the process of finding more video related to the same person or event is often just as arduous as the first inquiry. <br />Video search technology exists to make video relevant. Searching on an event by time and place, license plate, serial number, face, color, toll transaction, or other relevant data point can rapidly narrow the video data set down to a volume that can quickly be sifted and analyzed by the human eye. <br />Take for example a purse is stolen on the subway. The victim reports the time and location of the assault, but the actual assault did not happen in an area in the field of view of a camera. In most instances, the victim would have little recourse other than to complete a crime report. <br />With search based video surveillance, however, the investigating party could rapidly pull up video from motion events in the surrounding area and times, broadening the search to achieve more results presented in an easy to scan form. In less than a few seconds, they spot the perpetrator exiting the subway with the purse. Without search, the operator would only have been able to find this video if he had the time and willingness to manually review video from each possible camera feed. <br />Searching for Faces, License Plates, Objects, Colors and More<br />But search for what? Search engines like Google rely on things like keywords and page ranks and the fact that web page text can be analyzed and cross indexed to make meaningful searches possible. Video is completely different, but it too can be analyzed for things like faces, license plates, colors, object tracks, and more. And when this data is processed and cross indexed an incredible understanding of activity and identity can emerge from video.<br />Once relevant video analytics are implemented and tuned, the game changes entirely in favor of law enforcement. License plate recognition, commonly used to stop toll evaders, is often dismissed as a crime stopping tool because the technology requires highly tuned and expensive cameras to be implemented. Technology now exists that allows common cameras to track license plates anywhere from a car rental agency to a city intersection. <br />And while facial recognition is a dirty word in some video surveillance circles, the technology’s promise to deliver more criminals to justice is being realized in transit scenarios. Much of this can be attributed to the dramatic increase in accuracy of face finding technologies in recent years. Where tests of facial recognition in German subways in 2006-2007 yielded accuracy rates of around 60%, recent studies conducted in South Korea show that new technologies can achieve accuracy of closer to 85% with very low instance of false positives. <br />Moving from Reactive to Pro-active<br />We will all know that our efforts at developing transportation based video surveillance systems will be reached when we read the headline “Terrorist Plot Foiled, Suspects Captured using Video Surveillance, No Citizen Harmed.” <br />For this to happen, search is simply not sufficient as it is by its nature a forensic tool. But, if you turn search on its head, you have alerts. Just as Google can send you information pertaining to topics of interests, so can advanced video surveillance systems provide alerts related to events, people, cars, and other items of interest. <br />For transit security professionals this answers the question “what should I be looking at?” Rather than asking security staff to stare dumbly into monitors hoping to see something that may or may not be happening, why not provide that staff with a steady stream of events (face events, motion events, license plate events, etc) that point to activity that might be of interest. <br />Visiting the example of our ill intentioned thief again, let’s assume that he did indeed get away with stealing the woman’s purse, and we now have isolated three instances of him on video that provide evidence of three different thefts. Flagging this video we ask the system to alert us the next time he enters the transportation system. True to his pattern, he returns to the subway and attempts to position himself in the same “off camera” location where he committed his other crimes. This time, monitoring staff are alerted to his presence in the system before he has a chance to act, and they are able to apprehend him. <br />While video analytics can surface suspicious activities, objects, and people, the trick to making alerts work is managing false positives. If every alert turns out to be a false positive and actual criminal behavior is missed, then the system is no more useful than the proverbial sleeping security guard. In the Korea subway use case mentioned above, in each case that a “watchlist” suspect entered the subway, the system accurately alerted staff to the presence of the individual. While alerts did come through that turned out to be false, the volume was at a tolerable level that did not reduce the efficiency of the operation. <br />Key Considerations in Using Video Analytics in Transportation Use Cases<br />The Minority Report is just a movie. What you see on CSI, NCIS, Las Vegas and any other crime television drama is also fake. Though these images often form the basis of what users expect to be able to do with a system, they are not realistic use cases for video technology. However, never before have so many valuable use cases been within our grasp allowing safety and security professionals to gain the upper hand and narrow the chances of a criminal’s escape. <br />To successfully leverage intelligent video in a transportation setting, it is important to simplify and integrate. Find a system that provides a platform for the integration of a wide variety of cameras, data systems, and analytics. By starting with a platform that is easy to integrate to, they system will be able to flex to meet several use cases. <br />Uses cases are the crux of an effective implementation. Transportation surveillance by its nature focuses on the rapid motion of a large number of people and objects over a wide area. Too often, video systems are installed in such a way that they see too much of the very big picture and not nearly enough of the detail. While tracking a wide area is a catch all use case, it does nothing to solve the problem of too much video. To create effective use case, institutions should not to implement a wide reaching dragnet but rather should address individual use cases, develop, implement, and tune them until they work. <br />As New York found in the 1990’s, the key to overall crime reduction was to crack down on specific small crimes – graffiti, littering, public drunkeness. Define the use case, how you would solve it, and then determine the proper equipment, search tools, and analytics that will allow your organization to address the behavior effectively from a reactive and proactive stance. Toll jumpers, freight from a suspicious location, or unattended bags are good examples of use cases that can be addressed and managed with video analytics. Once you conquer one, move on to another. Soon enough you will see that you have solved several individual problems, but what you have really done is created fewer and fewer options for criminals to destabilize transit systems and endanger the people and cargo that move through them. <br />Surfing the Tidal Wave<br />We stand at a turning point in the development of video as a tool to stop crime in our nation’s transportation systems. Cameras have created a tidal wave of near indecipherable visual information.  To surf it, we are going to have to combine the knowledge from our intelligence communities, the most innovative system design, and the best and brightest from the IT industry.  It will require us embrace and hone new tools and technologies, teaching the right video to surface itself. But in the end, making sense out of video and making it searchable is the only way to begin to fulfill on the promise of video as a tool to keep travelers, trade, and our nation safe. <br />