Surveillance


Article: Helping to Counter the Terrorist Threat using Face Recognition

Forensic Media Analysis Integrated with Live Surveillance Matching

You can download a PDF copy of this article by clicking this link.

 

Against the backdrop of budget constraints, threats from terrorism, organised crime and public disorder continue to rise. Authorities can remain resilient through the targeted application of technology. Advances in face recognition coupled with the mass availability of digital media and continuously cheaper computing provides unique opportunities to enhance the efficiency of forensic investigations to enhance public safety. Processing of digital media can be automated in a virtualised and elastic computing environment to identify and extract actionable intelligence. Processing is scalable, continuous, consistent and predictable. Analysts can focus on investigating and confirming suggested results rather than watching countless hours of media in the hope of stumbling across intelligence. Such a centralised platform can also be used to search in near real-time faces from any number of remote cameras against centralised watchlists of individuals of interest.

1. A Need for Enhanced Safety and Operational Efficiency

Risks are increasing. Recent events demonstrate that the threat landscape is substantial and becoming more fragmented, consisting of a greater number of smaller and less sophisticated plots. The targeted application of technology can play a key role in improving the efficiency of our police and intelligence agencies and maintaining readiness to both disrupt and respond to major events.

2. A Relentless Increase in Digital Media

The increase in media is relentless. Law enforcement and intelligence agencies have amassed large collections of video and photographic information from multiple sources such as:

  • Digital Forensics (confiscated phones, computers, flash drives etc).
  • Open Source Intelligence (Internet and Dark Web).
  • Crowd- sourced from members of the public (HD cameras on mobile phones are ubiquitous).
  • Police Body Worn Video.

When tragic events or social disorder occur, investigators have a long and arduous task of reviewing countless hours of media, generally with a varying degree of concentration and scrutiny.

A solution that minimises manual effort in the extraction of actionable intelligence from amassed media by automating this process with a consistent and repeatable level of scrutinywill deliver concise and consistent information in a fraction of the time taken by operators undertaking the task manually.

3. An Automated Media Processing and Exploitation Solution

Police, intelligence and other public order agencies can benefit from the application of a powerful media processing solution designed to ingest, analyse and index, in an automated fashion, very large quantities of media from multiple sources to transform them into usable assets. Utilising virtualised and elastic computing environments enables the platform to be rapidly scaled up and down in response to unfolding events.

Once processed, agencies can analyse and make use of the extracted assets and manage them in a centralised repository of information. Data links, associations and metadata inferences can be managed across the whole dataset by multiple users from a single common user interface. Backend processing services are run in a cloud-computing environment, the capacity of which can be configured and incrementally scaled up and down to meet an organisation’s changing demands; peaks arising from specific events can be easily accommodated.

Features include:

  • Automatically find, extract and index faces to enable biometric and biographic searching of media.
  • Create and manage watchlists of people of interest.
  • Find and cross-reference all media instances in which a person of interest has been seen.
  • Identify, locate, and track persons of interest, their associates and their activities across all media.
  • Discover, document and view links between people of interest, their activities and networks.
  • Use of metadata (including geo data) to enhance investigations and association of data.
  • Integration into existing system environments, databases and components.

3.1  Incorporating Other Detection Capabilities

In addition to face recognition, other detection engines can be incorporated, such as:

  • Biographic filtering and Fuzzy Match capability.
  • Automatic Number Plate Recognition. (ANPR)
  • Voice Biometrics.
  • Object / Logo Recognition.

Vendor independence allows the use best-of-breed algorithms. Newer and better algorithms (COTS and GOTS) can be plugged in without having to replace the entire platform.

3.2  Working with Geo-Location Data

An increasing amount of media is captured on devices affixed with location determining technology. Often, this geo-location data is incorporated into the media metadata, thereby providing potential to further enhance the analysis of media. Geo-location can be used to:

  • Compartmentalise and refine analysis by location of media creation.
  • Overlay location of proposed matches onto maps.
  • Chart movements of individuals of interest by location and time of sightings.
  • Link individuals at the same location and time even if they do not appear together in media.

3.3  Architecture and Integration with Existing Systems

In addition to utilising COTS components, open standards and cloud-computing architecture to enable massive scalability, a well delineated scope of functionality and open API enables:

  • Flexibility in customisation and integration with existing systems and workflows.
  • Well-defined mechanisms of loading data and automating ingestion of media.
  • Dynamic alteration and sharing of watchlists, media, system-generated results and operator analysis.

3.4  Hosting, Cloud and Virtualisation Options

Full architectural flexibility enables flexibility of hosting options. Organisations can elect to:

  • Take advantage of IaaS and SaaS options on public sector hosting offerings.
  • Fully self-host the solution on private and secure premises and datacentres.
  • Deploy in a hybrid manner.

Indeed, managed AWS or Azure offerings can be utilised to bulk process media, utilising non-return gateways to propagate identified sensitive data to more secure facilities.

3.5  Working Hand-in-Glove with Trained Forensic Investigators

Humans will always remain the critical and essential part of intelligence analysis; such solutions do not replace the intricate skills and knowledge of trained investigators. Rather, the operator is enabled to intelligently direct and apply their training at suggested results, eliminating the necessity of rote viewing of countless hours of media either in a sequential our random fashion.

Integration of enhanced verification, charting and mapping tools enables operators to conduct detailed analysis of suggested matches and identifications.

 

4 Potential Use Cases

There are multiple applications of a solution as described herein within military, law enforcement, intelligence and public-site security agencies. These are summarised into four broad categories:

4.1  Time Critical Investigations, Media of Critical Importance

Often, authorities need to quickly process evidence to identify and apprehend individuals. The scale of the investigation can be huge and the amount of media that needs to be processed massive.

The media acquired in these instances can be of such critical importance that the authorities may choose to review it all in its entirety. However, immediate and decisive action is critical. Rather than sifting through the media in a random or sequential fashion, a media analysis solution can quickly direct the investigators to portions of the media that are most likely to deliver immediate results. Full review of the media can be conducted afterwards.

4.2  Bulk Ingestion of Media Arising from Criminal Investigations

During routine operations or investigations, authorities may recover significant quantities of media from multiple sources that need to be processed to further the investigation or to assist in building an evidence base for prosecution. Examples include:

  • Military or counter-terror officers raiding terrorist facilities.
  • Specialist organised crime investigators raiding organised crime offices.
  • Child protection officers raiding premises of individuals or organisations involved in child exploitation.

Automating processing provides investigating officers an overall summary of the contents including focus areas for further investigation.

4.3  Continuous Background Processing of Media Sources

Authorities may as a matter of routine have access to masses of media which may contain actionable intelligence, but typically would never be viewed or processed due to a lack of resource. Intelligence in this media may be missed entirely and never acted upon.

This media can now be bulk ingested and processed in an automated fashion to flag relevant intelligence, using operator controlled criteria, to the authorities as required for follow-up processing.

  • Routine and automated processing of accessible media can flag actionable intelligence that may help disrupt future attacks.

4.4  Near Real-Time Watchlist Checking from Live Surveillance Cameras

By integrating any number of remote surveillance cameras to such a centralised matching platform eliminates the need to install and maintain costly local software and hardware to perform local face matching as well as the need to store potentially secure watchlist data locally at the camera locations. The problems associated with live streaming of HD media over low bandwidth network connections is resolved through the application of local face-detection and cropping; only small image files of cropped faces need be sent to the central data centre over encrypted channels.

4.4.1        Centralised Archive of “Seen Faces”

In addition to submitting search probes to the server for searching against one or more watchlists, search probes can be enrolled in a “seen faces” archive which can be interactively or automatically searched (using face recognition) by investigators or when submitting videos for processing.

 

5 A Compelling Business Case

The solution can be made available using a compelling SaaS model. The open and standard nature of the solution ensures it can run in existing on-premise datacentres or outsourced to secure hosting partners.

Whilst the human operator is an essential part of intelligence analysis, an entry-level system empowers the analyst to process up to an order-of-magnitude more media on a daily basis. This enables trained operators to apply their expertise in a more focussed manner than manually watching hour upon hour of media.

Efficiency is dramatically boosted by bulk processing media 24×7 at a constant and predictable level of focus and accuracy: operational staff can focus on analysing results.

 

6 Summary

Security concerns are increasing whilst budgets are limited. The focussed application of technology can improve efficiency and aid law enforcement agencies to rise to this challenge.  The massive increase in the creation of digital media and the availability of cheap computing provides authorities with the ability to bulk ingest and process media in an automated fashion. Results are continuous and predictable. Trained analysts can now focus their skills on investigating suggested results and on intelligence extracted by automated systems. Not only does this provide the ability to process critical media even faster than ever before to respond to time critical investigations, but it also enables authorities to extract intelligence from media sources that in the past may never even have been looked at because of the significant resource this previously would have entailed. The same centralised platform can also be used to search in near real-time faces from any number of remote cameras against centralised watchlists of individuals of interest.


Allevate in the Securing Crowded Places Immersive Demonstrator at UK Security Expo

Allevate is pleased to participating with Sungard Availability Services in the Securing Crowed Places Immersive Demonstrator at the UK Security Expo on the 30th November and 1st December 2016 at Olympia, London.

The Immersive Demonstrator at UK Security Expo 2016 will be under the theme of ‘Securing Crowded Places’ run in association with The Home Office JSaRC, the Centre for the Protection of National Infrastructure (CPNI) and other relevant Government Departments.

Using the event venue itself as the place to be protected, the aim is to provide an integrated experience in which visitors are able to see innovative technologies and techniques in operation.  This will provide a realistic context as well as allowing discussion with Government and industry experts.

Allevate will be demonstrating real-world uses of Tygart’s MXSERVER to deploy watchlist detection using face recognition, and the application of face recognition to aide the post-event forensic analysis.

Allevate will be participating with our partners, Sungard Availability Services, Physical Tracking Systems, and Facewatchsungard

Additionally, Allevate’s founder Carl Gohringer will be providing a live demonstration of MXSERVER in the Technology Workshops and Live Demonstrations conference stream of the exhibition, entitled “Beyond Live Surveillance: The Application of Face Recognition to Improve Forensic Analysis of Masses of Digital Media”, Day 2, 1st December, 2016 at 1240pm.

We look forward to seeing you at the exhibition on stand A41 in collaboration with Sungard Availability Services.


Allevate Seeking Global Distributors and Agents for Face-Searcher Service

Allevate is actively seeking global distributors and agents for its new cloud-hosted Face-Searcher Service integrated with Facewatch’s secure online crime reporting service. The integrated offering enables businesses, public and police to tackle low-level crime by sharing images within groups and then utilise cloud-hosted face recognition to raise alerts back to the business.

Key Benefits:

  • No complicated software to install or maintain.
  • Enables businesses to collaborate with each other and the police by sharing imagery.
  • Integrated with the industry’s best biometric algorithms.
  • Affordable monthly service fee with no or minimal up-front capital expenditure.

 

Already launched in Brazil, the integrated service is available globally and we are now seeking both:

  • Leading security and surveillance organisations to act as a distribution channel.
  • Agents to manage and on-board distributors within specific geographic territories.

The Value to You

Our integrated offering supplies our distribution channel with an affordable, SaaS structured offering to augment your already successful and credible security and surveillance operation with a cloud-hosted and easy to maintain facial recognition service.

Coupled with your extensive experience in CCTV installation and configuration and control room and monitoring services, it adds further value that enables your customers to collaborate with each other and the police and to further enhance the security of their premises with face recognition.

 

If you are interested or to find out more, please do not hesitate to contact us here.

Download a datasheet on Face-Searcher here.

 

 

 


Allevate’s Face-Searcher in Action: Cloud-Enabled Face Recognition

A test-run of Allevate’s Face-Searcher service integrated with the online Facewatch crime reporting system:

  • A camera with a lightweight laptop in the UK
    • Detecting and cropping faces from the video stream
  • Submitting image files of cropped faces for ultra-scalable and accurate face matching in the Cloud in Amazon Web Services in USA.

… with

  • Watchlist data syncronised with a Facewatch test instance in Amazon Web Services in Brazil

… reporting

  • Alerts to the Facewatch test subscriber back in the UK, all in under 3 seconds from sighting of suspect.

Why?

  • Because we can, and to demonstrate the flexibility of our cloud-based matching system.

 

Available now in Brazil., hosted locally in Brazil.

Coming soon elsewhere.

 

Download the Face-Searcher datasheet here.

 

Face-Searcher with Facewatch


Cloud Face Recognition Integrated with Secure Online Crime Reporting Launched in Brasil

 

newsreleaseAllevate’s Cloud-Hosted Face-Searcher Face Recognition Service integrated with the Facewatch secure online crime reporting system is launched in Brasil. This integrated offering, to all organisations large or small, enables the provision of face recognition in the cloud, matching against data-sets created from real-time crime reporting.  

LONDON, UK and Rio de Janeiro, Brasil 17 August 2016:  Allevate today announces the launch of its Face-Searcher service, enabling organisations, large or small, to utilise facial recognition as a hosted cloud service. Additionally, Facewatch, the secure online crime reporting system, announces immediate availability of an integrated Facewatch and Face-Searcher offering, launching initially in Brasil.

Facewatch enables organisations to report crimes online and submit moving and still CCTV images as evidence to the police, as well as share this imagery between businesses in related subscribed groups (in compliance with Data Protection guidelines) to reduce crime.

Allevate’s Face-Searcher service enables organisations to utilise facial recognition as a hosted cloud service. It requires minimal capital outlay, incorporates advanced, world-class face recognition technology and eliminates the need to install or maintain a complicated software infrastructure or related compute platform on your premises. The Face-Searcher Edge component detects and crops faces from retailyour CCTV cameras and submits them to the cloud-service for matching.

Facewatch subscribers can now instantly and automatically share their images of Subjects of Interest to Face-Searcher’s watchlists, thereby allowing real-time watchlist alerting to any device connected to Facewatch’s integrated alert management system. This integrated offering can now help businesses prevent crime by warning them if someone who enters their premises is on a watchlist of known offenders.

Simon Gordon, of Facewatch, says “A major factor that has hindered the wide-scale adoption of face recognition by business has been the requirement to install and manage costly and complex software. Allevate’s cloud-hosted SaaS offering removes this headache and enables businesses to benefit from the accuracy of the industry’s best face recognition algorithms in a cloud-enabled shared-services environment with a simple easy to understand monthly subscription fee.”

Carl Gohringer, of Allevate, continues “The best face-recognition technology in the world is useless unless businesses have accurate and reliable subject matter to match against. Facewatch has already proven invaluable in enabling businesses to seamlessly interact with their local police. Now, they can co-operate by sharing this same imagery amongst their local business groups.”

Face-Searcher is built on the industry-proven enterprise-grade MXSERVERTM platform enabling automated facial detection and recognition, developed by Tygart Technology, Inc. MXSERVERTM is the only biometric search engine on the market designed to handle Big Data (processing massive amounts of photos and videos) by leveraging a cloud-based architecture for faster parallel processing of services.  MXSERVERTM is proven and utilised by Defence, Intelligence and Law Enforcement organisations and has also been used to enhance security at major events, such as the 2015 European Games, a major international sporting event.

This integrated offering is being made available in Brasil by our local partner, Staff Security Ltd. Humberto Bambira, of Staff Security, says “We have been developing this exciting opportunity for the mass market rollout of facial recognition in Brasil with Facewatch for two years and I am delighted to see the launch of the service.”


About Allevate Limited

Founded in London in 2007, Allevate works with law enforcement, intelligence and government agencies to enhance public safety by ensuring positive identification through the application of biometric and identification technology.

  • Ensure Positive Identification
  • Enhance Public Safety
  • Reduce Operational Costs

Visit us at http://allevate.com , email us at contact@allevate.com, call us on +44 20 3239 6399 and follow us at @Allevate.

 

About Facewatch

Founded in London in 2010, Facewatch has worked with UK policing to create the world’s first private sector crime reporting platform that enables business and police to share information securely and instantly.

Visit us at http://www.facewatch.co.uk,  email us at info@facewatch.co.uk, call us on +44 20 7930 3225 and follow us at @Facewatch.

 

About Tygart Technology, Inc.

Tygart Technology, Inc. is a leading provider of enterprise-grade video and photographic analysis and biometric recognition systems.  Tygart provides the U.S. Military, Intelligence Community and Law Enforcement markets with innovative software solutions that manage and automate the processing of massive volumes of digital video and photograph collections.

Visit us at www.tygart.com or call 1-304-363-6855.

 


Video:Enhancing Public Safety with Automated Media Analysis

 

Allevate Presents MXSERVER from Tygart Technology

Security concerns are increasing. Incidents of public disorder and organized crime are on the rise.

The challenges for security services grow more complex. The 7/7 and Boston bombings vividly illustrated the impact of smaller, less sophisticated and more fragmented extremist activities.

Simultaneously, Governments are implementing the most severe budget cuts of recent times. In this landscape, technology can play an increasingly vital role in more efficiently enhancing public safety.

Our security services are faced with a relentless increase in digital media – from police body cameras , online sources such as Facebook and YouTube, confiscated phones and computers and, increasingly, “crowd-sourced” from members of the public.

Allevate is offering MXSERVER from Tygart Technology, a solution that can ingest, analyse and index huge quantities of video and photo media – identifying and highlighting useable intelligence. Trained investigators are freed to intelligently apply their skills without having to view countless hours of media.

Working with Allevate, our security services can more efficiently enhance public safety. We help unlock the intelligence within the vast amounts of media available to police faster than ever before, freeing them to focus on what they are trained to do best – solving and preventing crime and terrorism.


Allevate is Pleased to be Presenting at the 2014 Counter Terror Expo Conference

… in the Practical Counter Terrorism Conference, Day 2, 301th April, 2014

 

Countering the Terrorist Threat via Digital Media Analysis

  • Exploiting digital media to enhance public safety whilst reducing operational budgets
  • Easy and cost-effective routes to access the intelligence in digital media held by law enforcement and intelligence agencies
  • Using face recognition technology to depict individuals of interest

http://www.counterterrorexpo.com/page.cfm/Link=294/nocache=18122013

 


Incredible Talent Now Working With Allevate

I’m incredibly pleased with the array of talent that is now cooperatively working with Allevate.

Today’s announcement detailing the individuals that are supporting Allevate’s mission to enhance public safety through the application of identification technologies whilst improving the operational efficiency of law enforcement and government agencies reflects on the powerful benefits our solutions can provide.

Amazing biomotric technology is not enough. A scalable and proven cloud-based architecture that blends the matching algorithms in a manner that adopts to the forensic investigation workflow seamlessly, coupled with deep insight of customer challenges and processes, is required to ensure maximum benefit.


Find People Fast in Media using Cloud-Based Face Recognition during Forensic Analysis

When tragic events or social disorder occur, forensic investigators have a long and daunting task of reviewing countless hours of CCTV footage. Increasingly, especially at public events attended by large numbers of people carrying mobile phones with HD cameras, authorities rely on  members of the public to turn in photographs and videos they have taken in the hope that they will contain useful intelligence. Much of this media is already uploaded to public sites such as Facebook and YouTube, providing another rich source of information.

Additionally, police have to review countless hours of media obtained from confiscated computer hard drives, mobile phones and portable cameras and flash memory devices.

Face Recognition?

All of this creates a significant resource burden;  this footage must be watched by people. The application of face recognition technology can play a crucial role in identifying potential suspects.

An Automated Media Processing Cloud

A solution to automate the processing of this staggering amount of media to quickly and efficiently unlock actionable intelligence is required to save significant time and human capital. The ability to automate this would allow the more efficient application of resources as well as massively speed up time-critical investigations.

However, the need goes far beyond the simple application of face recognition technology.

What is needed is a server-based system that can process vast amounts of media quickly to transform files from  mobile phones, flash memory devices, online sources, confiscated computers and hardrives and video surveillance systems into searchable resources. This would enable forensic investigators to work more efficiently and effectively by automatically finding, extracting and matching faces from very large collections of media to discover, document and disseminate information in  real-time.

Such a powerful video and photograph processing architecture should automatically ingest, process, analyse and index hundreds of thousands of photographs and videos in a centralised repository to  glean associations in a cloud environment. Instrumental would be the ability to:

  • Automatically find, extract and index faces to enable  the biometric and biographic searching of media.
  • Create and manage watchlists of people of interest via a web-based interface.
  • Find all instances of photos and videos where a person of interest has been seen.
  • Quickly review and process  media to identify, locate, and track persons of interest, their associates and their activities.
  • Discover, document and diagramtically view  associations between people of interest, their activities and networks.
  • Use media meta-data to geotag video footage and watchlist hits and overlay and present on maps.

Public Facing Cloud-Service to Crowd-Source Media

Finally, a public-facing interface to such a system would enable members of the public to upload their media in a self-service manner to enable quick and ready access by the authorities to this raw data for automatic processing.

Enhance Public Safety and Reduce Budgets

Read about how MXSERVER addresses the AMAIS space (Automated Media Analysis for Intelligence Searching)

This solution is now available to UK public sector on the Government Procurement Service CloudStore – G-Cloud iii Framework as a commodity from the catalogue without having to invite tenders from suppliers.

 


Could Automating Media Processing Aid the Forensic Investigation into the Boston Marathon Bombing?

The horror of the events at the marathon in Boston 2 days ago is still very raw. People are united in their sympathy for the victims and their families, their revulsion of these despicable acts and their solidarity in not succumbing to terror. The FBI vows to “…go to the ends of the Earth to find the bomber” with President Obama openly stating the “…heinous and cowardly…” event to be “…and act of terror”.

The investigation into the bombing is in its nascent phases, with the Boston Police Commissioner Ed Davis admitting that they are dealing with the “…most complex crime scene that we have dealt with in the history of our department.” Still, authorities are already honing in on crucial evidence and beginning to release details; BBC news reports that a source close to the investigation told AP news agency that the bombs consisted of explosives placed in 1.6-gallon pressure cookers, one with shards of metal and ball bearings, the other with nails, and placed in black bags that were left on the ground. Images of what appear to be a trigger mechanism have already been released.

Face Recognition?

Forensic investigators have a long and daunting task ahead of them with countless hours of CCTV footage to  pore over, and some people are already suggesting that the application of face recognition technology can play a crucial role in identifying potential suspects. However CCTV footage, especially from older systems that have not been specifically configured for the task, is notoriously unreliable as a source for face recognition.

Perhaps more useful at an event attended by so many, most of whom will have been carrying and using mobile phones and cameras, is the footage acquired by members of the public. Images and video captured by these high-quality devices will potentially be of much greater use than CCTV and authorities have appealed for people to turn in photographs and videos they have taken in the hope that they will contain useful intelligence. Much of this media will already have been uploaded to public sites such as Facebook and YouTube.

 An Automated Media Processing Cloud

A solution to automate the processing of this staggering amount of media to quickly and efficiently unlock actionable intelligence is required to save significant time and human capital. The ability to automate this would allow the more efficient application of resources as well as massively speed up a time-critical investigation.

However, the need goes far beyond the simple application of face recognition technology.

What is needed is a server-based system that can process vast amounts of media quickly to transform files from  mobile phones, flash memory devices, online sources, confiscated computers and hardrives and video surveillance systems into searchable resources. This would enable forensic investigators to work more efficiently and effectively by automatically finding, extracting and matching faces from very large collections of media to discover, document and disseminate information in  real-time.

Such a powerful video and photograph processing architecture should automatically ingest, process, analyse and index hundreds of thousands of photographs and videos in a centralised repository to  glean associations in a cloud environment. Instrumental would be the ability to:

  • Automatically find, extract and index faces to enable  the biometric and biographic searching of media.
  • Create and manage watchlists of people of interest via a web-based interface.
  • Find all instances of photos and videos where a person of interest has been seen.
  • Quickly review and process  media to identify, locate, and track persons of interest, their associates and their activities.
  • Discover, document and view  associations between people of interest, their activities and networks.

Finally, a public-facing interface to such a system would enable members of the public to upload their media in a self-service manner to enable quick and ready access by the authorities to this raw data for automatic processing.

 


Unlocking Intelligence from Multi-media

Driven by growing security concerns arising from increasing terrorist attacks, racial and ethnic disturbances, organised civil unrest, random violence, riots, burglary and physical assaults, the global market for the face and voice biometric technologies is projected to reach US$2.9 billion by the year 2018.

Across Europe, governments and law enforcement agencies are increasingly impotent in their ability to combat a deterioration in public safety. The economic crisis that is increasingly fueling public disorder is also paralysing our police and intelligence agencies with draconian budget cuts.

Having previously invested heavily in infrastructure, these agencies have at their disposal huge volumes of data in the form of media, but have no way to unlock the potential intelligence bonanza it contains. Vast sums are being spent allocating experienced and expensive human capital to rote tasks of watching countless of hours of media in the hope of randomly finding useful information.

A solution to automate this processing to quickly and efficiently unlock actionable intelligence from this staggering amount of data is required. The potential to improve public safety whilst simultaneously enabling the more efficient use of our public finances is huge.


Turn Masses of Video in Archives into Actionable Intelligence

There has been an explosion in digital media. Law enforcement and intelligence agencies have amassed large collections of video and photographs from multiple sources that are stored in multiple file formats. There is a need to automate the processing of this raw data to turn it into actionable intelligence to enable you to “connect the dots”.

Discover how solutions available from Allevate can dramatically save you time and help you to operate more efficiently by appsurveillancelying data mining principles to digital media:

  • Automatically find and match faces from huge stores of videos and photos.
  • Identify individuals from watchlists and track them across multiple videos.
  • Extract faces from video and automatically cross-reference with all other video.
  • Associate multiple videos and photos based upon their active content and the individuals they contain.
  • Apply enhanced link analysis to identity an individual across multiple video sources.
  • Automatically build links between different individuals based on their associations in media, whether they be known or unknown.
  • Automatically and graphically display web-based drill down link analysis diagrams.
  • Determine “Pattern of Life” analysis for specific individuals and flag deviations from the norm.
  • Manage and access your entire video and photo repository from a single web interface. (automatically transforming multiple video formats)
  • Apply powerful analytical tools to your digital media content.

Work more efficiently. Get more results. Exploit the masses of raw media from multiple sources to create actionable intelligence with less manpower.


“From grainy CCTV to a positive ID: Recognising the benefits of surveillance”

Interesting article in London’s Independent newspaper on CCTV surveillance and face biometrics.

Especially interesting is the view of the combination of biometrics over CCTV with artificial intelligence and behavioral recognition, as this does appear to be the way things are moving.

I agree that biometrics, and especially face recognition, can provide huge benefit to society. I also agree that there is a certain level of concern and distrust by large swathes of the population, some of it well-founded, and some of it based on misperception and incorrect knowledge.

In either case, I think it is dangerous to simply dismiss these concerns and objections simply because we feel “we know best”. I believe society can be much better off with the well placed and controlled use of this technology, but I also believe that we should be working with the civil liberties groups rather than fighting them. Ultimately, these systems need to be accepted if they are to succeed, and in order for this to happen, the public has to better understand the benefit to themselves, and have trust in the people using them.


Man Films People in Public. Interesting Statement on Surveillance and Privacy 2

A very interesting piece to spark debate regarding safety versus privacy.

WARNING: There are one or two minor instances of less than desirable language, mainly due to the state of annoyance of those being videoed.

I do not believe (though I’m not a legal expert) that the person filming did anything illegal, yet people clearly took offence at his actions. The point the cameraman is obviously trying to make is why then do people so willingly accept being recorded by surveillance cameras?

I think the main point this film misses, in my opinion, is that people do not understand the purpose or intent of the cameraman’s actions, and they then assume malfeasance, which then understandably provokes a negative response.

In contrast, for the most part, most people understand the intent and purpose of a surveillance camera in a public place (such as a store or train station): to protect public safety.

The main lesson to be learnt from this (in my opinion) is the importance of education and awareness, and ensuring your users / key stakeholders are aware of proceedings and bought into the concept from the outset.

Thoughts or comments?