Science Fiction Security Dr Alan J. Lipton CTO June 2003.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

1. 2 A Complete Solution We help enterprise and government organizations to enhance their security operations and improve business performance using smart.
Airport Security – Post 9/11
24 GHz Radar for CCTV Camera Control. Capabilities Scan 360 provides low cost intruder detection to protect people, vulnerable infrastructure or high.
Existing Axxon Verticals CCTV Module Access Control Face Recognition License Plate Recognition Wagon Numbers Recognition POS Security Intellectual Detectors.
ETISEO Project Corpus data - Video sequences contents - Silogic provider.
Johan de Clerk 14 June 2012 Smart Cities from a Civil Security Perspective.
Facilitating a Dialog between the NSDI and Utility Companies J. Peter Gomez Manager, Information Requirements, Xcel Energy.
1 VMD – Video motion Detection Global Security. 2 Why intelligent Video? Who’s watching all these monitors ??? It’s Impossible!!!!
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
ATALEF ® Mobile Surveillance Systems Stealth Surveillance Technologies Atalef VII Mobile System Atalef V Body Worn Sys. EM II Intrusion Detection.
Jim Niehaus October 9, Topics No Cost Considerations Systems with 24/7 Monitoring Service Cameras Motion Sensors References & Product Links.
 False alarms from water reflections?  Flying birds, spiderwebs, clouds, etc.?  Lots of engineer hours for setup and fine tuning?  Security officers.
Security administrators The experts need better tools too!
EE 342 FEEDBACK CONTROL SYSTEMS
Axis Intelligent Video Intelligence where you need it.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
1 SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of.
References. Moscow SafeCity Over 175,000 CCTV cameras in Moscow, controlling over doorways and mass circulation areas in ten districts. Vandal-resistant.
Smart Cities VMS This is a Smart Cities inspired software platform that centres around the surveillance cameras (CCTV) and that can integrate other IoT.
- TECHLEAD SOFTWARE ENGINEERING PVT. LTD. Video Analytics.
Situation Management Plan, Detect, Respond and Analyze
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
C4ISR via OA Mike Danjczek November, 2014 Copyright GTS 2014.
THNS 2010 Open supervision platforms for smart and sustainable cities, Yves PERREAL, Strategic studies Director, THALES.
SMUCSE 8394 Devices III Surveillance Cameras. SMUCSE 8394 Surveillance of the Borders 235 different video surveillance systems currently in operation.
Truly Powerful. Flexibility, Scalability, Reliability User Friendly Software  Predefined parameters  Scaled down for easy admin  Personalised reporting.
Javier Gil Arenales Data, a critical resource for Smarter cities.
SafeZone® patent pending 1 Detect. Inform. Prevent. Metcalf Attack #2 August 27, 2014 SafeZone® Detect. Inform. Prevent.
APC InfraStruxure TM Central Smart Plug-In for HP Operations Manager Manage Power, Cooling, Security, Environment, Rack Access and Physical Layer Infrastructure.
Axis Intelligent Video Strategy Focus on Embedded Video Analytics.
Radar Video Surveillance
The BOSS Project: Recent Advances in Facial Scanning Adam C. Champion.
Surveon Enterprise SMR8300 Product Introduction Sales & Marketing Department Surveon Technology.
Massachusetts Digital Government Summit / Session - Smile You're On CameraPage 1.
EMZA Making Sense Of your Asset protection. Emza Visual Sense WiseEye™ New Outdoor Intrusion Detection System 2009.
IP-based Integrated Security Solutions for Airport Operations and Security AirporTech Asia 2008 Danny Peleg.
NSF Industry-University Cooperative Research Center for Advanced Knowledge Enablement NOA Inc DBA TerraFly Inc IBM Naphtali Rishe Control and mapping of.
Proposed Task-Based VQEG Project Carolyn Ford, Mikołaj Leszczuk.
Presents The NetBotz Homeland Security Solution A Texas Company Protecting Texans.
Smart Surveillance Technology Javier OcasioPerezWilliam Sanchez Rosa Mariel Martinez MarreroAbraham Diaz Santiago.
Security and the National ITS Architecture ITS America 2003 Session 19: The State of the Practice: ITS and Homeland Security May 19, 2003 Minneapolis,
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
MELE / ABSi PROPRIETARY A System of Sensors A TOTAL SOLUTION FOR THE NATIONAL CAPITAL REGION.
NDSU Personal Safety and Security Assist. Project Introduction Leverages: –People and Partnerships –Philosophies –Centralized and Integrated Systems.
1. 2 A scalable, feature-rich VMS solution, delivers enterprise- level performance along with freedom of choice, enabling system customization and compatibility.
  Computer vision is a field that includes methods for acquiring,prcessing, analyzing, and understanding images and, in general, high-dimensional data.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Copyright 2007 by Rombix. R CyClops is a computer vision solution which could integrate most of the Real World Computer Vision Application. Available.
Intelligent and Non-Intelligent Transportation Systems 32 Foundations of Technology Standard 18 Students will develop an understanding of and be able to.
ACTi IVS Server 2 (Intelligent Video Surveillance) Connecting Vision.
Pioneers in Mobile Video Solutions Security communication technology. A leading developer and manufacturer of fully integrated video recording and transmission.
Video Analytics Integration and Analytics. Introduction The functions of video analytics. The architecture of video analytics. The applications of video.
The Physical Security in UTM NAWAF OMAR MAN Prof Hafiza Abas.
Innovative ICT Building a Better Smart City. Agenda 1. Why focus on Smart City 2. What is a Smart City 3. References.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Surveillance and Security Systems Cyber Security Integration.
SmartCatch Systems Putting Intelligence into Surveillance
Matrix Video Surveillance Solution for Banking
A scalable, feature-rich VMS solution, delivers enterprise-level performance along with freedom of choice, enabling system customization and compatibility.
1st Draft for Defining IoT (1)
Wavestore Integrates… OptaSense Acoustic Fibre & PIDS
Bringing Large Commercial Airport Capabilities to Your Local Community
VIDEO SURVEILLANCE AND MONITORING
Google Self Driving Car
Maintaining order and safety in a city is no small task
HUMAN AND SYSTEMS ENGINEERING:
Solar-Cam NW ™ Solar Powered Network Video Camera
Utilizing the Network Edge
5G as a Social Infrastructure Chaesub LEE, Director, ITU
Presentation transcript:

Science Fiction Security Dr Alan J. Lipton CTO June 2003

Who’s Watching Video? Humans cannot effectively watch surveillance video After 20 minutes, human attention degenerates to an unacceptable level Humans cannot effectively watch surveillance video After 20 minutes, human attention degenerates to an unacceptable level Too much data to be monitored manually “…such a task, even when assigned to a person who is dedicated and well-intentioned, will not support an effective security system.” NIJ Research Report / Sandia National Laboratories

Computer Vision Teaching machines to understand what they see…  Tough problem But, recent advances in technology…  Such as the DARPA-sponsored VSAM program ( And advances in computer power… And increasing integration in security and surveillance infrastructure… Intelligent Video is a critical enabling technology for truly scalable, enterprise- wide, security and surveillance

VEW – Event Detection RULE #1 – Perimeter Warning “Detect when Respond with a and a and a ” RULE #2 – Loitering Warning “Detect when Respond with a and a and a “ RULE #3 – Severe Perimeter Alert “Detect when Respond with a and a and a and a and a and […]” PERIMETER WARNING LOITERING WARNING PERIMETER ALERT Alerts include all necessary information - when the event occurred, where the event occurred, what rule was violated, and which object and type of object violated the rule

Some Applications of VEW Detect & Alert on Multiple Zones Detect People & Vehicles Crossing Virtual Perimeters Detect People & Vehicles Parking or Loitering Detect People Climbing Fence Detect People Inside Fence Detect Objects Thrown Over Fence Detect Theft of Valuable Assets !! !!! !! !!! ! ? ! ? ASSET PROTECTION PERIMETER MONITORING COUNTER- SURVEILLANCE INTRUSION DETECTION “LEFT BAG” / FOD

Some More Applications of VEW Monitoring Water Traffic Under and Around Critical Areas or Structures Watch for Divers and Boats Loitering or Anchoring Around Critical Areas Alert on Anything Near or On Pilings and Exposed Structural Supports Monitor Activity Under and On Actual Structure Monitoring Activity at “Edges” of Structure (e.g., jumpers) Monitor Activity Under and On Actual Structure

In the Real World Perimeter Incursion Detection

More in the Real World Left ObjectTheft

Even More in the Real World Wrong-Way Traffic Flow Detection

Coming Down the Pike Bio-Metrics of non-cooperative subjects – by Face or Gait Australian: therefore suspicious!!

Enabling Technology BlockPile Hardware Infra- structure Video Under- standing Other Sensors Access Control Systems HID Sensor Fusion Data Base Interface Where We are Today Next Months Normalcy Modeling Intuitive Alert Reporting Intuitive User Interface

Example – US Customs Northern Border Protection Canada USA Canada USA Canada USA VEW Detecting human and vehicle activities by day or night

Example: An Oil Refinery 500 Feet BP Camera Protection for 5 mile perimeter Perimeter testing using customer-chosen camera. Usability testing with actual security personnel. Day and night scenarios. Protection for 5 mile perimeter Perimeter testing using customer-chosen camera. Usability testing with actual security personnel. Day and night scenarios.

Example: Logan Airport Complete airfield perimeter protection – 8 miles. Day and night protection required. Additional protection in critical zones and for weather. Massport and Massachusetts State Police Marine Division participating in testing. Complete airfield perimeter protection – 8 miles. Day and night protection required. Additional protection in critical zones and for weather. Massport and Massachusetts State Police Marine Division participating in testing.

Example: Hackensack Bridge Commuter rail bridge monitoring. Rail yard train car protection. System to cover ~600 cameras. Commuter rail bridge monitoring. Rail yard train car protection. System to cover ~600 cameras. Daylight Cameras w/ Floodlights INTEGRATED ACCESS CONTROL

Conclusion Current approach to security is not scalable  More people, more cameras, more confusion Automation is key Intelligent Video is a solution for automating intuitive video surveillance tasks Buy our product