Download presentation
Presentation is loading. Please wait.
Published byMauricio Hammer Modified over 9 years ago
1
© 2007 3VR Security, Inc. 1 Stephen Russell CEO & Founder 3VR Security, Inc. Search in Surveillance: A NewTool for Information Warriors
2
© 2007 3VR Security, Inc. 2 30 million cameras 200 billion video hours
3
© 2007 3VR Security, Inc. 3 Information Overload: Security manufacturers continually improve our ability to collect information … Proprietary and Confidential © 2007 3VR Security, Inc. 3
4
4 … but our ability to “collect” has long since outstripped our ability to “analyze”, resulting in catastrophic human and economic loss. Proprietary and Confidential © 2007 3VR Security, Inc. 4
5
5 The Security Gap
6
© 2007 3VR Security, Inc. 6 Failure to close this gap has resulted in catastrophic human and economic loss Proprietary and Confidential © 2007 3VR Security, Inc. 6
7
7 July 7, 2005 Proprietary and Confidential © 2007 3VR Security, Inc. 7
8
8 How do you track 4 suspects among millions of hours of video?
9
© 2007 3VR Security, Inc. 9 Recognizing Suspects Under Surveillance Khalid Al-MidharMohamed Atta 9/10 (Gas Station) 9/11 (ATM) Known Al-Qaeda affiliate on INS watchlist since 2000 Proprietary and Confidential © 2007 3VR Security, Inc. 9
10
10 Surveillance –Innovation & Standards Holdout Security manufacturers have failed to leverage commercials useful innovations from information technology and management. Scalable Computing Computer Vision Search Databases SOAP/ XML
11
© 2007 3VR Security, Inc. 11 3VR uses SEARCH technology to structure security data and connect security professionals. Proprietary and Confidential © 2007 3VR Security, Inc. 11 Innovations in search and intelligent video are helping to close the information gap.
12
© 2007 3VR Security, Inc. 12 SEARCH: Using technology to “structure” security data and “connect” security professionals is critical to transforming security industry. Proprietary and Confidential © 2007 3VR Security, Inc. 12
13
© 2007 3VR Security, Inc. 13 Proprietary and Confidential © 2007 3VR Security, Inc. 13 “O’Reilly’s Internet Guide” Google Search brought “structure” to the Internet... …and in turn connected internet users.
14
© 2007 3VR Security, Inc. 14 “Google for Surveillance” Proprietary and Confidential © 2007 3VR Security, Inc. 14
15
© 2007 3VR Security, Inc. 15 Face Recognition Restricted Area Motion Direction Abandoned/Removed Objects Use Video Analysis to Turn Video into Events
16
© 2007 3VR Security, Inc. 16 Make Event Based Monitoring Possible
17
© 2007 3VR Security, Inc. 17 Searchable Events Speed Investigations Conventional DVR Search Results 1.Review text lists 2.Wait for video downloads 3.Watch numerous videos, one by one Typical Investigation: 15 minutes 1.Scan storyboard to isolate event 2.Only download one video 3.Single click export to case management Typical Investigation: 2 minutes 3VR Search Results in EventStoryboard™
18
© 2007 3VR Security, Inc. 18 Use Relevance to Enhance Quality Selectively compress face images to keep high quality evidence while still maximizing storage DVR Face Image3VR Face Image
19
© 2007 3VR Security, Inc. 19 Use Relevance to Extend Storage Use intelligent recording and dynamic, user determined durations for key events to reduce storage and bandwidth by over 90% compared to conventional DVRs DVR
20
© 2007 3VR Security, Inc. 20 Structured Information Optimized for the Network DVR or NVR3VR Distributes heavyweight video files Distributes lightweight metadata + key frames 2MB per transaction120K per transaction Searches only by transaction information, requires manual review of video. Searches across branches by face or transaction, easily scanned event cards
21
© 2007 3VR Security, Inc. 21 Video Search Video Analysis Video Management … One Product 3VR SmartRecorder™
22
© 2007 3VR Security, Inc. 22 About 3VR » Best Product –Fastest growth in commercial sector –Fastest rate of product innovation –Won nearly every industry award » Leading Company –Funded by IT and Security Leaders (Kleiner Perkins, In-Q-Tel, VantagePoint, DAG) –Led by Search and Video Visionaries (Inktomi, TiVo, USWeb) Top 25
23
© 2007 3VR Security, Inc. 23 Search: A Disruptive Idea
24
© 2007 3VR Security, Inc. 24 Banking $5B Check Fraud ($5B) Banking DVRs ($200M) Organized Theft ($31B) $31B Retail DVRs ($300M) Proprietary and Confidential © 2007 3VR Security, Inc. 24 Search transforms security market with value-driven applications to address huge vertical problems… Economic impact of 9/11 alone: $1 Trillion RetailGovernment
25
© 2007 3VR Security, Inc. 25 Proprietary and Confidential © 2007 3VR Security, Inc. 25 Text Files + Mainframes Databases + Enterprise Software We saw something similar when databases made the enterprise searchable...
26
© 2007 3VR Security, Inc. 26 Proprietary and Confidential © 2007 3VR Security, Inc. 26 … as the market or databases expanded, the market for enterprise applications exploded.
27
© 2007 3VR Security, Inc. 27 Proprietary and Confidential © 2007 3VR Security, Inc. 27 » Purpose-built word processor » Sold bolt-on office applications (mail, spreadsheets, etc) » Killed by cheaper, more flexible, extensible software system (PC) » Purpose-built video recorder » Trying to bolt-on analytics (face, object, LPR, etc) » Killed by cheaper, more flexible, extensible software system (3VR) DVRs will be security’s Wang Computer DVR
28
© 2007 3VR Security, Inc. 28 Example: Addressing Fraud in Retail Banks
29
© 2007 3VR Security, Inc. 29 » Sample Text Proprietary and Confidential © 2007 3VR Security, Inc. 29 » In 2005, banks lost $64 million to robbery » Those same banks lost $5 billion to fraud » Fraud is “the number one way criminals are attacking our financial system” – Chief of Financial Crimes, US Secret Service Fraud: Banking’s Biggest Problem Proprietary and Confidential © 2007 3VR Security, Inc. 29
30
© 2007 3VR Security, Inc. 30 CrimeGuard™ - Facial Surveillance to Stop Fraud CrimeGuard™ automatically indexes branch video with biometrics assigning a unique template to every face. Proprietary and Confidential © 2007 3VR Security, Inc. 30
31
© 2007 3VR Security, Inc. 31 SimilaritySearch™ Face templates can be remotely searched to link a fraudster’s activity across both time and branches » Solves previously unsolvable cases » Searches are instant and reduce investigation time » Proactively identifies even unreported fraud events » Robust to false identities Proprietary and Confidential © 2007 3VR Security, Inc. 31
32
© 2007 3VR Security, Inc. 32 PeopleShare™ With a single-click, PeopleShare™ publishes faces and alerts to watchlists within every branch across user-defined regions » Automates intelligence distribution » Prevents fraudsters from serially targeting branches » Centralized alert management PeopleShare™ Proprietary and Confidential © 2007 3VR Security, Inc. 32
33
© 2007 3VR Security, Inc. 33 SimilarityAlerts™ CrimeGuard™ performs real-time comparison of individuals in branches against regional watchlists. Matches trigger real-time alerts at teller windows, manager desks, or remote monitoring centers. » Stops fraud attempts and reduce losses » Increase deterrence to reduce future attempts » Stopping and deterring attempts means less investigations AlertViewer™ Proprietary and Confidential © 2007 3VR Security, Inc. 33
34
© 2007 3VR Security, Inc. 34 Fraud – Big Opportunity for Impactful ROI Example Scenario$ at RiskResult 1 st attempt$4,000Suspect in Database 2 nd attempt$4,000Attempt Detected and Stopped 3 rd attempt$4,000Attempt Deterred or Stopped 4 th attempt$4,000Attempt Deterred or Stopped $16,000 potential loss is reduced to $4,000 Proprietary and Confidential © 2007 3VR Security, Inc. 34
35
© 2007 3VR Security, Inc. 35 Demonstration
36
© 2007 3VR Security, Inc. 36 Case Study Fighting Fraud in Los Angeles
37
© 2007 3VR Security, Inc. 37 Pilot Program Overview » 15 3VR systems deployed across branches in an area recognized for high fraud activity » Multiple tests conducted to measure accuracy, false positives, investigative productivity, and effectiveness. » Tests conducted jointly by 3VR and customer
38
© 2007 3VR Security, Inc. 38 Real-Time Watchlist Test - Results Metric Branches with Poor Conditions (Class 1 and 2) Branches with Good Conditions (Class 3, 4, and 5) Matching Accuracy9%94% Nuisance Alert Rate.005%.04% Number of Sites2 branches13 branches Total Faces Analyzed2,88585,724 With basic system tuning, 3VR accurately identified 94% of test subjects in branches with appropriate environmental conditions.
39
© 2007 3VR Security, Inc. 39 Investigation Test Results (Post-Tuning) MetricDVR3VR Investigation Speed70 min44 min Quality of Evidence Images2 CIF4 CIF Number of New Events Found 528 Test Methodology » Two investigators given same fraud case. » One investigator used legacy DVR, one used 3VR » Investigators instructed to find additional instances of a suspect within the same bank branch.
40
© 2007 3VR Security, Inc. 40 Proprietary and Confidential © 2007 3VR Security, Inc. 40 Searchable Surveillance™ Disruptive innovation transforming traditional surveillance operations 1 Enabling new value-driven applications to expand government effectiveness using video 2 Platform for ongoing innovation and integration 3
41
© 2007 3VR Security, Inc. 41
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.