Select your localized edition:

Close ×

More Ways to Connect

Discover one of our 28 local entrepreneurial communities »

Be the first to know as we launch in new countries and markets around the globe.

Interested in bringing MIT Technology Review to your local market?

MIT Technology ReviewMIT Technology Review - logo

 

Unsupported browser: Your browser does not meet modern web standards. See how it scores »

Researchers are devising ways to automatically analyze CCTV and other security footage. The hope is that such technology will help police and other security officials to catch bad guys more quickly and more often, while minimizing the invasion of privacy of law-abiding citizens.

A group from Kingston University’s Digital Imaging Research Center (DIRC) is working on the tech. James Orwell, head of the DIRC’s Surveillance Research Group, told The Engineer, “We plan to develop components to automatically analyse multi-camera networks and footage before and after a trigger incident, such as a riot or fight, to produce a set of video segments relevant to a potential police investigation.” Using visual analysis (the DIRC offers scant details on the exact mechanism), the software can scan all the relevant footage and essentially automate a process that police might spend countless hours doing by hand.

For example, explains Orwell, say a man in a hooded sweatshirt suddenly smashes a window. That’s an event worth noting. The cops are going to want to scan all the footage from CCTV or surveillance cameras not just outside the store, but in the whole town center where the event took place. Maybe the bad guy thought he was out of range when he walked a few blocks away, and pulled down his hood, but little did he know that a camera outside a bank caught his face. If the cops can retrace the suspect’s path, they can potentially crack the case. The DIRC system proposes to do all this automatically. “A simple intruder-detection system could trigger the identification of all video data containing other observations of the intruder,” said Orwell.

Not only does this make cops’ jobs easier, it also helps assuage some of the concerns of privacy advocates, who are increasingly uncomfortable with the amount of video footage of our behavior that winds up in archives. If a computer could automatically detect and preserve footage “of interest,” the rest can be safely deleted, minimizing the invasion to our privacy.

The research is reminiscent of similar technology that was tested in June 2011 in a Manchester Airport. The surveillance system, called “Tag and Track”, developed by security company Ipsotek (tagline: “Recognise. Analyse. Realise”), allows security officials to tag suspicious individuals and then have the system track them across multiple cameras. Again, this is something security personnel already do, only in a more analog capacity. This can work in retrospect, for a forensic analysis after an event or crime, or it can work in real time. Sometimes a security worker, for all his efforts and training, might simply lose a suspect, one that has suddenly grabbed a piece of suspicious luggage from a baggage scanner, in a crowd when scanning a series of screens in a control room—and that’s the last thing you want to happen. Ipsotek’s system can serve as crucial backup in such a case, potentially averting an attack and saving lives.

What of the eternal give-and-take between security and privacy? What’s intriguing about the new system in particular is that, though it crunches more data and has an omnivorous appetite for CCTV footage, by reducing the rate of false positives, you’re less likely to be searched or detained unnecessarily. The dreaded pat-down, enemy of the privacy advocate, would hopefully become a thing of the past. Paradoxically, by increasing surveillance—and using new techniques to parse that data effectively—invasions of privacy, while all the more ubiquitous, could become less noticeable and disruptive. Though perhaps that’s what many privacy advocates fear most.

3 comments. Share your thoughts »

Tagged: Computing, privacy, data analysis

Reprints and Permissions | Send feedback to the editor

From the Archives

Close

Introducing MIT Technology Review Insider.

Already a Magazine subscriber?

You're automatically an Insider. It's easy to activate or upgrade your account.

Activate Your Account

Become an Insider

It's the new way to subscribe. Get even more of the tech news, research, and discoveries you crave.

Sign Up

Learn More

Find out why MIT Technology Review Insider is for you and explore your options.

Show Me