MIT Technology Review Subscribe

CSI: Tech to Automatically Identify the Bad Guy

Researchers hope a new system could automatically scan the hours of CCTV footage police have to comb through to identify suspects without invading privacy.

Researchers are devising ways to automatically analyze CCTV and other security footage. The hope is that such technology will help police and other security officials to catch bad guys more quickly and more often, while minimizing the invasion of privacy of law-abiding citizens.

A group from Kingston University’s Digital Imaging Research Center (DIRC) is working on the tech. James Orwell, head of the DIRC’s Surveillance Research Group, told The Engineer, “We plan to develop components to automatically analyse multi-camera networks and footage before and after a trigger incident, such as a riot or fight, to produce a set of video segments relevant to a potential police investigation.” Using visual analysis (the DIRC offers scant details on the exact mechanism), the software can scan all the relevant footage and essentially automate a process that police might spend countless hours doing by hand.

Advertisement

For example, explains Orwell, say a man in a hooded sweatshirt suddenly smashes a window. That’s an event worth noting. The cops are going to want to scan all the footage from CCTV or surveillance cameras not just outside the store, but in the whole town center where the event took place. Maybe the bad guy thought he was out of range when he walked a few blocks away, and pulled down his hood, but little did he know that a camera outside a bank caught his face. If the cops can retrace the suspect’s path, they can potentially crack the case. The DIRC system proposes to do all this automatically. “A simple intruder-detection system could trigger the identification of all video data containing other observations of the intruder,” said Orwell.

This story is only available to subscribers.

Don’t settle for half the story.
Get paywall-free access to technology news for the here and now.

Subscribe now Already a subscriber? Sign in
You’ve read all your free stories.

MIT Technology Review provides an intelligent and independent filter for the flood of information about technology.

Subscribe now Already a subscriber? Sign in

Not only does this make cops’ jobs easier, it also helps assuage some of the concerns of privacy advocates, who are increasingly uncomfortable with the amount of video footage of our behavior that winds up in archives. If a computer could automatically detect and preserve footage “of interest,” the rest can be safely deleted, minimizing the invasion to our privacy.

The research is reminiscent of similar technology that was tested in June 2011 in a Manchester Airport. The surveillance system, called “Tag and Track”, developed by security company Ipsotek (tagline: “Recognise. Analyse. Realise”), allows security officials to tag suspicious individuals and then have the system track them across multiple cameras. Again, this is something security personnel already do, only in a more analog capacity. This can work in retrospect, for a forensic analysis after an event or crime, or it can work in real time. Sometimes a security worker, for all his efforts and training, might simply lose a suspect, one that has suddenly grabbed a piece of suspicious luggage from a baggage scanner, in a crowd when scanning a series of screens in a control room—and that’s the last thing you want to happen. Ipsotek’s system can serve as crucial backup in such a case, potentially averting an attack and saving lives.

What of the eternal give-and-take between security and privacy? What’s intriguing about the new system in particular is that, though it crunches more data and has an omnivorous appetite for CCTV footage, by reducing the rate of false positives, you’re less likely to be searched or detained unnecessarily. The dreaded pat-down, enemy of the privacy advocate, would hopefully become a thing of the past. Paradoxically, by increasing surveillance—and using new techniques to parse that data effectively—invasions of privacy, while all the more ubiquitous, could become less noticeable and disruptive. Though perhaps that’s what many privacy advocates fear most.

This is your last free story.
Sign in Subscribe now

Your daily newsletter about what’s up in emerging technology from MIT Technology Review.

Please, enter a valid email.
Privacy Policy
Submitting...
There was an error submitting the request.
Thanks for signing up!

Our most popular stories

Advertisement