© 2007 3vr security, inc. 1 stephen russell ceo & founder 3vr security, inc. search in...

Post on 15-Jan-2016

219 Views

Category:

Documents

4 Downloads

Preview:

Click to see full reader

TRANSCRIPT

© 2007 3VR Security, Inc. 1

Stephen RussellCEO & Founder

3VR Security, Inc.

Search in Surveillance:A NewTool for Information Warriors

© 2007 3VR Security, Inc. 2

30 million cameras

200 billion video hours

© 2007 3VR Security, Inc. 3

Information Overload:Security manufacturers continually improve our ability to collect information …

Proprietary and Confidential © 2007 3VR Security, Inc. 3

© 2007 3VR Security, Inc. 4

… but our ability to “collect” has long since outstripped our ability to “analyze”, resulting in catastrophic human and economic loss.

Proprietary and Confidential © 2007 3VR Security, Inc. 4

© 2007 3VR Security, Inc. 5

© 2007 3VR Security, Inc.

The Security Gap

© 2007 3VR Security, Inc. 6

Failure to close this gap has resulted in catastrophic human and economic loss

Proprietary and Confidential © 2007 3VR Security, Inc. 6

© 2007 3VR Security, Inc. 7

July 7, 2005

Proprietary and Confidential © 2007 3VR Security, Inc. 7

© 2007 3VR Security, Inc. 8

How do you track 4 suspects among millions of hours of video?

© 2007 3VR Security, Inc. 9

Recognizing Suspects Under Surveillance

Khalid Al-Midhar Mohamed Atta

9/10(Gas Station)

9/11(ATM)

Known Al-Qaeda affiliate on INS watchlist since 2000

Proprietary and Confidential © 2007 3VR Security, Inc. 9

© 2007 3VR Security, Inc. 10

Surveillance –Innovation & Standards HoldoutSecurity manufacturers have failed to leverage commercials useful innovations from information technology and management.

Scalable Computing

ComputerVision

Search

DatabasesSOAP/XML

© 2007 3VR Security, Inc. 11

3VR uses SEARCH technology to structure security data and connect security professionals.

Proprietary and Confidential © 2007 3VR Security, Inc. 11

Innovations in search and intelligent video

are helping to close the information gap.

© 2007 3VR Security, Inc. 12

SEARCH: Using technology to “structure” security data and “connect” security professionals is critical to transforming security industry.

Proprietary and Confidential © 2007 3VR Security, Inc. 12

© 2007 3VR Security, Inc. 13Proprietary and Confidential © 2007 3VR Security, Inc.

13

“O’Reilly’s Internet Guide” Google

Search brought “structure” to the Internet...

…and in turn connected internet users.

© 2007 3VR Security, Inc. 14

“Google for Surveillance”

Proprietary and Confidential © 2007 3VR Security, Inc. 14

© 2007 3VR Security, Inc. 15

Face Recognition Restricted Area Motion Direction

Abandoned/Removed Objects

Use Video Analysis to Turn Video into Events

© 2007 3VR Security, Inc. 16

Make Event Based Monitoring Possible

© 2007 3VR Security, Inc. 17

Searchable Events Speed Investigations

Conventional DVR Search Results

1. Review text lists2. Wait for video downloads3. Watch numerous videos,

one by one

Typical Investigation: 15 minutes

1. Scan storyboard to isolate event2. Only download one video3. Single click export to case

management

Typical Investigation: 2 minutes

3VR Search Results in EventStoryboard™

© 2007 3VR Security, Inc. 18

Use Relevance to Enhance Quality

Selectively compress face images to keep high quality evidence while still maximizing storage

DVR Face Image 3VR Face Image

© 2007 3VR Security, Inc. 19

Use Relevance to Extend Storage

Use intelligent recording and dynamic, user determined durations for key events to reduce storage and bandwidth by over 90% compared to conventional DVRs

DVR

© 2007 3VR Security, Inc. 20

Structured Information Optimized for the Network

DVR or NVR 3VR

Distributes heavyweight video files Distributes lightweight metadata + key frames

2MB per transaction 120K per transaction

Searches only by transaction information, requires manual review of video.

Searches across branches by face or transaction, easily scanned event cards

© 2007 3VR Security, Inc. 21

Video SearchVideo AnalysisVideo Management… One Product

3VR SmartRecorder™

© 2007 3VR Security, Inc. 22

About 3VR

» Best Product– Fastest growth in commercial sector– Fastest rate of product innovation– Won nearly every industry award

» Leading Company– Funded by IT and Security Leaders

(Kleiner Perkins, In-Q-Tel, VantagePoint, DAG)– Led by Search and Video Visionaries

(Inktomi, TiVo, USWeb)

Top 25

© 2007 3VR Security, Inc. 23

Search: A Disruptive Idea

© 2007 3VR Security, Inc. 24

Banking

$5B

Check Fraud

($5B)

Banking DVRs

($200M)

Organized Theft ($31B)

$31B

Retail DVRs($300M)

Proprietary and Confidential © 2007 3VR Security, Inc. 24

Search transforms security market with value-driven applications to address huge vertical problems…

Economic impact

of 9/11 alone:

$1 Trillion

Retail Government

© 2007 3VR Security, Inc. 25Proprietary and Confidential © 2007 3VR Security, Inc.

25

Text Files +Mainframes

Databases +Enterprise Software

We saw something similar when databases made the enterprise searchable...

© 2007 3VR Security, Inc. 26Proprietary and Confidential © 2007 3VR Security, Inc.

26

… as the market or databases expanded, the market for enterprise applications exploded.

© 2007 3VR Security, Inc. 27Proprietary and Confidential © 2007 3VR Security, Inc.

27

» Purpose-built word processor» Sold bolt-on office applications (mail,

spreadsheets, etc)» Killed by cheaper, more flexible,

extensible software system (PC)

» Purpose-built video recorder» Trying to bolt-on analytics

(face, object, LPR, etc)» Killed by cheaper, more flexible,

extensible software system (3VR)

DVRs will be security’s Wang Computer

DVR

© 2007 3VR Security, Inc. 28

Example:Addressing Fraud in Retail Banks

© 2007 3VR Security, Inc. 29

» Sample Text

Proprietary and Confidential © 2007 3VR Security, Inc. 29

» In 2005, banks lost $64 million to robbery

» Those same banks lost $5 billion to fraud

» Fraud is “the number one way criminals are attackingour financial system”

– Chief of Financial Crimes, US Secret Service

Fraud: Banking’s Biggest Problem

Proprietary and Confidential © 2007 3VR Security, Inc. 29

© 2007 3VR Security, Inc. 30

CrimeGuard™ - Facial Surveillance to Stop Fraud

CrimeGuard™ automatically indexes branch video with biometrics assigning a unique template to every face.

Proprietary and Confidential © 2007 3VR Security, Inc. 30

© 2007 3VR Security, Inc. 31

SimilaritySearch™

Face templates can be remotely searched to link a fraudster’s activity across both time and branches

» Solves previously unsolvable cases

» Searches are instant and reduce investigation time

» Proactively identifies even unreported fraud events

» Robust to false identities

Proprietary and Confidential © 2007 3VR Security, Inc. 31

© 2007 3VR Security, Inc. 32

PeopleShare™

With a single-click, PeopleShare™ publishes faces and alerts to watchlists within every branch across user-defined regions

» Automates intelligence distribution

» Prevents fraudsters from serially targeting branches

» Centralized alert management

PeopleShare™

Proprietary and Confidential © 2007 3VR Security, Inc. 32

© 2007 3VR Security, Inc. 33

SimilarityAlerts™

CrimeGuard™ performs real-time comparison of individuals in branches against regional watchlists. Matches trigger real-time alerts at teller windows, manager desks, or remote monitoring centers.

» Stops fraud attempts and reduce losses

» Increase deterrence to reduce future attempts

» Stopping and deterring attempts means less investigations

AlertViewer™

Proprietary and Confidential © 2007 3VR Security, Inc. 33

© 2007 3VR Security, Inc. 34

Fraud – Big Opportunity for Impactful ROI

Example Scenario $ at Risk Result

1st attempt $4,000 Suspect in Database

2nd attempt $4,000 Attempt Detected and Stopped

3rd attempt $4,000 Attempt Deterred or Stopped

4th attempt $4,000 Attempt Deterred or Stopped

$16,000 potential loss is reduced to $4,000

Proprietary and Confidential © 2007 3VR Security, Inc. 34

© 2007 3VR Security, Inc. 35

Demonstration

© 2007 3VR Security, Inc. 36

Case StudyFighting Fraud in Los Angeles

© 2007 3VR Security, Inc. 37

Pilot Program Overview

» 15 3VR systems deployed across branches in an area recognized for high fraud activity

» Multiple tests conducted to measure accuracy, false positives, investigative productivity, and effectiveness.

» Tests conducted jointly by 3VR and customer

© 2007 3VR Security, Inc. 38

Real-Time Watchlist Test - Results

MetricBranches with Poor Conditions(Class 1 and 2)

Branches with Good Conditions(Class 3, 4, and 5)

Matching Accuracy 9% 94%

Nuisance Alert Rate .005% .04%

Number of Sites 2 branches 13 branches

Total Faces Analyzed 2,885 85,724

With basic system tuning, 3VR accurately identified 94% of test subjects in branches with appropriate environmental conditions.

© 2007 3VR Security, Inc. 39

Investigation Test

Results (Post-Tuning)

Metric DVR 3VR

Investigation Speed 70 min 44 min

Quality of Evidence Images 2 CIF 4 CIF

Number of New Events Found 5 28

Test Methodology» Two investigators given

same fraud case.

» One investigator used legacy DVR, one used 3VR

» Investigators instructed to find additional instances of a suspect within the same bank branch.

© 2007 3VR Security, Inc. 40Proprietary and Confidential © 2007 3VR Security, Inc.

40

Searchable Surveillance™

Disruptive innovation transforming traditional surveillance operations

1

Enabling new value-driven applications to expand government effectiveness using video

2

Platform for ongoing innovation and integration

3

© 2007 3VR Security, Inc. 41

top related