Developments, contacts, links, literatureA security man helps a victim to identify the person who robbed him. Feeding "descriptors" of a possible suspect into the databases of nearby cameras, he narrows the search. Images of people who fit the descriptors appear on a PDA. Once a likely suspect has been identified, real-time tracking sets the stage for an arrest. The entire process is based on the use of cameras that describe what they see
Never a dull moment. That's what I like about this job. None of that old-fashioned security stuff. You knowwith the banks of monitors and the sleepy-looking guys peering at pictures of delivery bays or rear entrances over cups of steaming black tea. Things have changed. Now we're on the move. But there's more. Here in the SkyMall in Singaporea giant commercial complex that opened a couple of years agothey've got security systems like you wouldn't believe. Sure, everyone's got cameras. But these guys are different. They're smart. They watch for certain kinds of situations: a package left in an aisle, someone walking from car to car in the underground parking lots, faces, license plates, even certain tones of voice. Any of these things can trigger what we call "an event." Most events are insignificant, but they're routinely routed to the nearest security person. After all, how's a camera supposed to know that a slap on the back is harmless?
The thing is that just about everyone these days has biometric templatescoded but incomplete versions of their voice, fingertip and face scansin government databases and on their PDAs and smart cards. It's convenient and private since using the system is just a question of verificationnot identification. You can access and update your government benefits from home or from kiosks in places like SkyMall. When customers enter a parking lot or leave a store with some merchandise, all they have to do is touch a reader with a finger. The reader creates a digital template of the fingerprint's geometry and compares it wirelessly to the information on the customer's PDA. If the templates match, the transaction takes place.
Getting personalized information is also a breeze. Just take a look at that lady over there at the kiosk. She's probably checking to see if any of her favorite products are on sale. When she places her hand on the scanner, the information is downloaded to her PDAcomplete with aisle and shelf numbers.
Still, crime is hard to stamp out. A couple of days ago, for instance, a Japanese tourist's shopping bag disappeared from the SkyBar and the only clue was that the man could vaguely remember that a middle-aged woman with a beige jacket had been nearby. Not much to go on. Most people around here wear beige all the time. But he also remembered that she had worn a pair of pink sneakers. Bingo.
Only a few minutes after the theft had been reported, I was drawing a triangle and a squarevisual shorthand for a person with a bag or briefcasein my PDA's data entry window. I told the system to search the databases of the cameras around the SkyBar for the last hour. But if I had left it at that, the system would have come up with hundreds of images of people with briefcases or shopping bags. Adding "beige top" to the search list wouldn't have narrowed the results by much. But "pink lower section" was a winner. A few seconds after I hit the search button, images started popping up on the PDA. "Do any of these look like the person you remember?" I asked. The manMr. Tanaguccilooked carefully. There had been several women and even a couple of men who had worn pink shoes. But there was one woman who looked familiar to him.
I asked the system to search for all images matching her description for the last hour. Bingo again. An image taken only 40 minutes earlier showed her in a shoe store without a shopping bag. But the latest images showed her with two shopping bags, and Tanagucci said that it appeared that one of the bags was the right size and color. She was definitely our girlpink sneakers and all.
Scrolling forwards in her video archive, I could see that the woman had gone for the elevators and was already in the parking lots, which, by the way, are outfitted with plenty of cameras. Now the pictures coming in were real-time. I saw her in a car. The vehicle's electronic license plate IDautomatically transmitted to the nearest camera each time a car's ignition is startedappeared on my screen along with exactly the notice I had expected to see: "Driver and vehicle do not match," it said. Now things were getting serious. But clearly, SkyMall's investment in high-resolution cameras with face recognition capability was paying off. Using the fingerprint reader on my PDA to confirm my command, I put one of our newest security systems into effect: I requested cameras at all exit gates to search for the suspect's car and to deny release of exit barriers if it tried to leave. Five minutes later Tanagucci and I found the stolen vehicle. Two security men were already on the scene. "Where is she"? I asked, looking around. The two looked annoyed. I checked my PDA. No more images. Then I looked in the car and knew why the trail had suddenly gone cold. There they were on the front seat: a pair of bright pink sneakers.
Arthur F. Pease
In the future, card-based biometrics could be compared with on-the-spot data to certify who we are more
Siemens researchers are developing methods that enable biometric characteristics to be converted into data keys more
What used to be a trickle of video images is turning into a torrent. Zeroing in on what's important will require cameras that can extract information from what they see more
As voice and data merge, networks are becoming increasingly vulnerable. A look at what Siemens is doing more
Are we building a surveillance society? The head of the Electronic Privacy Information Center comments on security, privacy and convenience more