INDECT

Last updated

INDECT
Intelligent information system supporting observation, searching and detection for security of citizens in urban environment
Keywords security, computer data processing, metadata, digital watermarking, artificial intelligence, signal processing
Project typeCollaborative Project
Funding agency European Union
Reference FP7-2007-SEC-218086
ObjectiveSEC-2007-1.2-01 Intelligent urban environment observation system
Project coordinatorAGH – University of Science and Technology (Poland)
Participants
  • Gdansk University of Technology (Poland)
  • InnoTec DATA GmbH & Co. (Germany)
  • IP Grenoble (Ensimag) (France)
  • General Headquarters of Police (Poland)
  • Products and Systems of Information Technology (Germany)
  • Police Service of Northern Ireland (United Kingdom)
  • Poznan University of Technology (Poland)
  • Universidad Carlos III de Madrid (Spain)
  • Technical University of Sofia (Bulgaria)
  • University of Wuppertal (Germany)
  • University of York (United Kingdom)
  • Technical University of Ostrava (Czech Republic)
  • Technical University of Kosice (Slovak Republic)
  • X-Art Pro Division G.m.b.H. (Austria)
  • Fachhochschule Technikum Wien (Austria)
Budget
  • Total: 14,828,107.00 Euro
  • Funding: 10,906,984.00 Euro
Duration2009-01-01 – 2014-06-30
Website www.indect-project.eu

INDECT is a research project in the area of intelligent security systems performed by several European universities since 2009 and funded by the European Union. [1] The purpose of the project is to involve European scientists and researchers in the development of solutions to and tools for automatic threat detection [2] through e.g. processing of CCTV camera data streams, [3] standardization of video sequence quality for user applications, [4] threat detection in computer networks [5] as well as data and privacy protection. [6] [7]

Contents

The area of research, applied methods, and techniques are described in the public deliverables [8] which are available to the public on the project's website. Practically, all information related to the research is public. Only documents that comprise information related to financial data or information that could negatively influence the competitiveness and law enforcement capabilities of parties involved in the project are not published. This follows regulations and practices applied in EU research projects.

Application and target users

The main end-user of INDECT solutions are police forces and security services.

The principle of operation of the project is detecting threats and identifying sources of threats, without monitoring and searching for particular citizens or groups of citizens. Then, the system operator (i.e. police officer) decides whether an intervention of services responsible for public security are required or not. Further investigation eventually leading to persons related to threats is performed, preserving the presumption of innocence, [9] based on existing procedures already used by police services and prosecutors. [10] As it can be found in the project deliverables, INDECT does not involve storage of personal data (such as names, addresses, identity document numbers, etc.).

A similar, behavior-based surveillance program was SAMURAI (Suspicious and Abnormal behavior Monitoring Using a netwoRk of cAmeras & sensors for sItuation awareness enhancement). [11]

Expected results

The main expected results of the INDECT project are:

Controversy

Some media and other sources [12] accuse INDECT of privacy abuse, collecting personal data, [13] and keeping information from the public. [14] Consequently, these issues have been commented and discussed by some Members of the European Parliament. [15] [16]

As seen in the project's documentation, INDECT does not involve mobile phone tracking or call interception. [17]

The rumors about testing INDECT during 2012 UEFA European Football Championship also turned out to be false. [18]

The mid-term review of the Seventh Framework Programme to the European Parliament strongly urges the European Commission to immediately make all documents available and to define a clear and strict mandate for the research goal, the application, and the end users of INDECT, and stresses a thorough investigation of the possible impact on fundamental rights. [19] Nevertheless, according to Mr. Paweł Kowal, MEP, the project had the ethical review on 15 March 2011 in Brussels with the participation of ethics experts from Austria, France, Netherlands, Germany and Great Britain.

See also

Further reading

Related Research Articles

<span class="mw-page-title-main">Closed-circuit television</span> Use of video cameras to transmit a signal to a specific place on a limited set of monitors

Closed-circuit television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point-to-point (P2P), point-to-multipoint (P2MP), or mesh wired or wireless links. Even though almost all video cameras fit this definition, the term is most often applied to those used for surveillance in areas that require additional security or ongoing monitoring.

<span class="mw-page-title-main">Surveillance</span> Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

<span class="mw-page-title-main">Intelligent transportation system</span> Advanced application

An intelligent transportation system (ITS) is an advanced application which aims to provide innovative services relating to different modes of transport and traffic management and enable users to be better informed and make safer, more coordinated, and 'smarter' use of transport networks.

<span class="mw-page-title-main">Intrusion detection system</span> Network protection device or software

An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms.

<span class="mw-page-title-main">Mass surveillance</span> Intricate surveillance of an entire or a substantial fraction of a population

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, such as organizations like the NSA, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is also often distinguished from targeted surveillance.

In computer science, a software agent or software AI is a computer program that acts for a user or other program in a relationship of agency, which derives from the Latin agere : an agreement to act on one's behalf. Such "action on behalf of" implies the authority to decide which, if any, action is appropriate. Agents are colloquially known as bots, from robot. They may be embodied, as when execution is paired with a robot body, or as software such as a chatbot executing on a phone or other computing device. Software agents may be autonomous or work together with other agents or people. Software agents interacting with people may possess human-like qualities such as natural language understanding and speech, personality or embody humanoid form.

<span class="mw-page-title-main">Facial recognition system</span> Technology capable of matching a face from an image against a database of faces

A facial recognition system is a technology potentially capable of matching a human face from a digital image or a video frame against a database of faces. Such a system is typically employed to authenticate users through ID verification services, and works by pinpointing and measuring facial features from a given image.

<span class="mw-page-title-main">Privacy International</span>

Privacy International (PI) is a UK-based registered charity that defends and promotes the right to privacy across the world. First formed in 1990, registered as a non-profit company in 2002 and as a charity in 2012, PI is based in London. Its current executive director, since 2012, is Dr Gus Hosein.

<span class="mw-page-title-main">Computer security software</span> Computer program for information security

Computer security software or cybersecurity software is any computer program designed to influence information security. This is often taken in the context of defending computer systems or data, yet can incorporate programs designed specifically for subverting computer systems due to their significant overlap, and the adage that the best defense is a good offense.

Visual privacy is the relationship between collection and dissemination of visual information, the expectation of privacy, and the legal issues surrounding them. These days digital cameras are ubiquitous. They are one of the most common sensors found in electronic devices, ranging from smartphones to tablets, and laptops to surveillance cams. However, privacy and trust implications surrounding it limit its ability to seamlessly blend into computing environment. In particular, large-scale camera networks have created increasing interest in understanding the advantages and disadvantages of such deployments. It is estimated that over 4 million CCTV cameras deployed in the UK. Due to increasing security concerns, camera networks have continued to proliferate across other countries such as the United States. While the impact of such systems continues to be evaluated, in parallel, tools for controlling how these camera networks are used and modifications to the images and video sent to end-users have been explored.

Surveillance tools are all means technological provided and used by the surveillance industry, police or military intelligence, and national security institutions that enable individual surveillance and mass surveillance. Steven Ashley in 2008 listed the following components used for surveillance:

Video content analysis or video content analytics (VCA), also known as video analysis or video analytics (VA), is the capability of automatically analyzing video to detect and determine temporal and spatial events.

<span class="mw-page-title-main">Domain Awareness System</span>

The Domain Awareness System is the largest digital surveillance system in the world as part of the Lower Manhattan Security Initiative in partnership between the New York Police Department and Microsoft to monitor New York City. It allows the NYPD to track surveillance targets and gain detailed information about them, and is overseen by the counterterrorism bureau.

<span class="mw-page-title-main">Mass surveillance in the United Kingdom</span> Overview of mass surveillance in the United Kingdom

The use of electronic surveillance by the United Kingdom grew from the development of signal intelligence and pioneering code breaking during World War II. In the post-war period, the Government Communications Headquarters (GCHQ) was formed and participated in programmes such as the Five Eyes collaboration of English-speaking nations. This focused on intercepting electronic communications, with substantial increases in surveillance capabilities over time. A series of media reports in 2013 revealed bulk collection and surveillance capabilities, including collection and sharing collaborations between GCHQ and the United States' National Security Agency. These were commonly described by the media and civil liberties groups as mass surveillance. Similar capabilities exist in other countries, including western European countries.

<span class="mw-page-title-main">Mass surveillance in India</span> Overview of mass surveillance in India

Mass surveillance is the pervasive surveillance of an entire or a substantial fraction of a population. Mass surveillance in India includes Surveillance, Telephone tapping, Open-source intelligence, Lawful interception, and surveillance under Indian Telegraph Act, 1885.

<span class="mw-page-title-main">Mass surveillance in China</span> Network of monitoring systems used by the Chinese government

Mass surveillance in the People's Republic of China (PRC) is the network of monitoring systems used by the Chinese central government to monitor Chinese citizens. It is primarily conducted through the government, although corporate surveillance in connection with the Chinese government has been reported to occur. China monitors its citizens through Internet surveillance, camera surveillance, and through other digital technologies. It has become increasingly widespread and grown in sophistication under General Secretary of the Chinese Communist Party (CCP) Xi Jinping's administration.

<span class="mw-page-title-main">Surveillance issues in smart cities</span>

Smart cities seek to implement information and communication technologies (ICT) to improve the efficiency and sustainability of urban spaces while reducing costs and resource consumption. In the context of surveillance, smart cities monitor citizens through strategically placed sensors around the urban landscape, which collect data regarding many different factors of urban living. From these sensors, data is transmitted, aggregated, and analyzed by governments and other local authorities to extrapolate information about the challenges the city faces in sectors such as crime prevention, traffic management, energy use and waste reduction. This serves to facilitate better urban planning and allows governments to tailor their services to the local population.

The modern capabilities and legal framework for mass surveillance in the United Kingdom developed under successive governments of the United Kingdom since the late 20th century.

Automated decision-making (ADM) involves the use of data, machines and algorithms to make decisions in a range of contexts, including public administration, business, health, education, law, employment, transport, media and entertainment, with varying degrees of human oversight or intervention. ADM involves large-scale data from a range of sources, such as databases, text, social media, sensors, images or speech, that is processed using various technologies including computer software, algorithms, machine learning, natural language processing, artificial intelligence, augmented intelligence and robotics. The increasing use of automated decision-making systems (ADMS) across a range of contexts presents many benefits and challenges to human society requiring consideration of the technical, legal, ethical, societal, educational, economic and health consequences.

References

  1. Project's Grant Agreement
  2. Archived 8 January 2011 at the Wayback Machine Official website
  3. EU funding 'Orwellian' artificial intelligence plan to monitor public for "abnormal behaviour"
  4. Optimising task-based video quality - Springer
  5. INACT — INDECT Advanced Image Cataloguing Tool - Springer
  6. Benefits for the security of citizens & selected tools and applications — indect-home
  7. Overview of Recent Advances in CCTV Processing Chain in the INDECT and INSIGMA Projects
  8. Archived 3 March 2011 at the Wayback Machine Public Deliverables
  9. http://www.policja.pl/ftp/pliki/police_act.pdf [ bare URL PDF ]
  10. "Answer to a written question - Indect project - E-8217/2010".
  11. CORDIS record for "SAMURAI"
  12. Ian Johnston (19 September 2009). "EU funding 'Orwellian' artificial intelligence plan to monitor public for". Telegraph.co.uk.
  13. European Parliament on data protection
  14. European Parliament on the project's transparency to the public
  15. Parliamentary questions
  16. "written declaration (Number of signatories : 177)". (102 KB)
  17. Archived 10 August 2012 at the Wayback Machine , Preliminary report on police and prosecutor repositories and access procedures
  18. , European Parliament on testing INDECT during EURO 2012.
  19. Committee on Industry, Research and Energy: Report on the mid-term review of the Seventh Framework Programme of the European Union for research, technological development and demonstration activities (2011/2043(INI)). Results of FP7, 27. 18 April 2011.