INDECT

Last updated

INDECT
Intelligent information system supporting observation, searching and detection for security of citizens in urban environment
Keywords security, computer data processing, metadata, digital watermarking, artificial intelligence, signal processing
Project typeCollaborative Project
Funding agency European Union
Reference FP7-2007-SEC-218086
ObjectiveSEC-2007-1.2-01 Intelligent urban environment observation system
Project coordinatorAGH – University of Science and Technology (Poland)
Participants
  • Gdansk University of Technology (Poland)
  • InnoTec DATA GmbH & Co. (Germany)
  • IP Grenoble (Ensimag) (France)
  • General Headquarters of Police (Poland)
  • Products and Systems of Information Technology (Germany)
  • Police Service of Northern Ireland (United Kingdom)
  • Poznan University of Technology (Poland)
  • Universidad Carlos III de Madrid (Spain)
  • Technical University of Sofia (Bulgaria)
  • University of Wuppertal (Germany)
  • University of York (United Kingdom)
  • Technical University of Ostrava (Czech Republic)
  • Technical University of Kosice (Slovak Republic)
  • X-Art Pro Division G.m.b.H. (Austria)
  • Fachhochschule Technikum Wien (Austria)
Budget
  • Total: 14,828,107.00 Euro
  • Funding: 10,906,984.00 Euro
Duration2009-01-01 – 2014-06-30
Website www.indect-project.eu

INDECT is a research project in the area of intelligent security systems performed by several European universities since 2009 and funded by the European Union. [1] The purpose of the project is to involve European scientists and researchers in the development of solutions to and tools for automatic threat detection [2] through e.g. processing of CCTV camera data streams, [3] standardization of video sequence quality for user applications, [4] threat detection in computer networks [5] as well as data and privacy protection. [6] [7]

Contents

The area of research, applied methods, and techniques are described in the public deliverables [8] which are available to the public on the project's website. Practically, all information related to the research is public. Only documents that comprise information related to financial data or information that could negatively influence the competitiveness and law enforcement capabilities of parties involved in the project are not published. This follows regulations and practices applied in EU research projects.

Application and target users

The main end-user of INDECT solutions are police forces and security services.

The principle of operation of the project is detecting threats and identifying sources of threats, without monitoring and searching for particular citizens or groups of citizens. Then, the system operator (i.e. police officer) decides whether an intervention of services responsible for public security are required or not. Further investigation eventually leading to persons related to threats is performed, preserving the presumption of innocence, [9] based on existing procedures already used by police services and prosecutors. [10] As it can be found in the project deliverables, INDECT does not involve storage of personal data (such as names, addresses, identity document numbers, etc.).

A similar, behavior-based surveillance program was SAMURAI (Suspicious and Abnormal behavior Monitoring Using a netwoRk of cAmeras & sensors for sItuation awareness enhancement). [11]

Expected results

The main expected results of the INDECT project are:

Controversy

Some media and other sources [12] accuse INDECT of privacy abuse, collecting personal data, [13] and keeping information from the public. [14] Consequently, these issues have been commented and discussed by some Members of the European Parliament. [15] [16]

As seen in the project's documentation, INDECT does not involve mobile phone tracking or call interception. [17]

The rumors about testing INDECT during 2012 UEFA European Football Championship also turned out to be false. [18]

The mid-term review of the Seventh Framework Programme to the European Parliament strongly urges the European Commission to immediately make all documents available and to define a clear and strict mandate for the research goal, the application, and the end users of INDECT, and stresses a thorough investigation of the possible impact on fundamental rights. [19] Nevertheless, according to Mr. Paweł Kowal, MEP, the project had the ethical review on 15 March 2011 in Brussels with the participation of ethics experts from Austria, France, Netherlands, Germany and Great Britain.

See also

Further reading

Related Research Articles

Data mining is the process of extracting and discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems. Data mining is an interdisciplinary subfield of computer science and statistics with an overall goal of extracting information from a data set and transforming the information into a comprehensible structure for further use. Data mining is the analysis step of the "knowledge discovery in databases" process, or KDD. Aside from the raw analysis step, it also involves database and data management aspects, data pre-processing, model and inference considerations, interestingness metrics, complexity considerations, post-processing of discovered structures, visualization, and online updating.

<span class="mw-page-title-main">Closed-circuit television</span> Use of video cameras to transmit a signal to a specific place on a limited set of monitors

Closed-circuit television (CCTV), also known as video surveillance, is the use of closed-circuit television cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point-to-point, point-to-multipoint (P2MP), or mesh wired or wireless links. Even though almost all video cameras fit this definition, the term is most often applied to those used for surveillance in areas that require additional security or ongoing monitoring.

<span class="mw-page-title-main">Surveillance</span> Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.

<span class="mw-page-title-main">Intelligent transportation system</span> Advanced application

An intelligent transportation system (ITS) is an advanced application which aims to provide innovative services relating to different modes of transport and traffic management and enable users to be better informed and make safer, more coordinated, and 'smarter' use of transport networks.

An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically either reported to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms.

<span class="mw-page-title-main">Information Awareness Office</span> DARPA division overseeing the "Total Information Awareness" program

The Information Awareness Office (IAO) was established by the United States Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to U.S. national security by achieving "Total Information Awareness" (TIA).

<span class="mw-page-title-main">Total Information Awareness</span> US mass detection program

Total Information Awareness (TIA) was a mass detection program by the United States Information Awareness Office. It operated under this title from February to May 2003 before being renamed Terrorism Information Awareness.

<span class="mw-page-title-main">Mass surveillance</span> Intricate surveillance of an entire or a substantial fraction of a population

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is often distinguished from targeted surveillance.

<span class="mw-page-title-main">Facial recognition system</span> Technology capable of matching a face from an image against a database of faces

A facial recognition system is a technology potentially capable of matching a human face from a digital image or a video frame against a database of faces. Such a system is typically employed to authenticate users through ID verification services, and works by pinpointing and measuring facial features from a given image.

<span class="mw-page-title-main">Privacy International</span>

Privacy International (PI) is a UK-based registered charity that defends and promotes the right to privacy across the world. First formed in 1990, registered as a non-profit company in 2002 and as a charity in 2012, PI is based in London. Its current executive director, since 2012, is Dr Gus Hosein.

A digital watermark is a kind of marker covertly embedded in a noise-tolerant signal such as audio, video or image data. It is typically used to identify ownership of the copyright of such a signal. "Watermarking" is the process of hiding digital information in a carrier signal; the hidden information should, but does not need to, contain a relation to the carrier signal. Digital watermarks may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners. It is prominently used for tracing copyright infringements and for banknote authentication.

Computer security software or cybersecurity software is any computer program designed to influence information security. This is often taken in the context of defending computer systems or data, yet can incorporate programs designed specifically for subverting computer systems due to their significant overlap, and the adage that the best defense is a good offense.

Video content analysis or video content analytics (VCA), also known as video analysis or video analytics (VA), is the capability of automatically analyzing video to detect and determine temporal and spatial events.

Computer surveillance in the workplace is the use of computers to monitor activity in a workplace. Computer monitoring is a method of collecting performance data which employers obtain through digitalised employee monitoring. Computer surveillance may nowadays be used alongside traditional security applications, such as closed-circuit television.

The following outline is provided as an overview of and topical guide to computer security:


Scientific Research Group in Egypt (SRGE) is a group of young Egyptian researchers established under the chairman of the group founder Prof. Aboul Ella Hassanien. The main target of the group is establishing a research community for sharing common interests. Therefore the research map of the group consists of multidisciplinary research interests including: Networks, Intelligent Environment, bio-informatics, chemoinformatics, and information security.

<span class="mw-page-title-main">Dataveillance</span> Monitoring and collecting online data and metadata

Dataveillance is the practice of monitoring and collecting online data as well as metadata. The word is a portmanteau of data and surveillance. Dataveillance is concerned with the continuous monitoring of users' communications and actions across various platforms. For instance, dataveillance refers to the monitoring of data resulting from credit card transactions, GPS coordinates, emails, social networks, etc. Using digital media often leaves traces of data and creates a digital footprint of our activity. Unlike sousveillance, this type of surveillance is not often known and happens discreetly. Dataveillance may involve the surveillance of groups of individuals. There exist three types of dataveillance: personal dataveillance, mass dataveillance, and facilitative mechanisms.

Indiscriminate monitoring is the mass monitoring of individuals or groups without the careful judgement of wrong-doing. This form of monitoring could be done by government agencies, employers, and retailers. Indiscriminate monitoring uses tools such as email monitoring, telephone tapping, geo-locations, health monitoring to monitor private lives. Organizations that conduct indiscriminate monitoring may also use surveillance technologies to collect large amounts of data that could violate privacy laws or regulations. These practices could impact individuals emotionally, mentally, and globally. The government has also issued various protections to protect against indiscriminate monitoring.

<span class="mw-page-title-main">Hyper-surveillance</span> Form of surveillance

Hyper-surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens that specifically utilizes technology and security breaches to access information. As the reliance on the internet economy grows, smarter technology with higher surveillance concerns and snooping means workers to have increased surveillance at their workplace. Hyper surveillance is highly targeted and intricate observation and monitoring among an individual, group of people, or faction.

References

  1. Project's Grant Agreement
  2. Archived 8 January 2011 at the Wayback Machine Official website
  3. EU funding 'Orwellian' artificial intelligence plan to monitor public for "abnormal behaviour"
  4. Leszczuk, Mikołaj (2014). "Optimising task-based video quality". Multimedia Tools and Applications. 68: 41–58. doi:10.1007/s11042-012-1161-6.
  5. Grega, Michał; Bryk, Damian; Napora, Maciej; Gusta, Marcin (2011). "INACT — INDECT Advanced Image Cataloguing Tool". Multimedia Communications, Services and Security. Communications in Computer and Information Science. Vol. 149. pp. 28–36. doi:10.1007/978-3-642-21512-4_4. ISBN   978-3-642-21511-7.
  6. Benefits for the security of citizens & selected tools and applications — indect-home
  7. Dziech, Andrzej; Bialas, Jaroslaw; Glowacz, Andrzej; Korus, Pawel; Leszczuk, Mikolaj; Matiolalski, Andrzej; Baran, Remigiusz (2013). "Overview of Recent Advances in CCTV Processing Chain in the INDECT and INSIGMA Projects". 2013 International Conference on Availability, Reliability and Security. pp. 836–843. doi:10.1109/ARES.2013.112. ISBN   978-0-7695-5008-4.
  8. Archived 3 March 2011 at the Wayback Machine Public Deliverables
  9. http://www.policja.pl/ftp/pliki/police_act.pdf [ bare URL PDF ]
  10. "Answer to a written question - Indect project - E-8217/2010".
  11. CORDIS record for "SAMURAI"
  12. Ian Johnston (19 September 2009). "EU funding 'Orwellian' artificial intelligence plan to monitor public for". Telegraph.co.uk.
  13. European Parliament on data protection
  14. European Parliament on the project's transparency to the public
  15. Parliamentary questions
  16. "written declaration (Number of signatories : 177)". (102 KB)
  17. Archived 10 August 2012 at the Wayback Machine , Preliminary report on police and prosecutor repositories and access procedures
  18. , European Parliament on testing INDECT during EURO 2012.
  19. Committee on Industry, Research and Energy: Report on the mid-term review of the Seventh Framework Programme of the European Union for research, technological development and demonstration activities (2011/2043(INI)). Results of FP7, 27. 18 April 2011.