Difference between revisions of "Video Surveillance"

From SI410
Jump to: navigation, search
(edited lead paragraph, and moved some content into new "crime surveillance" section)
(rearranged and added photo)
Line 1: Line 1:
 +
[[File:SmileCamera.gif|right|thumb|"Smile You're On Camera"]]
  
 
Video surveillance, otherwise known as closed circuit television (CCTV), involves using cameras to record or transmit video signal to a specified destination. Video monitoring is relied upon for solving crimes, both commercially and on private property, as surveillance systems are installed within and outside homes and businesses. Video cameras are also used in the workplace to ensure that employees are working efficiently. Video surveillance has been widely utilized to improve safety in public places, particularly in large cities. As the popularity of video surveillance has increased and technology has become more advanced, making it easier to covertly record one’s surroundings, privacy concerns have grown more prevalent.
 
Video surveillance, otherwise known as closed circuit television (CCTV), involves using cameras to record or transmit video signal to a specified destination. Video monitoring is relied upon for solving crimes, both commercially and on private property, as surveillance systems are installed within and outside homes and businesses. Video cameras are also used in the workplace to ensure that employees are working efficiently. Video surveillance has been widely utilized to improve safety in public places, particularly in large cities. As the popularity of video surveillance has increased and technology has become more advanced, making it easier to covertly record one’s surroundings, privacy concerns have grown more prevalent.
  
  
== '''History''' ==
+
== History ==
  
 
CCTV was first implemented in 1942 in order for scientists to view V2 rockets launching in Germany<ref name="prehistory">https://kintronics.com/the-history-of-video-surveillance/</ref>. Following its initial implementation, by the late 1950s, video surveillance technology was used by several companies in the U.S. for education, medical, and industrial purposes.<ref name="prehistory"></ref> The ability to record the transmitted signal, eliminating the need for constant monitoring, was not developed  until 1951. <ref name="History">http://www.business2community.com/tech-gadgets/from-edison-to-internet-a-history-of-video-surveillance-0578308#owROavBijRQCfkRk.97</ref>Public surveillance became more common in the 1960s when Olean, New York became the first city to use video cameras to monitor the streets in 1968, and the first home security surveillance system patented by Marie Van Brittan Brown in 1969<ref name="History">. By the 1990s, cameras were installed in ATMS to record all transactions.<ref name="History"</ref> In 1996, the first IP (Internet Protocol) camera enabled video to be sent and received via computer networks.<ref name="History"></ref>
 
CCTV was first implemented in 1942 in order for scientists to view V2 rockets launching in Germany<ref name="prehistory">https://kintronics.com/the-history-of-video-surveillance/</ref>. Following its initial implementation, by the late 1950s, video surveillance technology was used by several companies in the U.S. for education, medical, and industrial purposes.<ref name="prehistory"></ref> The ability to record the transmitted signal, eliminating the need for constant monitoring, was not developed  until 1951. <ref name="History">http://www.business2community.com/tech-gadgets/from-edison-to-internet-a-history-of-video-surveillance-0578308#owROavBijRQCfkRk.97</ref>Public surveillance became more common in the 1960s when Olean, New York became the first city to use video cameras to monitor the streets in 1968, and the first home security surveillance system patented by Marie Van Brittan Brown in 1969<ref name="History">. By the 1990s, cameras were installed in ATMS to record all transactions.<ref name="History"</ref> In 1996, the first IP (Internet Protocol) camera enabled video to be sent and received via computer networks.<ref name="History"></ref>
Line 13: Line 14:
 
While often times successful at deterring crime in certain cities, it has been shown to not cut down on crime in all areas, many times because criminals don't believe that the cameras were being monitored and that police would not follow through.  In such cases it has been shown that the costs outweigh the benefits of installing cameras .<ref name="HLS
 
While often times successful at deterring crime in certain cities, it has been shown to not cut down on crime in all areas, many times because criminals don't believe that the cameras were being monitored and that police would not follow through.  In such cases it has been shown that the costs outweigh the benefits of installing cameras .<ref name="HLS
 
">Homeland Security News Wire [http://www.homelandsecuritynewswire.com/study-shows-surveillance-cameras-reduce-crime-some-cases (2011). Study shows surveillance cameras reduce crime, in some cases”]</ref>.  
 
">Homeland Security News Wire [http://www.homelandsecuritynewswire.com/study-shows-surveillance-cameras-reduce-crime-some-cases (2011). Study shows surveillance cameras reduce crime, in some cases”]</ref>.  
== '''Technology''' ==
+
== Technology ==
  
'''IP Cameras'''
+
=== IP Cameras ===
  
 
In 1996, Axis Communications released the first surveillance cameras that use computer networks and the Internet to transmit signal.<ref name="IPCam">https://kintronics.com/the-history-of-video-surveillance/</ref> Rather than use voltage to transmit signal as its predecessors did, IP Cameras transmit information via the TCP/IP Protocol, which enables two-way communication, remote control of the surveillance device, encrypted transmission, artificial intelligence functionality within the actual camera, and improved resolution.<ref>http://www.protectamerica.com/home-security-blog/tech-tips/draft-an-incredibly-unboring-history-of-ip-cameras-draft_11713</ref> However, IP Cameras are more expensive than analog CCTV devices and by using the Internet, the video transmission is more easily accessible to hackers.<ref name="IPCam"></ref> Axis began using Linux to operate their cameras in 1999 and released an API (Application Program Interface) called Vapix, allowing third parties to create recording software.<ref name="IPCam"></ref> In 2005, Intellio released the first IP Camera that could detect movement and theft.<ref name="IPCam"></ref>
 
In 1996, Axis Communications released the first surveillance cameras that use computer networks and the Internet to transmit signal.<ref name="IPCam">https://kintronics.com/the-history-of-video-surveillance/</ref> Rather than use voltage to transmit signal as its predecessors did, IP Cameras transmit information via the TCP/IP Protocol, which enables two-way communication, remote control of the surveillance device, encrypted transmission, artificial intelligence functionality within the actual camera, and improved resolution.<ref>http://www.protectamerica.com/home-security-blog/tech-tips/draft-an-incredibly-unboring-history-of-ip-cameras-draft_11713</ref> However, IP Cameras are more expensive than analog CCTV devices and by using the Internet, the video transmission is more easily accessible to hackers.<ref name="IPCam"></ref> Axis began using Linux to operate their cameras in 1999 and released an API (Application Program Interface) called Vapix, allowing third parties to create recording software.<ref name="IPCam"></ref> In 2005, Intellio released the first IP Camera that could detect movement and theft.<ref name="IPCam"></ref>
  
'''Wide Area Surveillance'''
+
=== Wide Area Surveillance ===
  
 
As technology has become more advanced and video cameras are able to record footage in greater detail and with more precision, video cameras mounted on fixed-wing aircraft are becoming more common, otherwise known as wide area surveillance. Retired Air Force Officer McNutt who helped design a system for the skies over a battleground city in Iraq, estimates that his 192-megapixel camera could record 50 crimes throughout the duration of a six-hour flight. <ref name="WAS">https://www.washingtonpost.com/business/technology/new-surveillance-technology-can-track-everyone-in-an-area-for-several-hours-at-a-time/2014/02/05/82f1556e-876f-11e3-a5bd-844629433ba3_story.html?utm_term=.7b4c8d9e5b6f</ref>Aerial surveillance has been tested in Dayton, Philadelphia, Compton, and Baltimore for traffic impact studies and for security at large events. In 2007, McNutt founded an Ohio-based company called Persistent Surveillance Systems (PSS) to develop aerial surveillance in order to monitor large areas of land at once.<ref name="WAS1">https://www.pss-1.com/about-pss</ref> PSS utilizes two cameras, the HawkEye II for airborne wide area surveillance and the Vision RL for fixed wide area surveillance.<ref name="WAS1"></ref> McNutt and PSS are negotiating with city and state law enforcement regarding the implementation of their wide area surveillance technology.
 
As technology has become more advanced and video cameras are able to record footage in greater detail and with more precision, video cameras mounted on fixed-wing aircraft are becoming more common, otherwise known as wide area surveillance. Retired Air Force Officer McNutt who helped design a system for the skies over a battleground city in Iraq, estimates that his 192-megapixel camera could record 50 crimes throughout the duration of a six-hour flight. <ref name="WAS">https://www.washingtonpost.com/business/technology/new-surveillance-technology-can-track-everyone-in-an-area-for-several-hours-at-a-time/2014/02/05/82f1556e-876f-11e3-a5bd-844629433ba3_story.html?utm_term=.7b4c8d9e5b6f</ref>Aerial surveillance has been tested in Dayton, Philadelphia, Compton, and Baltimore for traffic impact studies and for security at large events. In 2007, McNutt founded an Ohio-based company called Persistent Surveillance Systems (PSS) to develop aerial surveillance in order to monitor large areas of land at once.<ref name="WAS1">https://www.pss-1.com/about-pss</ref> PSS utilizes two cameras, the HawkEye II for airborne wide area surveillance and the Vision RL for fixed wide area surveillance.<ref name="WAS1"></ref> McNutt and PSS are negotiating with city and state law enforcement regarding the implementation of their wide area surveillance technology.
  
'''Personal Webcams as Surveillance Devices'''
+
=== Personal Webcams as Surveillance Devices ===
  
 
Webcams either built into computers or that connect to computers via USB can be converted into do-it-yourself video surveillance systems. Softwares that allow for surveillance capabilities have been developed, like iSpy Connect and SightHound.<ref name="webcams">http://www.pcadvisor.co.uk/how-to/pc-peripheral/how-use-webcam-as-cctv-3510687//</ref> Once the software is installed, users are prompted to define a perimeter around an area in which the camera is programmed to detect movement. Depending on the software, users can either set up text-message or email notifications about detected movement.<ref name="webcams"></ref>  
 
Webcams either built into computers or that connect to computers via USB can be converted into do-it-yourself video surveillance systems. Softwares that allow for surveillance capabilities have been developed, like iSpy Connect and SightHound.<ref name="webcams">http://www.pcadvisor.co.uk/how-to/pc-peripheral/how-use-webcam-as-cctv-3510687//</ref> Once the software is installed, users are prompted to define a perimeter around an area in which the camera is programmed to detect movement. Depending on the software, users can either set up text-message or email notifications about detected movement.<ref name="webcams"></ref>  
  
'''Video Surveillance and Facial Recognition'''
+
=== Video Surveillance and Facial Recognition ===
  
 
Facial recognition technology has been in development since the 1960s, though details about its progress have been kept quiet until recently. Earlier models required human input and were less automated. Biometric facial recognition involves three steps: detecting a face, recording detected faces, and then matching those faces with faces stored in a database. The software uses about 80 facial “landmarks” or “nodal points” to distinguish between faces, like nose width, eye-socket depth, and cheekbone shape.<ref name="nodes">http://electronics.howstuffworks.com/gadgets/high-tech-gadgets/facial-recognition1.htm/</ref> Cameras are now capable of 3D modeling, rather than 2D modeling that was used in the past that required faces to be turned at least 35 degrees toward the camera.<ref name="nodes"></ref>  
 
Facial recognition technology has been in development since the 1960s, though details about its progress have been kept quiet until recently. Earlier models required human input and were less automated. Biometric facial recognition involves three steps: detecting a face, recording detected faces, and then matching those faces with faces stored in a database. The software uses about 80 facial “landmarks” or “nodal points” to distinguish between faces, like nose width, eye-socket depth, and cheekbone shape.<ref name="nodes">http://electronics.howstuffworks.com/gadgets/high-tech-gadgets/facial-recognition1.htm/</ref> Cameras are now capable of 3D modeling, rather than 2D modeling that was used in the past that required faces to be turned at least 35 degrees toward the camera.<ref name="nodes"></ref>  
Line 35: Line 36:
 
== Ethical Issues ==
 
== Ethical Issues ==
  
'''Monitoring without explicit consent'''
+
=== Monitoring without explicit consent ===
 
Government monitoring,
 
Government monitoring,
 
Ypsilanti
 
Ypsilanti
  
'''Hacking into private cameras to remotely control them'''
+
=== Hacking into private cameras to remotely control them ===
 
Webcams
 
Webcams
  
'''Google Glass'''
+
=== Google Glass ===
  
'''Implications of Facial Recognition'''
+
=== Implications of Facial Recognition ===
 
FBI’s NGI System
 
FBI’s NGI System
  
  
 
== References ==
 
== References ==

Revision as of 17:38, 1 April 2017

"Smile You're On Camera"

Video surveillance, otherwise known as closed circuit television (CCTV), involves using cameras to record or transmit video signal to a specified destination. Video monitoring is relied upon for solving crimes, both commercially and on private property, as surveillance systems are installed within and outside homes and businesses. Video cameras are also used in the workplace to ensure that employees are working efficiently. Video surveillance has been widely utilized to improve safety in public places, particularly in large cities. As the popularity of video surveillance has increased and technology has become more advanced, making it easier to covertly record one’s surroundings, privacy concerns have grown more prevalent.


History

CCTV was first implemented in 1942 in order for scientists to view V2 rockets launching in Germany[1]. Following its initial implementation, by the late 1950s, video surveillance technology was used by several companies in the U.S. for education, medical, and industrial purposes.[1] The ability to record the transmitted signal, eliminating the need for constant monitoring, was not developed until 1951. [2]Public surveillance became more common in the 1960s when Olean, New York became the first city to use video cameras to monitor the streets in 1968, and the first home security surveillance system patented by Marie Van Brittan Brown in 1969[2] In 1996, the first IP (Internet Protocol) camera enabled video to be sent and received via computer networks.[2]

Crime Surveillance

Despite being criticized for potential privacy issues, video surveillance has been helpful in detecting and solving crime. The UK supposedly has one camera for every 11 people [3], and for every 1000 cameras in London one crime is solved[4].

While often times successful at deterring crime in certain cities, it has been shown to not cut down on crime in all areas, many times because criminals don't believe that the cameras were being monitored and that police would not follow through. In such cases it has been shown that the costs outweigh the benefits of installing cameras .[5].

Technology

IP Cameras

In 1996, Axis Communications released the first surveillance cameras that use computer networks and the Internet to transmit signal.[6] Rather than use voltage to transmit signal as its predecessors did, IP Cameras transmit information via the TCP/IP Protocol, which enables two-way communication, remote control of the surveillance device, encrypted transmission, artificial intelligence functionality within the actual camera, and improved resolution.[7] However, IP Cameras are more expensive than analog CCTV devices and by using the Internet, the video transmission is more easily accessible to hackers.[6] Axis began using Linux to operate their cameras in 1999 and released an API (Application Program Interface) called Vapix, allowing third parties to create recording software.[6] In 2005, Intellio released the first IP Camera that could detect movement and theft.[6]

Wide Area Surveillance

As technology has become more advanced and video cameras are able to record footage in greater detail and with more precision, video cameras mounted on fixed-wing aircraft are becoming more common, otherwise known as wide area surveillance. Retired Air Force Officer McNutt who helped design a system for the skies over a battleground city in Iraq, estimates that his 192-megapixel camera could record 50 crimes throughout the duration of a six-hour flight. [8]Aerial surveillance has been tested in Dayton, Philadelphia, Compton, and Baltimore for traffic impact studies and for security at large events. In 2007, McNutt founded an Ohio-based company called Persistent Surveillance Systems (PSS) to develop aerial surveillance in order to monitor large areas of land at once.[9] PSS utilizes two cameras, the HawkEye II for airborne wide area surveillance and the Vision RL for fixed wide area surveillance.[9] McNutt and PSS are negotiating with city and state law enforcement regarding the implementation of their wide area surveillance technology.

Personal Webcams as Surveillance Devices

Webcams either built into computers or that connect to computers via USB can be converted into do-it-yourself video surveillance systems. Softwares that allow for surveillance capabilities have been developed, like iSpy Connect and SightHound.[10] Once the software is installed, users are prompted to define a perimeter around an area in which the camera is programmed to detect movement. Depending on the software, users can either set up text-message or email notifications about detected movement.[10]

Video Surveillance and Facial Recognition

Facial recognition technology has been in development since the 1960s, though details about its progress have been kept quiet until recently. Earlier models required human input and were less automated. Biometric facial recognition involves three steps: detecting a face, recording detected faces, and then matching those faces with faces stored in a database. The software uses about 80 facial “landmarks” or “nodal points” to distinguish between faces, like nose width, eye-socket depth, and cheekbone shape.[11] Cameras are now capable of 3D modeling, rather than 2D modeling that was used in the past that required faces to be turned at least 35 degrees toward the camera.[11]

These systems have been used for tracking people entering and leaving a location, confirming identity for access control, and locating individuals who may pose a threat to public safety. In 2014, the FBI launched the Next Generation Identification system.[12] Beginning as a pilot program in 2009, the system was designed by defense contractor Lockheed Martin (LMT) and built by MorphoTrust, a company that specializes in biometric scanning.[12] Research indicates that 1 in 2 adult Americans have their picture in a facial recognition database and 16 states allow the FBI to access their DMV photo databases.[13]

Ethical Issues

Monitoring without explicit consent

Government monitoring, Ypsilanti

Hacking into private cameras to remotely control them

Webcams

Google Glass

Implications of Facial Recognition

FBI’s NGI System


References

  1. 1.0 1.1 https://kintronics.com/the-history-of-video-surveillance/
  2. 2.0 2.1 2.2 http://www.business2community.com/tech-gadgets/from-edison-to-internet-a-history-of-video-surveillance-0578308#owROavBijRQCfkRk.97
  3. http://www.telegraph.co.uk/technology/10172298/One-surveillance-camera-for-every-11-people-in-Britain-says-CCTV-survey.html
  4. http://www.independent.co.uk/news/uk/crime/cctv-in-the-spotlight-one-crime-solved-for-every-1000-cameras-1776774.html
  5. Homeland Security News Wire (2011). Study shows surveillance cameras reduce crime, in some cases”
  6. 6.0 6.1 6.2 6.3 https://kintronics.com/the-history-of-video-surveillance/
  7. http://www.protectamerica.com/home-security-blog/tech-tips/draft-an-incredibly-unboring-history-of-ip-cameras-draft_11713
  8. https://www.washingtonpost.com/business/technology/new-surveillance-technology-can-track-everyone-in-an-area-for-several-hours-at-a-time/2014/02/05/82f1556e-876f-11e3-a5bd-844629433ba3_story.html?utm_term=.7b4c8d9e5b6f
  9. 9.0 9.1 https://www.pss-1.com/about-pss
  10. 10.0 10.1 http://www.pcadvisor.co.uk/how-to/pc-peripheral/how-use-webcam-as-cctv-3510687//
  11. 11.0 11.1 http://electronics.howstuffworks.com/gadgets/high-tech-gadgets/facial-recognition1.htm/
  12. 12.0 12.1 http://money.cnn.com/2014/09/16/technology/security/fbi-facial-recognition//
  13. https://www.eff.org/deeplinks/2016/10/memo-doj-facial-recognitions-threat-privacy-worse-anyone-thought/