Vous êtes sur la page 1sur 33

For the Security of Citizens

Q1: What is INDECT?


The INDECT project is a research project in the area of intelligent security systems performed by several European universities since 2009 and funded by the European Union which is allowing involved European scientists and researchers to develop

new, advanced and innovative algorithms and methods aiming at combating terrorism and other criminal activities, such as human trafficking, child pornography, detection of dangerous situations (e.g. robberies) and the use of dangerous objects (e.g. knives or guns) in public spaces, affecting citizens safety.

Q2: What is the aim of this project?


A: The aim of INDECT are:

* Automatic threat detection and especially terroristic threats * Recognition of serious criminal behaviour or violence To recognise danger events that could lead to terrorist attacks (e.g. left luggage at an airport, automatic recognition of dangerous tools)

The partners:
INDECT has been initiated by the Polish Platform for Homeland Security. The Project proposal was submitted by the international, pan-European consortium of 17 partners, led by the AGH University of Science and Technology (Krakow, Poland), under the supervision of Professor Andrzej Dziech, the INDECT Project Coordinator. The consortium consists of 11 well-known universities, 4 companies and 2 end-users The purpose of the INDECT project is to involve European scientists and researchers in the development of solutions to and tools for automatic threat detection and criminal activities. A significant part of the project is dedicated to the development of tools and methods for data and privacy protection. The processed information is protected before its transmission or storage to prevent any attempts at unauthorized access. Dedicated tools are being developed to protect citizens privacy in areas covered by visual monitoring systems. The main tasks of INDECT can be divided into 3 categories as shown below:

The first category, Intelligent Monitoring for Threat Detection, is dedicated to the automatic detection of real world threats (video analytics).

Contemporary CCTV monitoring systems are mainly based on the continuous observation approach, where the monitored area is under constant supervision by the operator. If the operator is dishonest, this can potentially lead to privacy abuse. The research conducted within the project aims to improve the efficiency and accuracy of existing video monitoring systems. INDECT is not installing any cameras in the EU; nor is it filming people at random. It is not connected to any existing database or social network.

In the area of Threat Detection in Computer Networks the research focuses on identification of sources which distribute child pornography, or information related to the illegal trade in human organs.

The final category focuses on the development of Data and Privacy Protection techniques.,

There are two main research directions related to this category development of digital watermarking, and cryptographic algorithms. The development of new cryptographic algorithms delivers enhanced security for both data transmission and storage

Q3: What behaviour is an abnormal behaviour?


As regards the definition of abnormal behaviour , the term is not introduced by the INDECT Project, and it was created by EC and explained in the FP7 Work Programme. This term will be always controversial. In our case we clearly understand abnormal behaviour as criminal behaviour , and especially as behaviour related to terrorist acts, serious criminal activities (e.g.: murders, bank robberies, someone leaving the luggage in the airport with the bomb) or criminal activities in the Internet (e.g.: child pornography). We will produce the tools to avoid such situations.

Q4: Who are the members of the Project INDECT ethics board?
A human rights lawyer A professor specialized in Ethics Two police officers and one retired police officer A technical specialist Three researchers in the domain of security related technologies

Q5: Does INDECT address ethical issues?


The INDECT project will have to address a number of ethical issues because of its nature, where sensitive information is processed in many different ways, from security video feeds to intelligent multimedia content analysis in P2P networks and Web server information storage and processing. The project identifies the following ethical issues: adults,

informed consent, privacy, data protection and dual use.

Q6: Is it planned to get this observation-tool for general or will it only be used in special cases, for example to avoid terrorism or child abuse?
The INDECT Project is exceptionally oriented to avoid terrorism and serious criminal actions, also in Internet (e.g. child pornography) to increase security of citizens! We will also produce the tools for protection of personal data (using watermarking technology). It was never planned to get observation tools for general purposes..

Q7:Does INDECT harm our right to privacy and basic freedoms?


The INDECT project will not involve processing of any personal data without the prior written consent of individuals. Should any personal data be used during the project, this will be done on the basis of informed consent of individuals participating in the tests. Peace, democracy and the protection of fundamental rights are the very basis of the EU. Please visit the European Commission Directorate General for Justice to discover more on the policies and activities in the area of justice, fundamental rights and citizenship.

The main characteristics in a nutshell


INDECT is a security research project co-financed by the EU's Framework Programme 7 for Research and Innovation (FP7) (INDECT = Intelligent information system supporting observation, searching and detection for security of citizens in urban environment) INDECT is not installing any cameras in the EU or filming people at random. It is also not linked to any of existing databases and social networks. All that INDECT is working on is an improved way to analyse the existing images of video surveillance cameras. INDECT is thus developing algorithms to identify images that allow the detection of dangerous or criminal behaviour. Examples could for instance be crowd panic during public events, or when people throw objects in football stadiums. There is no secret information on INDECT that is not published. There is nothing "secret" about INDECT. All the information on this project can be found on the website of the project and on the websites of the Commission. INDECT is only tested by volunteers: Like most research projects INDECT is tested by volunteers. It will not be tested in real life situations. No testing of the research carried out by INDECT will take place during sport/entertainment events. An explicit disclaimer has been uploaded on the website of INDECT in 2011 on this matter. Technologies developed by INDECT are intended for police and other law enforcement authorities of the Member States. Should Member States intend to use such new technologies within the scope of Union law, they are bound to comply with the existing national and EU laws.

Some advantages of INDECT:


The INDECT project is trying to tackle an essential problem for police work there is too much surveillance footage to monitor. Mass panics can be better dealt with, ambulances better directed, lives can be saved In times of crisis or attacks it is nearly impossible for the police to monitor all the information provided by today's surveillance technologies. The most explicit example for this was the London bombing in 2005 which lead to the deaths of 52 innocent people. Following these attacks, the metropolitan police had to withdraw hundreds of police from the streets and put them in front of screens to identify the attackers and their background

Closed-circuit television (CCTV) is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors the term is most often applied to those used for surveillance in areas that may need monitoring such as banks, casinos, airports, military installations, and convenience stores

A digital watermark is a kind of marker covertly embedded in a noise-tolerant signal such as audio or image data. It is typically used to identify ownership of the copyright of such signal. "Watermarking" is the process of hiding digital information in a carrier signal. Digital watermarks may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners. It is prominently used for tracing copyright infringements and for banknote authentication.

INDECT applies a new approach to CCTV monitoring known as Threat Monitoring. It focuses on the detection of scenarios containing potential threats. These scenarios include the presence of dangerous objects (e.g. guns), sounds (gun shots, screaming), abandoned luggage, etc.

Automatic recognition of sounds related to threats


Software is being developed that automatically detects sound events such as broken glass, gun shots, explosions, screams, and cries for help, and also determines the sources of such sounds.

Detection of dangerous objects


Research groups are developing algorithms that are designed to detect dangerous objects in a persons hands (e.g. a knife or a gun) in video footage. It is obvious that situations with a high degree of complexity (such as a crowded scene) may lead to false positives. Accuracy will be affected by such factors as the number and placement of cameras, and lighting conditions. Therefore, full analysis of the benefits may require live trials.

Detection of abandoned luggage


They are also developing a system employing innovative video analytic algorithms for the automatic detection of abandoned luggage in airport terminals and railway stations. If the person who has abandoned an object does not return within a pre-defined time-period, a message can be sent warning of an unusual event.

Detection of robberies and similar threats


INDECT is designing a tool which makes it possible to identify such events as robberies, including detection of human cries for help.

INDECT is developing tools for detecting illegal content (such as child pornography) and threats (such as malware/viruses) in computer networks.

INACT Intelligent Advanced Image Catalogue Tool


The INACT computer forensic software tool is used for indexing and searching multimedia computer files. In the future, this tool could be used to help in the fight against crime related to the production, possession and distribution of child pornography. The original algorithm is able to determine any illegal content

A Platform for Malware Network Analysis and Confinement


A botnet is a network of zombie computers compromised by malware (virus, worm). Botnets are coordinated by a bot-master through a command and control channel C&C) to which the malware connects to get instructions. A bot-master can use botnets to perform malicious activities. In this research, the architecture of a platform for studying botnets is being investigated, that includes finding adequate analysis methods, monitoring botnet activity, and finding efficient countermeasures or methods of confinement. The platform comprises a filtering and monitoring gateway and a system for malware analysis.

An important part of the project is research on ensuring information security and personal privacy. Digital watermarking and cryptographic algorithms are the main mechanisms used for this purpose.

Application of digital watermarking for privacy protection secure access to information included in digital images

In these applications, a key role is played by personal privacy. Therefore, techniques for detecting the presence of sensitive parts of the images and then blurring them are commonly used. This technique leads to an irreversible loss of information that is potentially useful in the future. Currently, if there is a need to preserve these sensitive data, two versions of the image, with and without censorship, are recorded at the same time. The research conducted developed a technique to solve this problem. It enables sensitive areas of images to be blurred while leaving the "lost" information securely encoded directly in the same picture. This information is encoded using digital watermark technology.

All of the research activities within INDECT project are carried out so as to ensure the appropriate balance between the protection of the rights of the individual and the protection of society. INDECT research project has an Ethics Board, which was established to ensure strict compliance of research outcomes with already established rules concerning privacy, data protection.

The Ethics Board has a broad membership, designed to exert strict control over the project. It includes representatives from data protection experts, Non-Governmental Organisations, academic world, industry and the Police Service of Northern Ireland, which is generally recognised as adhering to the highest standards of human rights protection in all aspects of its work.

Tools based on INDECT research will enhance the ability of the police to protect the public .

It is important to note that a person highlighted by tools based on INDECT detection algorithms would merely be brought to the attention of the relevant authorities, so that normal lawful measures can be taken

The algorithms and methods on which INDECT project is relying are going to be protected by the national and international rules regarding privacy and the Human Rights (e.g. the Data Protection Act 1998, the Human Rights Act 1998 and the Regulation of Investigatory Powers Act 2000 in the United Kingdom).

The sentence: if you have done nothing wrong, you have nothing to fear is only true if every aspect of the criminal justice system works perfectly, on every occasion. Tools based on INDECT project research outcomes will provide EU Member States with the technology to ensure that decisions around public safety are based on the maximum amount of relevant information available.

Vous aimerez peut-être aussi