INDECT is a research project in the area of intelligent security systems performed by several European universities since 2009 and funded by the
European Union
The European Union (EU) is a supranational political and economic union of member states that are located primarily in Europe. The union has a total area of and an estimated total population of about 447million. The EU has often been des ...
. The purpose of the project is to involve European scientists and researchers in the development of solutions to and tools for automatic threat detection through e.g. processing of
CCTV camera
A closed-circuit television camera can produce images or recordings for surveillance or other private purposes. Cameras can be either video cameras, or digital stills cameras. Walter Bruch was the inventor of the CCTV camera. The main purpose o ...
data streams, standardization of video sequence quality for user applications, threat detection in computer networks as well as data and privacy protection.
The area of research, applied methods, and techniques are described in the public deliverables which are available to the public on the project's website. Practically, all information related to the research is public. Only documents that comprise information related to financial data or information that could negatively influence the competitiveness and law enforcement capabilities of parties involved in the project are not published. This follows regulations and practices applied in EU research projects.
Application and target users
The main end-user of INDECT solutions are police forces and security services.
The principle of operation of the project is detecting threats and identifying sources of threats, without monitoring and searching for particular citizens or groups of citizens. Then, the system operator (''i.e.'' police officer) decides whether an intervention of services responsible for public security are required or not. Further investigation eventually leading to persons related to threats is performed, preserving the presumption of innocence, based on existing procedures already used by police services and prosecutors. As it can be found in the project deliverables, INDECT does not involve storage of personal data (such as names, addresses, identity document numbers, etc.).
A similar, behavior-based surveillance program was
SAMURAI
were the hereditary military nobility and officer caste of medieval and early-modern Japan from the late 12th century until their abolition in 1876. They were the well-paid retainers of the '' daimyo'' (the great feudal landholders). They h ...
''(Suspicious and Abnormal behavior Monitoring Using a netwoRk of cAmeras & sensors for sItuation awareness enhancement)''.
Expected results
The main expected results of the INDECT project are:
* Trial of intelligent analysis of video and audio data for threat detection in urban environments
* Creation of tools and technology for privacy and data protection during storage and transmission of information using
quantum cryptography
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution ...
and new methods of
digital watermarking
A digital watermark is a kind of marker covertly embedded in a noise-tolerant signal such as audio, video or image data. It is typically used to identify ownership of the copyright of such signal. "Watermarking" is the process of hiding digital inf ...
* Performing computer-aided detection of threats and targeted crimes in Internet resources with privacy-protecting solutions
* Construction of a
search engine
A search engine is a software system designed to carry out web searches. They search the World Wide Web in a systematic way for particular information specified in a textual web search query. The search results are generally presented in a ...
for rapid semantic search based on watermarking of content related to
child pornography
Child pornography (also called CP, child sexual abuse material, CSAM, child porn, or kiddie porn) is pornography that unlawfully exploits children for sexual stimulation. It may be produced with the direct involvement or sexual assault of a chi ...
and human organ trafficking
* Implementation of a distributed computer system that is capable of effective intelligent processing
Controversy
Some media and other sources accuse INDECT of privacy abuse, collecting personal data, and keeping information from the public. Consequently, these issues have been commented and discussed by some Members of the European Parliament.
As seen in the project's documentation, INDECT does not involve
mobile phone tracking
Mobile phone tracking is a process for identifying the location of a mobile phone, whether stationary or moving. Localization may be effected by a number of technologies, such as the multilateration of radio signals between (several) cell towers ...
or call interception.
The rumors about testing INDECT during
2012 UEFA European Football Championship also turned out to be false.
The mid-term review of the
Seventh Framework Programme
The Framework Programmes for Research and Technological Development, also called Framework Programmes or abbreviated FP1 to FP9, are funding programmes created by the European Union/European Commission to support and foster research in the Europea ...
to the European Parliament strongly urges the European Commission to immediately make all documents available and to define a clear and strict mandate for the research goal, the application, and the end users of INDECT, and stresses a thorough investigation of the possible impact on
fundamental rights
Fundamental rights are a group of rights that have been recognized by a high degree of protection from encroachment. These rights are specifically identified in a constitution, or have been found under due process of law. The United Nations' Sustai ...
.
Committee on Industry, Research and Energy The Committee on Industry, Research and Energy (ITRE) is a committee of the European Parliament. Its areas of responsibility relate to industry, especially technology-intensive manufacturing, information technology, and telecommunications. It also ...
Report on the mid-term review of the Seventh Framework Programme of the European Union for research, technological development and demonstration activities (2011/2043(INI)).
Results of FP7, 27. 18 April 2011. Nevertheless, according to Mr. Paweł Kowal, MEP, the project had the ethical review on 15 March 2011 in Brussels with the participation of ethics experts from Austria, France, Netherlands, Germany and Great Britain.
See also
*
Facial recognition system
A facial recognition system is a technology capable of matching a human face from a digital image or a video frame against a database of faces. Such a system is typically employed to authenticate users through ID verification services, and wo ...
*
Mass surveillance (European Union)
* Behavioral Recognition Systems, Inc.
*
Video content analysis Video content analysis or video content analytics (VCA), also known as video analysis or video analytics (VA), is the capability of automatically analyzing video to detect and determine temporal and spatial events.
This technical capability is used ...
*
Artificial intelligence for video surveillance
Artificial intelligence for video surveillance utilizes computer software programs that analyze the audio and images from video surveillance cameras in order to recognize humans, vehicles, objects, attributes, and events. Security contractors pro ...
Further reading
Official websiteINDECT Evaluation of Components, D9.4 WP9Official INDECT YouTube channelEuropean FP7-SEC: On detecting Internet-based criminal threats with XplicoAlertsAnswer given by European Parliament concerning INDECT
References
{{DEFAULTSORT:Indect
Law enforcement techniques
Public safety
Research projects
2009 establishments in the European Union
Video surveillance
Computer vision