It’s no surprise that the capabilities of AI have significantly increased especially in recent years as we see its impact on many spheres. Let’s agree AI industry is booming and there’s a lot of excitement around what we call artificial intelligence power. But alongside this excitement and AI’s huge potential there are still questions left unanswered, like, is that power fully realized, what problems does it help to solve, what’s its main role in this period? Like any powerful tool, the impact of AI will depend on how we develop, how we make use of it — and rightly so. Today we’re going to touch upon a topic which is actual nowadays more than ever: how AI is transforming the modern landscape of security and surveillance, in particular, video surveillance and how we imagine the whole process of it.

The beginning of the 21st century was marked by the rise of drones later gradually expanding from the military sphere to the civil one. Nowadays UAV and drone cameras are used in many fields such as transportation, monitoring, emergency rescue, etc.

AI-based technologies don’t get tired while security operators are ordinary people with short attention spans. They are getting tired during the day and become unable to watch and analyze so many materials constantly day after day. As a result, vital information may easily pass undetected. The ability of AI to reduce hours of work to minutes and help focus human attention on events that may need further investigation is important especially in vulnerable areas as schools, crowded events, etc.

So let’s dive into our smart security system and analyze in detail how actually it’s designed to prevent crimes.

 

Preventive Threat Detection

Scylla runs on your local security servers A.K.A on-premise 24/7, silently watching the image coming from Stationary or Drone cameras. As soon as it detects a suspicious behavior or object that could possess a threat towards a protected group of people or a guarded facility Scylla will sense that.

The detection process will immediately open up the dashboard with different statistical metrics that will enhance the intelligence about the current situation.

Scylla smart decision maker A.K.A Charon will notify the operator about the potential threat and will request you to approve the distribution of alerts via mobile and web channels. Security operators in the field will receive an alert via Scylla mobile application. By opening the mobile app, they will see vital information about the attack using Scylla SSIS module, including suspect ID, location, and method of the attack.

 

Vehicle Identification and Tracking

Today most of the attacks happen with the use of vehicles. Scylla will detect the attacker and the vehicle he used, then it will classify the number and the type of vehicles. The next step is the identification of the vehicle by reading the license plates.

After all of these processes, Scylla will match the license plate number with the identity of the attacker using Scylla SSIS module. It will then match the vehicle and the identity information through other cameras connected to the system to do the real-time analysis of the attack thus preventing the threat.

 

 

Smart Suspect Identification System

Knowing the suspect identity is the critical element to threat intelligence and preventing the crime.

Scylla will receive the scene of the attack and do the biometric face extraction of the attacker, after which it will match the face with the connected blacklist of identities.

Upon a match, it will identify the attacker and start the real-time search within connected cameras.

Scylla will send the alerts to law-enforcement via Scylla mobile app, including the identity, location and the possible next place of the attack.

New technology leaves much to be discovered, it’s always interesting, in some sense, even scary, but if you give it a try and use it right, within a certain period of time you’ll see what changes it can bring. As they call, this “unmanned” industry will help make your environment a safer place to live there free of fear.