A comprehensive report, some years ago, by the FATF (Financial Action Task Force), an independent inter-governmental body that develops policies to protect the global financial system against money laundering and terrorist financing, focused specifically on the vulnerabilities of the casino and gaming sector when it came to both issues, and made a series of recommendations that needed to be put in place to try and prevent both money laundering and the financing of terrorism. The FATF recommendations are recognized as the global anti-money laundering (AML) and counter-terrorist financing (CFT) standard.
The Basel Committee was very clear that KYC guidelines were not to be restricted to banks, but would be applicable to all non-bank financial institutions (NBFIs). Professional intermediaries of financial services, like lawyers and accountants, also needed to be guided by KYC norms, to know not just their customers or clients, but also the source of their money, and the use of the proceeds from that money, within reason.
You, as a provider of a financial service, whether a bank, an insurance company, a mortgage broker or a casino — recognized under law as a NBFI or non-bank financial institution or not — need to be able to try and do five critical functions:
- Know Your Customer (or Client) is who they say they are.
- Know, to the best of your ability, that the source of the money they are storing, saving, or spending with or through your systems or services is legally acquired.
- Keep track of that money while it is in your possession, physically or virtually, and file a suspicious activity report for any transaction that raises questions, or a pattern of activity that is unusual or questionable.
- Create an audit trail for all events and transactions related to the client/customer, in order to protect yourself and your organization, and be able to recreate a chain of custody if required, at a later date.
- Know within reason that the use of the proceeds from money made through the use of your services and systems, is not going toward illegal purposes.
Our products, modules, systems and solutions give organizations the tools to help prevent money laundering, keep track of transactions, and create incident logs.
Our products also give financial services organizations the ability to quickly verify identities of individuals, check documentation and the validity of that documentation, and provide any available conviction/arrest history of a potential licensee in operational real time, thus helping protect these institutions from legal, financial, reputational and other risks, and helping protect the overall integrity of banking and non-bank financial systems.
VisualCasino is our most easily identifiable product in the Casino & Gaming world, and the first product interface of its kind in the Security & Surveillance space.
VisualCasino or VC has been the industry leader in using facial recognition algorithms to analyze streaming video within casinos in order to detect known cheats and advantage players, and is the interface for casinos between SSIN — our all new, wholly encrypted Security & Surveillance Information Network; CID — the new, encrypted Composite Intelligence Database (what was formerly the Casino Information Database has been integrated into the new CID as a separate subset); X-LST — the private database list (similar to what was formerly known as PDE); AFR — our Advanced Facial Recognition module, and LOGiT, an IR system specifically created for security teams, and to allow for security and surveillance records to be tied together for better operational and auditing ability.
As a standalone product, VC has some very specific modules, such as device cheating and training games, but it is best utilized as an interface in conjunction with other systems and modules.
ThreatSafe evolved from the need for a comprehensive interface that would look beyond the casino and gaming sector to industries where forensic analysis of events was as important, if not more, than incidents monitored in real-time.
ThreatSafe is the interface between several players: SSIN — our all new, wholly encrypted Security & Surveillance Information Network; CID — the new, encrypted Composite Intelligence Database; X-LST — the private database list (similar to what was formerly known as PDE); AFR — our Advanced Facial Recognition module, and LOGiT, an IR system specifically created for security teams, and to allow for security and surveillance records to be tied together for better operational and auditing ability.
ThreatSafe grabs frames off streaming video and compares them to pictures in the overall network database, using both SSIN and CID images. It built upon the success of VisualCasino — an industry leader in using facial recognition algorithms to analyze frames from streaming video within casinos in order to detect known cheats and advantage players — and has used that technology to build what should become an industry leading position in Fraud Mitigation and Link Analysis of criminals and their known associates.
SSIN (Security & Surveillance Information Network)
The SSIN is a fully encrypted, peer-to-peer private information system, which allows for the notification of people, events, alerts or warnings, and for the building of a community of authorized surveillance, security and other law enforcement professionals.
The SSIN works at two levels. At one level, it is an unfiltered and encrypted real-time alert system, which enables a community of authorized security and surveillance professionals to share information on various undesirables with other customers with access to the SSIN, from private clients to regulatory authorities to law enforcement agencies.
At a second level, the SSIN is managed out of Biometrica’s Fusion Center, our global security and surveillance operations center, in Las Vegas. At this level, alerts sent out by the Fusion Center represent notifications that have already been separately received, collected, amalgamated and analyzed, using a network of national security and intelligence professionals and private investigators. This is near real-time but not immediate, because of the need to validate the data received.
At both levels, it is a fully encrypted private information system, which also has the ability to incorporate shared watch-lists from different outside groups and intra-organizational watch-lists.
In November 2016, we announced a new version of the SSIN, with functionalities that include a secure, convenient mobile application, which will, with a couple of clicks, give any subscriber with access to the mobile app the ability to run an immediate scan on a suspicious known or unknown person, anywhere on their property, and receive feedback on that person or persons in operational real time.
Over the next few months, other enhanced features will give subscribers the ability to run operational real-time facial recognition scans of individuals on their property against a law enforcement-verified database of criminals — a database that includes known thieves, drug and human traffickers, sex offenders, gang members, murderers, terrorists and white-collar criminals.
The mobile platform will allow subscribers to track suspicious activity as it happens, instead of doing only forensic, post-facto analysis (which will be available, in any case to all subscribers).
The SSIN works by signaling another entity or entities — depending on how the sending entity has chosen to have it set up for that particular transmission — that an individual or group of interest has been spotted. The peer-to-peer network, at any given time, could be from one private client-to-another, a private client to a regulatory body or to everyone else on the system, or from federal/state/local law enforcement to any of the participants, or be restricted to within a particular organization.
You can limit that information to a 1:1 mini-network, a 1:Many network, or to a 1:Subset (within an organization or geographical area). By using our private network, our clients can identify known people, as well as suspects and persons of interest well in advance, to prevent the occurrence of criminal events, or track them later.
CID (Composite Intelligence Database)
The Composite Intelligence Database is an encrypted, searchable repository of information on individuals or groups. Each file has attached dynamic attributes pulled from various intelligence sources instead of being just a static record, in order to enable that file to be updated on an immediate basis, and each individual in the system is “tagged.”
Over time, the concept of what constitutes a CID has evolved. From the first little “black books” or blacklists distributed by Nevada’s gaming regulatory bodies that were the first casino information databases, to CDs of blacklisted individuals updated once a quarter, from our own Casino Information Database into what is now a wholly digital interactive, updatable, searchable product.
It is a database of information made up of case files on a variety of criminal elements, individuals and groups, from thieves to traffickers to terrorists, and their known associates, updated immediately from different sources, as soon as that information is made available through the SSIN, or from outside watch-lists, including national and international law enforcement, and international agencies, after verification.
The new CID does not have to be stored locally, it is stored in a private, encrypted repository operated out of the Biometrica Fusion Center in Las Vegas. It has been developed to allow you to maximize your access to current information about criminal elements, or politically enhanced people, and meet your Know Your Customer requirements, by providing a database you can run your background check against.
The access to data is dependent on the kind of subscription you have. All customers will have access to law enforcement verified data on convicted felons, available arrest data, and to law enforcement wanted lists.
However, a retail establishment, or a hotel that is not connected to a casino, would not have the right to data on a card cheat, or an advantage player, unless that card cheat or advantage player is wanted for a felony or has been convicted for it.
Similarly, a big box store might have a shoplifter that has been added to the database by that retail establishment, a person that has received a warning but has not been handed over to law enforcement authorities. The store might decide to keep an eye on him or her, and put him or her on their X-LST (see X-LST), as a blacklisted individual.
They could opt to alert other retail establishments about this customer, but that alert or person would not show up as a case file for anyone not connected to that particular establishment or to retail customers they have set up an alert for, and other subscribers will not be able to pull that information into the Advanced Facial Recognition system if that person hasn’t been convicted of an offense.
X-LST is critical functionality — it is a dynamic database secured privately for each client at the individual organizational level. X-LST is similar to what was formerly PDE or Private Database Enrolment for clients, except that it is a far more advanced version, encrypted and secured through the Biometrica Fusion Center, and having a range of access controls that restrict access to individual X-LSTs.
No one else can see anything you’ve added to any of your private X-LSTs, these lists are only available to your specific property or organization and can be separately maintained for a range of individual needs: Current/Ex Employees, Advantage Players, Corporate Whitelists & Blacklists, Barred Patrons, VIPs, Self-Exclusions, Escort Services, Shoplifters, Drug Dealers etc.
An organization will have the ability to share an X-LST, either in part of whole, between various properties or regions within a larger organization. It will also have the ability to restrict access to that X-LST within that organization, at the individual, departmental, section, or property level. It can also choose to share that X-LST with other organizations or regions, that choice is left to the organizational authorities.
LOGiT is Biometrica’s first foray into the security sector, as differentiated from the surveillance sector. It is a Security Management and Incident Reporting (IR) tool, a security-focused IR module that is the basis for the building of a digital case file of every incident at the security level.
LOGiT allows for security and surveillance records to be tied together at the local level and beyond, through alerts generated by the Security & Surveillance Information Network, locally or otherwise.
It also creates a digital audit trail that monitors updates or modifications to any file. Anytime a piece of data on an individual is seen or updated, it tags that individual and attaches the data to them.
It gives investigators and forensic analysts the ability to recreate a timeline, or put together a chain of events at a later date, by answering two basic questions: What Did You Know? And When Did You Know It?
LOGiT can be used in different ways. A security officer could send a local level SSIN alert to check on a questionable letter of credit presented at a property, thus creating a minor Incident Report to keep an eye on it, or send a more broad-based, urgent internal or external SSIN alert, when a potential money launderer, or someone previously known to have committed credit card fraud, is spotted. Those alerts are attached to the individual being tagged, and an incident report is created.
Biometrica’s Fusion Center also actively tracks available lists for suspicious individuals, including known sex offenders, and Politically Enhanced Persons (PEPs) or their associates. A security official can create quick, urgent alerts, for instance, when a PEP, a known escort, a person with ties to a drug cartel, an individual or group on a terrorist watch-list, or a known associate of any of these, is spotted.
Logging incidents or events of every kind helps protect your property, your physical and human assets, and the people that patronize your products and services in different ways.
A security team member might, for example, want to be able to proactively, and discreetly, suggest that someone with a previous record as a child sex offender, stay away from a children’s play area in a resort, or from the children’s toys section in a retail establishment. Or ensure that only certain employees are allowed into a “cash room.”
Because you can tailor the alerts at the local level, and control whoever sees those alerts, the potential to successfully and discreetly monitor all situations is immense.
Any SSIN security alert, when entered into the system, also becomes a matter of record for the surveillance team. In the security space, this is a game-changer, allowing security and surveillance records to be tied together, and giving security teams the ability to create blacklists and whitelists for properties, and implement very specific Attribute-Based and Role-Based Access Controls.
AFR (Advanced Facial Recognition)
The DARPA-commissioned, U.S. Department of Defense-developed Advanced Facial Recognition (AFR) module enables security and surveillance personnel to capture images and compare them to pictures already in the Composite Intelligence Database, either directly or through the Biometrica Fusion Center, in order to help identify suspicious patrons or associates prior to potential losses.
The AFR module also enables security and surveillance teams to capture images of customers or employees and run them against images in various available watch-lists and networks in Biometrica’s databases. Our database is based on data feeds from about 2,000 different jurisdictions of verified law enforcement data at the city, county, state level, and federal or international correctional or wanted data.
The new AFR also gives customers the ability to run document scans through our systems. Subscribers with access have the ability to scan drivers’ licenses and passports, and verify that the person physically handing over a document to you is the person whose photograph is in the document, and if it is a valid document.
A member of your security team, or any employee with access to the AFR system can take a quick picture of the person standing in front of them, and run that against the photograph on that individual’s license. It establishes an audit trail.
With passports, our new AFR module allows customers to have a three-pronged match in operational real time, allowing a check on whether a person standing in front of someone (the physical person), matches the printed photograph in the passport, matches the photograph in the chip embedded or stored in the passport.
UMbRA stands for Unique Mission to Build Records and Arrests. Think of it as any web search engine, except a search engine that is focused only on people that have been arrested, convicted of a crime, or wanted by law enforcement for one. It allows you to run searches on faces as well as texts and is sourced 100% from law enforcement data.
With the amount of data out there on the Internet, when you run a general search on someone’s name to check their background, you’re not quite certain whether the data you get is authentic information or not.
A search engine works by showing you all available data on whoever you’ve run a search on. You have no idea if the information you’re looking for will be on page 1 or page 51 of the search. You’d have to double-check all of it to verify the sources of that information, make sure that person is the same person you’re looking for (complicated if you’re looking for someone with a fairly common name), and it is often a time-consuming process. It could take hours, if not days.
UMbRA only tracks records of arrests and convictions, in addition to different law enforcement-sourced lists, including and not limited to lists like most-wanted fugitive lists and sex offender registries. It tracks nothing else and no one else. It sources data only from U.S. city, county, state, federal, and tribal law enforcement, in addition to international law enforcement and intelligence agencies.
Additionally, it will give you an answer in seconds, or in near-operational real-time — when Mr. or Ms. X is standing in front of you, or you know where he or she or they are. Because UMbRA doesn’t use any data not sourced from law enforcement, there’s no ambiguity about this information, it’s already verified.
In addition, if you have a face, and not a name, UMbRA allows you to upload a photograph of Mr. X and run that image against our database of millions, to check whether someone with Mr. X’s likeness is among the arrest, conviction or wanted data we currently have.
UMbRA allows you to run text or image (facial recognition) scans against that 100% law enforcement database, in near real time, from across state lines. Why is this needed? Because crime and criminals travel across county, state, and country boundaries, information doesn’t always travel, and you, as a security or surveillance professional, or an investigator, do not always have easy access to other jurisdictional information databases in real-time.
UMbRA, on the other hand, is available as a simple online search engine, and a mobile app. You can click a picture of Mr. X from your phone and immediately run a search on that picture. Or you can run a search on a name, see what options you get, and quickly sift through those options.
It helps you know whether someone is actually who they say they are, it helps you know if you’re walking into a situation where the person you’re meeting or tailing has a violent past, and it could help you know if someone you’re looking up is not the criminal you think they are.
You can sign up for UMbRA at: https://biometrica.com/shop/.
For more specifics on UMbRA as a product, on how facial recognition works, and on our database, please see the UMbRA FAQ at: https://support.biometrica.com/hc/en-us/sections/115000509473-FAQ.