Casino & Gaming Sector

In 1960, the newly established Nevada Gaming Commission, responsible for regulating casinos and dealing with licenses and disciplinary issues, and the State Gaming Control Board, began to try a clean up of what was referred to as Sin City, overrun, authorities then believed, by gangsters affiliated to the New York and Chicago mobs. They began the practice of putting out names in a black book that was distributed to casinos in the area, the idea being to create a kind of watchlist.

Three decades later, Biometrica Systems, Inc. developed its first products with a view to supporting the casino industry. The company was formally established as Biometrica Systems in 1998, to help the Casino & Gaming industry catch advantage players, cheats, and thieves, and watch out for other criminal elements.

The company too had a watchlist; one that evolved from the digitized CDs of the early Biometrica days, to what is now, under new ownership and management, a sophisticated range of products, systems, networks and modules that do threat recognition, threat identification, threat analysis and data distribution.

We support casino surveillance, security, and compliance teams, state regulatory boards and commissions, state and federal financial services compliance and regulatory authorities, and local, state and federal law enforcement agencies working with casinos to successfully protect the people and assets involved in the gaming industry and maintain the integrity of their businesses and the industry itself.

Products, Modules & Solutions

Over the past few years, we have developed a very sophisticated range of hybrid products and databases — games protection modules and security systems, that help Security & Surveillance teams secure their turf in real-time. This is done through the observation, identification, and tracking of known and unknown undesirables, and making the reporting of incidents faster, easier and more efficient.

We currently have 5 Products & Modules that can be used in tandem with each other and our base interface, VisualCasino (VC), strengthened by the development and release of a new, industry-changing version of VisualCasino, VC7, in the end of 2016. This has allowed us to provide our customers with several new features.

  • Access to what should soon become the world’s largest private, encrypted, and law enforcement-verified facial recognition database of felons, arrestees and sex offenders.
  • Give subscribers the ability to run operational real-time facial recognition scans of any individual on their property against a law enforcement-verified database of criminals numbering in the millions — a database that includes known thieves, drug and human traffickers, gang members, murderers, terrorists, and more than one million registered sex offenders. Our data is based on data feeds from about 2,000 different jurisdictions of verified law enforcement data at the city, county, state level, and federal or international correctional or wanted data.
  • Access to DARPA-commissioned Department of Defense-developed Facial Recognition software.
  • A secure, convenient mobile app that allows any of a customer’s employees with access to it to run an immediate scan on a suspicious known or unknown person, anywhere on their property, with a couple of clicks.
  • Give customers the ability to comprehensively and conveniently support their obligations for KYC or Know Your Customer and Anti-Money Laundering requirements, and also support their ability to fulfill Know Your Employee norms.
  • Provide clients with the tools to easily document all security-related events and incidents in operational real time, and create a digital audit trail for that documentation.
  • Give customers the tools to continuously monitor their employees to maintain regulatory compliance and corporate integrity.
  • Provide customers access to the software and systems that will help them create their own encrypted, private platform-agnostic whitelists and blacklists.

VisualCasino

 

VisualCasino is our most easily identifiable product in the Casino & Gaming world, and the first product interface of its kind in the Security & Surveillance space.

Read More
VisualCasino or VC has been the industry leader in using facial recognition algorithms to analyze streaming video within casinos in order to detect known cheats and advantage players, and is the interface for casinos between SSIN — our all new, wholly encrypted Security & Surveillance Information Network; CID — the new, encrypted Composite Intelligence Database (what was formerly the Casino Information Database has been integrated into the new CID as a separate subset); X-LST — the private database list (similar to what was formerly known as PDE); AFR — our Advanced Facial Recognition module, and LOGiT, an IR system specifically created for security teams, and to allow for security and surveillance records to be tied together for better operational and auditing ability. As a standalone product, VC has some very specific modules, such as device cheating and training games, but it is best utilized as an interface in conjunction with other systems and modules.

SSIN (Security & Surveillance Information Network)

The SSIN is a fully encrypted, peer-to-peer private information system, which allows for the notification of people, events, alerts or warnings, and for the building of a community of authorized surveillance, security and other law enforcement professionals.

Read More
The SSIN works at two levels. At one level, it is an unfiltered and encrypted real-time alert system, which enables a community of authorized security and surveillance professionals to share information on various undesirables with other customers with access to the SSIN, from private clients to regulatory authorities to law enforcement agencies. At a second level, the SSIN is managed out of Biometrica’s Fusion Center, our global security and surveillance operations center, in Las Vegas. At this level, alerts sent out by the Fusion Center represent notifications that have already been separately received, collected, amalgamated and analyzed, using a network of national security and intelligence professionals and private investigators. This is near real-time but not immediate, because of the need to validate the data received. At both levels, it is a fully encrypted private information system, which also has the ability to incorporate shared watch-lists from different outside groups and intra-organizational watch-lists. In November 2016, we announced a new version of the SSIN, with functionalities that include a secure, convenient mobile application, which will, with a couple of clicks, give any subscriber with access to the mobile app the ability to run an immediate scan on a suspicious known or unknown person, anywhere on their property, and receive feedback on that person or persons in operational real time. Over the next few months, other enhanced features will give subscribers the ability to run operational real-time facial recognition scans of individuals on their property against a law enforcement-verified database of criminals — a database that includes known thieves, drug and human traffickers, sex offenders, gang members, murderers, terrorists and white-collar criminals. The mobile platform will allow subscribers to track suspicious activity as it happens, instead of doing only forensic, post-facto analysis (which will be available, in any case to all subscribers). The SSIN works by signaling another entity or entities — depending on how the sending entity has chosen to have it set up for that particular transmission — that an individual or group of interest has been spotted. The peer-to-peer network, at any given time, could be from one private client-to-another, a private client to a regulatory body or to everyone else on the system, or from federal/state/local law enforcement to any of the participants, or be restricted to within a particular organization. You can limit that information to a 1:1 mini-network, a 1:Many network, or to a 1:Subset (within an organization or geographical area). By using our private network, our clients can identify known people, as well as suspects and persons of interest well in advance, to prevent the occurrence of criminal events, or track them later.

CID (Composite Intelligence Database)

The Composite Intelligence Database is an encrypted, searchable repository of information on individuals or groups. Each file has attached dynamic attributes pulled from various intelligence sources instead of being just a static record, in order to enable that file to be updated on an immediate basis, and each individual in the system is “tagged.”

Read More
Over time, the concept of what constitutes a CID has evolved. From the first little “black books” or blacklists distributed by Nevada’s gaming regulatory bodies that were the first casino information databases, to CDs of blacklisted individuals updated once a quarter, from our own Casino Information Database into what is now a wholly digital interactive, updatable, searchable product. It is a database of information made up of case files on a variety of criminal elements, individuals and groups, from thieves to traffickers to terrorists, and their known associates, updated immediately from different sources, as soon as that information is made available through the SSIN, or from outside watch-lists, including national and international law enforcement, and international agencies, after verification. The new CID does not have to be stored locally, it is stored in a private, encrypted repository operated out of the Biometrica Fusion Center in Las Vegas. It has been developed to allow you to maximize your access to current information about criminal elements, or politically enhanced people, and meet your Know Your Customer requirements, by providing a database you can run your background check against. The access to data is dependent on the kind of subscription you have. All customers will have access to law enforcement verified data on convicted felons, available arrest data, and to law enforcement wanted lists. However, a retail establishment, or a hotel that is not connected to a casino, would not have the right to data on a card cheat, or an advantage player, unless that card cheat or advantage player is wanted for a felony or has been convicted for it. Similarly, a big box store might have a shoplifter that has been added to the database by that retail establishment, a person that has received a warning but has not been handed over to law enforcement authorities. The store might decide to keep an eye on him or her, and put him or her on their X-LST (see X-LST), as a blacklisted individual. They could opt to alert other retail establishments about this customer, but that alert or person would not show up as a case file for anyone not connected to that particular establishment or to retail customers they have set up an alert for, and other subscribers will not be able to pull that information into the Advanced Facial Recognition system if that person hasn’t been convicted of an offense.

X-LST

X-LST is critical functionality — it is a dynamic database secured privately for each client at the individual organizational level. X-LST is similar to what was formerly PDE or Private Database Enrolment for clients, except that it is a far more advanced version, encrypted and secured through the Biometrica Fusion Center, and having a range of access controls that restrict access to individual X-LSTs.

Read More
No one else can see anything you’ve added to any of your private X-LSTs, these lists are only available to your specific property or organization and can be separately maintained for a range of individual needs: Current/Ex Employees, Advantage Players, Corporate Whitelists & Blacklists, Barred Patrons, VIPs, Self-Exclusions, Escort Services, Shoplifters, Drug Dealers etc. An organization will have the ability to share an X-LST, either in part of whole, between various properties or regions within a larger organization. It will also have the ability to restrict access to that X-LST within that organization, at the individual, departmental, section, or property level. It can also choose to share that X-LST with other organizations or regions, that choice is left to the organizational authorities.

LOGiT

LOGiT is Biometrica’s first foray into the security sector, as differentiated from the surveillance sector. It is a Security Management and Incident Reporting (IR) tool, a security-focused IR module that is the basis for the building of a digital case file of every incident at the security level.

Read More
LOGiT allows for security and surveillance records to be tied together at the local level and beyond, through alerts generated by the Security & Surveillance Information Network, locally or otherwise. It also creates a digital audit trail that monitors updates or modifications to any file. Anytime a piece of data on an individual is seen or updated, it tags that individual and attaches the data to them. It gives investigators and forensic analysts the ability to recreate a timeline, or put together a chain of events at a later date, by answering two basic questions: What Did You Know? And When Did You Know It? LOGiT can be used in different ways. A security officer could send a local level SSIN alert to check on a questionable letter of credit presented at a property, thus creating a minor Incident Report to keep an eye on it, or send a more broad-based, urgent internal or external SSIN alert, when a potential money launderer, or someone previously known to have committed credit card fraud, is spotted. Those alerts are attached to the individual being tagged, and an incident report is created. Biometrica’s Fusion Center also actively tracks available lists for suspicious individuals, including known sex offenders, and Politically Enhanced Persons (PEPs) or their associates. A security official can create quick, urgent alerts, for instance, when a PEP, a known escort, a person with ties to a drug cartel, an individual or group on a terrorist watch-list, or a known associate of any of these, is spotted. Logging incidents or events of every kind helps protect your property, your physical and human assets, and the people that patronize your products and services in different ways. A security team member might, for example, want to be able to proactively, and discreetly, suggest that someone with a previous record as a child sex offender, stay away from a children’s play area in a resort, or from the children’s toys section in a retail establishment. Or ensure that only certain employees are allowed into a “cash room.” Because you can tailor the alerts at the local level, and control whoever sees those alerts, the potential to successfully and discreetly monitor all situations is immense.

Any SSIN security alert, when entered into the system, also becomes a matter of record for the surveillance team. In the security space, this is a game-changer, allowing security and surveillance records to be tied together, and giving security teams the ability to create blacklists and whitelists for properties, and implement very specific Attribute-Based and Role-Based Access Controls.

AFR (Advanced Facial Recognition)

The DARPA-commissioned, U.S. Department of Defense-developed Advanced Facial Recognition (AFR) module enables security and surveillance personnel to capture images and compare them to pictures already in the Composite Intelligence Database, either directly or through the Biometrica Fusion Center, in order to help identify suspicious patrons or associates prior to potential losses.

Read More
The AFR module also enables security and surveillance teams to capture images of customers or employees and run them against images in various available watch-lists and networks in Biometrica’s databases. Our database is based on data feeds from about 2,000 different jurisdictions of verified law enforcement data at the city, county, state level, and federal or international correctional or wanted data. The new AFR also gives customers the ability to run document scans through our systems. Subscribers with access have the ability to scan drivers’ licenses and passports, and verify that the person physically handing over a document to you is the person whose photograph is in the document, and if it is a valid document. A member of your security team, or any employee with access to the AFR system can take a quick picture of the person standing in front of them, and run that against the photograph on that individual’s license. It establishes an audit trail. With passports, our new AFR module allows customers to have a three-pronged match in operational real time, allowing a check on whether a person standing in front of someone (the physical person), matches the printed photograph in the passport, matches the photograph in the chip embedded or stored in the passport.
Submit a help ticket or question