Casino & Gaming Sector
In 1960, the newly established Nevada Gaming Commission, responsible for regulating casinos and dealing with licenses and disciplinary issues, and the State Gaming Control Board, began to try a clean up of what was referred to as Sin City, overrun, authorities then believed, by gangsters affiliated to the New York and Chicago mobs. They began the practice of putting out names in a black book that was distributed to casinos in the area, the idea being to create a kind of watchlist.
Three decades later, Biometrica Systems, Inc. developed its first products with a view to supporting the casino industry. The company was formally established as Biometrica Systems in 1998, to help the Casino & Gaming industry catch advantage players, cheats, and thieves, and watch out for other criminal elements.
The company too had a watchlist; one that evolved from the digitized CDs of the early Biometrica days, to what is now, under new ownership and management, a sophisticated range of products, systems, networks and modules that do threat recognition, threat identification, threat analysis and data distribution.
We support casino surveillance, security, and compliance teams, state regulatory boards and commissions, state and federal financial services compliance and regulatory authorities, and local, state and federal law enforcement agencies working with casinos to successfully protect the people and assets involved in the gaming industry and maintain the integrity of their businesses and the industry itself.
Products, Modules & Solutions
Over the past few years, we have developed a very sophisticated range of hybrid products and databases — games protection modules and security systems, that help Security & Surveillance teams secure their turf in real-time. This is done through the observation, identification, and tracking of known and unknown undesirables, and making the reporting of incidents faster, easier and more efficient.
We currently have 5 Products & Modules that can be used in tandem with each other and our base interface, VisualCasino (VC), strengthened by the development and release of a new, industry-changing version of VisualCasino, VC7, in the end of 2016. This has allowed us to provide our customers with several new features.
- Access to what should soon become the world’s largest private, encrypted, and law enforcement-verified facial recognition database of felons, arrestees and sex offenders.
- Give subscribers the ability to run operational real-time facial recognition scans of any individual on their property against a law enforcement-verified database of criminals numbering in the millions — a database that includes known thieves, drug and human traffickers, gang members, murderers, terrorists, and more than one million registered sex offenders. Our data is based on data feeds from about 2,000 different jurisdictions of verified law enforcement data at the city, county, state level, and federal or international correctional or wanted data.
- Access to DARPA-commissioned Department of Defense-developed Facial Recognition software.
- A secure, convenient mobile app that allows any of a customer’s employees with access to it to run an immediate scan on a suspicious known or unknown person, anywhere on their property, with a couple of clicks.
- Give customers the ability to comprehensively and conveniently support their obligations for KYC or Know Your Customer and Anti-Money Laundering requirements, and also support their ability to fulfill Know Your Employee norms.
- Provide clients with the tools to easily document all security-related events and incidents in operational real time, and create a digital audit trail for that documentation.
- Give customers the tools to continuously monitor their employees to maintain regulatory compliance and corporate integrity.
- Provide customers access to the software and systems that will help them create their own encrypted, private platform-agnostic whitelists and blacklists.
VisualCasino is our most easily identifiable product in the Casino & Gaming world, and the first product interface of its kind in the Security & Surveillance space.
SSIN (Security & Surveillance Information Network)
The SSIN is a fully encrypted, peer-to-peer private information system, which allows for the notification of people, events, alerts or warnings, and for the building of a community of authorized surveillance, security and other law enforcement professionals.
CID (Composite Intelligence Database)
The Composite Intelligence Database is an encrypted, searchable repository of information on individuals or groups. Each file has attached dynamic attributes pulled from various intelligence sources instead of being just a static record, in order to enable that file to be updated on an immediate basis, and each individual in the system is “tagged.”
X-LST is critical functionality — it is a dynamic database secured privately for each client at the individual organizational level. X-LST is similar to what was formerly PDE or Private Database Enrolment for clients, except that it is a far more advanced version, encrypted and secured through the Biometrica Fusion Center, and having a range of access controls that restrict access to individual X-LSTs.
LOGiT is Biometrica’s first foray into the security sector, as differentiated from the surveillance sector. It is a Security Management and Incident Reporting (IR) tool, a security-focused IR module that is the basis for the building of a digital case file of every incident at the security level.
Any SSIN security alert, when entered into the system, also becomes a matter of record for the surveillance team. In the security space, this is a game-changer, allowing security and surveillance records to be tied together, and giving security teams the ability to create blacklists and whitelists for properties, and implement very specific Attribute-Based and Role-Based Access Controls.
AFR (Advanced Facial Recognition)
The DARPA-commissioned, U.S. Department of Defense-developed Advanced Facial Recognition (AFR) module enables security and surveillance personnel to capture images and compare them to pictures already in the Composite Intelligence Database, either directly or through the Biometrica Fusion Center, in order to help identify suspicious patrons or associates prior to potential losses.