Crime travels. People travel much more than they once did. But knowledge of the crime or criminals doesn’t always travel across jurisdictional boundaries.
We work with law enforcement to be able to quickly provide identities of suspects, check documentation and the validity of that documentation, and provide any available conviction/arrest history of a potential suspect in operational real time.
We do that by giving law enforcement subscribers the tools to quickly access available demographic information about suspects — provide answers to questions like Who They Are, or What Have They Done In The Past — in order to assist them to do their jobs more efficiently.
- We provide access to what should soon become the world’s largest private, encrypted, and law enforcement-verified facial recognition database of felons, arrestees and sex offenders.
- We give subscribers the ability to run operational real-time facial recognition scans of any individual on their property against a law enforcement-verified database of criminals numbering in the millions — a database that includes known thieves, drug and human traffickers, gang members, murderers, terrorists, and more than one million registered sex offenders.
- Our data is based on data feeds from about 2,000 different jurisdictions of verified law enforcement data at the city, county, state level, and federal or international correctional or wanted data.
- We provide access to DARPA-commissioned Department of Defense-developed Facial Recognition software.
- We provide a secure, convenient mobile app that allows any of a client’s employees with access to it to run an immediate scan on a suspicious known or unknown person with a couple of clicks.
Our encrypted software and systems also provide law enforcement professionals with the ability to build a digital case file around an individual or incident, and share that case file across their own department or with other departments within or beyond jurisdictional lines, while maintaining the chain of custody of that digital data, and creating an audit trail for it.
We understand that at the moment, most law enforcement agencies and systems are either not connected to other law enforcement groups, or have restricted access to systems that do, and need IT and technical support to connect to outside systems.
Additionally, we understand that data sharing, beyond anything mandatorily shared in part or whole with state or federal agencies, or information shared with other jurisdictions on receiving individual or case specific requests from officers or departments in other jurisdictions, is rare. That process though, when and where it exists, is time-consuming and often bound by red tape. In many jurisdictions, for instance, Facial Recognition software and systems, when available, are only available at certain computers, in specific locations, with restricted access.
With a centralized repository, we don’t face those same restrictions. We provide the ability to quickly see data, especially on traveling crime or criminals. Our tools enable you to access law enforcement-verified information from over 2,000 jurisdictions faster, more smoothly, and in operational real time.
An officer could, for instance, take a photo and run a background information check directly from a crime scene. Or clear a potential suspect in quick minutes, even while the incident and any request is being logged, and a chain of events is being created.
Products & Modules
Over the years, we have developed a very sophisticated range of hybrid products, databases, modules and systems, which support security and surveillance professionals and teams of all stripes secure their turf in real-time. This is done through the observation, identification, and tracking of known and unknown undesirables, and making the reporting of incidents faster, easier and more efficient.
We currently have 5 Modules that can be used in tandem with each other and our new base interface, ThreatSafe (TS), introduced in late 2016.
ThreatSafe evolved from the need for a comprehensive interface that would look beyond the casino and gaming sector to industries where forensic analysis of events was as important, if not more, than incidents monitored in real-time.
ThreatSafe is the interface between several players: SSIN — our all new, wholly encrypted Security & Surveillance Information Network; CID — the new, encrypted Composite Intelligence Database; X-LST — the private database list (similar to what was formerly known as PDE); AFR — our Advanced Facial Recognition module, and LOGiT, an IR system specifically created for security teams, and to allow for security and surveillance records to be tied together for better operational and auditing ability.
ThreatSafe grabs frames off streaming video and compares them to pictures in the overall network database, using both SSIN and CID images. It built upon the success of VisualCasino — an industry leader in using facial recognition algorithms to analyze frames from streaming video within casinos in order to detect known cheats and advantage players — and has used that technology to build what should become an industry leading position in Fraud Mitigation and Link Analysis of criminals and their known associates.
SSIN (Security & Surveillance Information Network)
The SSIN is a fully encrypted, peer-to-peer private information system, which allows for the notification of people, events, alerts or warnings, and for the building of a community of authorized surveillance, security and other law enforcement professionals.
The SSIN works at two levels. At one level, it is an unfiltered and encrypted real-time alert system, which enables a community of authorized security and surveillance professionals to share information on various undesirables with other customers with access to the SSIN, from private clients to regulatory authorities to law enforcement agencies.
At a second level, the SSIN is managed out of Biometrica’s Fusion Center, our global security and surveillance operations center, in Las Vegas. At this level, alerts sent out by the Fusion Center represent notifications that have already been separately received, collected, amalgamated and analyzed, using a network of national security and intelligence professionals and private investigators. This is near real-time but not immediate, because of the need to validate the data received.
At both levels, it is a fully encrypted private information system, which also has the ability to incorporate shared watch-lists from different outside groups and intra-organizational watch-lists.
In November 2016, we announced a new version of the SSIN, with functionalities that include a secure, convenient mobile application, which will, with a couple of clicks, give any subscriber with access to the mobile app the ability to run an immediate scan on a suspicious known or unknown person, anywhere on their property, and receive feedback on that person or persons in operational real time.
Over the next few months, other enhanced features will give subscribers the ability to run operational real-time facial recognition scans of individuals on their property against a law enforcement-verified database of criminals — a database that includes known thieves, drug and human traffickers, sex offenders, gang members, murderers, terrorists and white-collar criminals.
The mobile platform will allow subscribers to track suspicious activity as it happens, instead of doing only forensic, post-facto analysis (which will be available, in any case to all subscribers).
The SSIN works by signaling another entity or entities — depending on how the sending entity has chosen to have it set up for that particular transmission — that an individual or group of interest has been spotted. The peer-to-peer network, at any given time, could be from one private client-to-another, a private client to a regulatory body or to everyone else on the system, or from federal/state/local law enforcement to any of the participants, or be restricted to within a particular organization.
You can limit that information to a 1:1 mini-network, a 1:Many network, or to a 1:Subset (within an organization or geographical area). By using our private network, our clients can identify known people, as well as suspects and persons of interest well in advance, to prevent the occurrence of criminal events, or track them later.
CID (Composite Intelligence Database)
The Composite Intelligence Database is an encrypted, searchable repository of information on individuals or groups. Each file has attached dynamic attributes pulled from various intelligence sources instead of being just a static record, in order to enable that file to be updated on an immediate basis, and each individual in the system is “tagged.”
Over time, the concept of what constitutes a CID has evolved. From the first little “black books” or blacklists distributed by Nevada’s gaming regulatory bodies that were the first casino information databases, to CDs of blacklisted individuals updated once a quarter, from our own Casino Information Database into what is now a wholly digital interactive, updatable, searchable product.
It is a database of information made up of case files on a variety of criminal elements, individuals and groups, from thieves to traffickers to terrorists, and their known associates, updated immediately from different sources, as soon as that information is made available through the SSIN, or from outside watch-lists, including national and international law enforcement, and international agencies, after verification.
The new CID does not have to be stored locally, it is stored in a private, encrypted repository operated out of the Biometrica Fusion Center in Las Vegas. It has been developed to allow you to maximize your access to current information about criminal elements, or politically enhanced people, and meet your Know Your Customer requirements, by providing a database you can run your background check against.
The access to data is dependent on the kind of subscription you have. All customers will have access to law enforcement verified data on convicted felons, available arrest data, and to law enforcement wanted lists.
However, a retail establishment, or a hotel that is not connected to a casino, would not have the right to data on a card cheat, or an advantage player, unless that card cheat or advantage player is wanted for a felony or has been convicted for it.
Similarly, a big box store might have a shoplifter that has been added to the database by that retail establishment, a person that has received a warning but has not been handed over to law enforcement authorities. The store might decide to keep an eye on him or her, and put him or her on their X-LST (see X-LST), as a blacklisted individual.
They could opt to alert other retail establishments about this customer, but that alert or person would not show up as a case file for anyone not connected to that particular establishment or to retail customers they have set up an alert for, and other subscribers will not be able to pull that information into the Advanced Facial Recognition system if that person hasn’t been convicted of an offense.
X-LST is critical functionality — it is a dynamic database secured privately for each client at the individual organizational level. X-LST is similar to what was formerly PDE or Private Database Enrolment for clients, except that it is a far more advanced version, encrypted and secured through the Biometrica Fusion Center, and having a range of access controls that restrict access to individual X-LSTs.
No one else can see anything you’ve added to any of your private X-LSTs, these lists are only available to your specific property or organization and can be separately maintained for a range of individual needs: Current/Ex Employees, Advantage Players, Corporate Whitelists & Blacklists, Barred Patrons, VIPs, Self-Exclusions, Escort Services, Shoplifters, Drug Dealers etc.
An organization will have the ability to share an X-LST, either in part of whole, between various properties or regions within a larger organization. It will also have the ability to restrict access to that X-LST within that organization, at the individual, departmental, section, or property level. It can also choose to share that X-LST with other organizations or regions, that choice is left to the organizational authorities.
LOGiT is Biometrica’s first foray into the security sector, as differentiated from the surveillance sector. It is a Security Management and Incident Reporting (IR) tool, a security-focused IR module that is the basis for the building of a digital case file of every incident at the security level.
LOGiT allows for security and surveillance records to be tied together at the local level and beyond, through alerts generated by the Security & Surveillance Information Network, locally or otherwise.
It also creates a digital audit trail that monitors updates or modifications to any file. Anytime a piece of data on an individual is seen or updated, it tags that individual and attaches the data to them.
It gives investigators and forensic analysts the ability to recreate a timeline, or put together a chain of events at a later date, by answering two basic questions: What Did You Know? And When Did You Know It?
LOGiT can be used in different ways. A security officer could send a local level SSIN alert to check on a questionable letter of credit presented at a property, thus creating a minor Incident Report to keep an eye on it, or send a more broad-based, urgent internal or external SSIN alert, when a potential money launderer, or someone previously known to have committed credit card fraud, is spotted. Those alerts are attached to the individual being tagged, and an incident report is created.
Biometrica’s Fusion Center also actively tracks available lists for suspicious individuals, including known sex offenders, and Politically Enhanced Persons (PEPs) or their associates. A security official can create quick, urgent alerts, for instance, when a PEP, a known escort, a person with ties to a drug cartel, an individual or group on a terrorist watch-list, or a known associate of any of these, is spotted.
Logging incidents or events of every kind helps protect your property, your physical and human assets, and the people that patronize your products and services in different ways.
A security team member might, for example, want to be able to proactively, and discreetly, suggest that someone with a previous record as a child sex offender, stay away from a children’s play area in a resort, or from the children’s toys section in a retail establishment. Or ensure that only certain employees are allowed into a “cash room.”
Because you can tailor the alerts at the local level, and control whoever sees those alerts, the potential to successfully and discreetly monitor all situations is immense.
Any SSIN security alert, when entered into the system, also becomes a matter of record for the surveillance team. In the security space, this is a game-changer, allowing security and surveillance records to be tied together, and giving security teams the ability to create blacklists and whitelists for properties, and implement very specific Attribute-Based and Role-Based Access Controls.
AFR (Advanced Facial Recognition)
The DARPA-commissioned, U.S. Department of Defense-developed Advanced Facial Recognition (AFR) module enables security and surveillance personnel to capture images and compare them to pictures already in the Composite Intelligence Database, either directly or through the Biometrica Fusion Center, in order to help identify suspicious patrons or associates prior to potential losses.
The AFR module also enables security and surveillance teams to capture images of customers or employees and run them against images in various available watch-lists and networks in Biometrica’s databases. Our database is based on data feeds from about 2,000 different jurisdictions of verified law enforcement data at the city, county, state level, and federal or international correctional or wanted data.
The new AFR also gives customers the ability to run document scans through our systems. Subscribers with access have the ability to scan drivers’ licenses and passports, and verify that the person physically handing over a document to you is the person whose photograph is in the document, and if it is a valid document.
A member of your security team, or any employee with access to the AFR system can take a quick picture of the person standing in front of them, and run that against the photograph on that individual’s license. It establishes an audit trail.
With passports, our new AFR module allows customers to have a three-pronged match in operational real time, allowing a check on whether a person standing in front of someone (the physical person), matches the printed photograph in the passport, matches the photograph in the chip embedded or stored in the passport.