SlideShare ist ein Scribd-Unternehmen logo
1 von 103
Downloaden Sie, um offline zu lesen
••
IntelligentIntelligent CyberCyber SurveillanceSurveillance
AI Video Analytics & Biometrics!AI Video Analytics & Biometrics!
1
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
AI Video Analytics & Biometrics!AI Video Analytics & Biometrics!
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!
••
ИнтеллектуальныйИнтеллектуальный
киберкибер--наблюдениенаблюдение
2
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
киберкибер--наблюдениенаблюдение
AI Видеоаналитика и биометрияAI Видеоаналитика и биометрия!!
Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!
www.Valentina.net/NICE2018/www.Valentina.net/NICE2018/
““CyberVisionsCyberVisions for Business & Governments!”for Business & Governments!”
Theme (1)Theme (1) -- CyberSecurity for Critical Infrastructure:CyberSecurity for Critical Infrastructure: Business & Governments!...Business & Governments!...
-- CyberSecurity for Critical National InfrastructureCyberSecurity for Critical National Infrastructure (CNI):(CNI):
-- Case Studies of National Government Cyber ProgrammesCase Studies of National Government Cyber Programmes
-- Operational Cyber Standards, Laws & RegulationsOperational Cyber Standards, Laws & Regulations
“Cyber Strategies for Critical Business”“Cyber Strategies for Critical Business” 66thth Nov:Nov: 9:459:45 –– 10:3010:30
ThemeTheme (2)(2) –– Intelligent Cyber Surveillance:Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!...AI Video Analytics & Biometrics!...
-- 2121ststCC Cyber Landscape for Business & Government SurveillanceCyber Landscape for Business & Government Surveillance
-- Advanced Surveillance Tools using AI Video Analytics & BiometricsAdvanced Surveillance Tools using AI Video Analytics & Biometrics
3
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
-- Advanced Surveillance Tools using AI Video Analytics & BiometricsAdvanced Surveillance Tools using AI Video Analytics & Biometrics
-- Case Studies of Sector Surveillance: Transport, Retail, Culture, Defence...Case Studies of Sector Surveillance: Transport, Retail, Culture, Defence...
“Cyber Surveillance”“Cyber Surveillance” 66thth Nov: 12:15Nov: 12:15 –– 13:0013:00
Theme (3)Theme (3) –– CyberVisionCyberVision 2020 to 20302020 to 2030:: YOURYOUR 2121stst CC CyberSecurity Toolkit!...CyberSecurity Toolkit!...
-- Understanding and Mapping the Worldwide Cyber ThreatsUnderstanding and Mapping the Worldwide Cyber Threats
-- Exploring New Cyber Tools using AI & Machine LearningExploring New Cyber Tools using AI & Machine Learning
-- Discussion of Cyber Scenarios forDiscussion of Cyber Scenarios for 20202020 –– 20252025 –– 20302030 & Beyond !...& Beyond !...
“Cyber“Cyber ToolKitToolKit”” 66thth NovNov: 16:15: 16:15 –– 17:0017:00
DownloadDownload:: www.valentina.net/www.valentina.net/NICE2018NICE2018//
11 –– 2121ststCC Background PerspectivesBackground Perspectives
“Cyber Intelligence“Cyber Intelligence””
22 –– Integrating Cyber & CCTV ToolsIntegrating Cyber & CCTV Tools
“Cyber Convergence”“Cyber Convergence”
3 –– Case Studies: Recent EventsCase Studies: Recent Events
“Urban Terrorism”“Urban Terrorism”
IntelligentIntelligent CyberCyber Surveillance!...Surveillance!...
4
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“Cyber Intelligence“Cyber Intelligence”” “Cyber Convergence”“Cyber Convergence” “Urban Terrorism”“Urban Terrorism”
44 –– Smart Cities & Event SurveillanceSmart Cities & Event Surveillance
“Crowded Places”“Crowded Places”
55 –– Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools
“AI Video Analytics”“AI Video Analytics”
66 –– Biometric & Behaviour ProfilesBiometric & Behaviour Profiles
“Cyber Biometrics”“Cyber Biometrics”
77 –– TransportTransport, Retail, Culture, Defence, Retail, Culture, Defence
““Sector SurveillanceSector Surveillance””
88 –– Cyber Surveillance Visions!...Cyber Surveillance Visions!...
““CyberCyber 2025 Futures”2025 Futures”
9 – YOUR Security & Surveillance!
“YOUR Business Plan”“YOUR Business Plan”
11 –– 2121ststCC Background PerspectivesBackground Perspectives
“Cyber Intelligence“Cyber Intelligence””
22 –– Integrating Cyber & CCTV ToolsIntegrating Cyber & CCTV Tools
“Cyber Convergence”“Cyber Convergence”
3 –– Case Studies: Recent EventsCase Studies: Recent Events
“Urban Terrorism”“Urban Terrorism”
IntelligentIntelligent CyberCyber Surveillance!...Surveillance!...
11 –– 2121ststC Background PerspectivesC Background Perspectives
5
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“Cyber Intelligence“Cyber Intelligence”” “Cyber Convergence”“Cyber Convergence” “Urban Terrorism”“Urban Terrorism”
44 –– Smart Cities & Event SurveillanceSmart Cities & Event Surveillance
“Crowded Places”“Crowded Places”
55 –– Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools
“AI Video Analytics”“AI Video Analytics”
66 –– Biometric & Behaviour ProfilesBiometric & Behaviour Profiles
“Cyber Biometrics”“Cyber Biometrics”
77 –– TransportTransport, Retail, Culture, Defence, Retail, Culture, Defence
““Sector SurveillanceSector Surveillance””
88 –– Cyber Surveillance Visions!...Cyber Surveillance Visions!...
““CyberCyber 2025 Futures”2025 Futures”
9 – YOUR Security & Surveillance!
“YOUR Business Plan”“YOUR Business Plan”
11 –– 2121 C Background PerspectivesC Background Perspectives
“Cyber Intelligence”“Cyber Intelligence”
Public, Private &Public, Private & Dark Web:Dark Web:
-- Visible & Hidden Layers of the InternetVisible & Hidden Layers of the Internet --
Public Web:Public Web: Amazon, eBay, Google,Amazon, eBay, Google, FacebookFacebook, Wikipedia & Info........, Wikipedia & Info........
6
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Dark Web:Dark Web: Cyber Criminals, TOR & VPN, Hacktivists & Illegal Trades.......Cyber Criminals, TOR & VPN, Hacktivists & Illegal Trades.......
Private Web:Private Web: Government,Government,
Agencies, Critical Sectors.....Agencies, Critical Sectors.....
2121ststC CybersecurityC Cybersecurity “Threats & Trends”“Threats & Trends”
•• 25 Year25 Year Evolution of CyberCrime &Evolution of CyberCrime & CyberTerrorCyberTerror:: 19931993--20182018
•• “21“21stst Century Colonisation”Century Colonisation” of Worldwide Internet by
eCriminals, Hacktivists and CyberTerrorist Organisations
•• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI)
significantly increases CyberTerror Risks for ALL Nations!
7
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI)
significantly increases CyberTerror Risks for ALL Nations!
•• High Security Risks:High Security Risks: Most Governments & Businesses are
currently not well secured against Cyber Attacks & eCrime
.......and the.......and the “Bad Guys”“Bad Guys” are currently winning!are currently winning!
2121ststC CybersecurityC Cybersecurity “Threats & Trends”“Threats & Trends”
•• 25 Year25 Year Evolution of CyberCrime &Evolution of CyberCrime & CyberTerrorCyberTerror:: 19931993--20182018
•• “21“21stst Century Colonisation”Century Colonisation” of Worldwide Internet by
eCriminals, Hacktivists and CyberTerrorist Organisations
•• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI)
significantly increases CyberTerror Risks for ALL Nations!
8
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI)
significantly increases CyberTerror Risks for ALL Nations!
•• High Security Risks:High Security Risks: Most Governments & Businesses are
currently not well secured against Cyber Attacks & eCrime
.......and the.......and the “Bad Guys”“Bad Guys” are currently winning!are currently winning!
Image:Image: DavidDavid ShankboneShankbone: Occupy Wall Street: Occupy Wall Street –– Sept 2011Sept 2011
RealReal--Time Cyber Threat MapTime Cyber Threat Map @ Light Speed@ Light Speed
9
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
NorseNorse CyberMapCyberMap:: RealReal--Time Cyber ThreatsTime Cyber Threats
10
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
KasperskyKaspersky CyberMapCyberMap:: RealReal--Time ThreatsTime Threats
11
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Link:Link: http://Cybermap.kaspersky.comhttp://Cybermap.kaspersky.com
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
12
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
13
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
14
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Chemnitz StationChemnitz Station -- GermanyGermany
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
15
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Chemnitz StationChemnitz Station -- GermanyGermany
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
16
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Chemnitz StationChemnitz Station -- GermanyGermany
.....Cost to UK National Health Service =.....Cost to UK National Health Service = £92M£92M
CyberAttack:CyberAttack: Tesco BankTesco Bank –– Nov 2016Nov 2016
17
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
66thth Nov 2016:Nov 2016: Cyber CriminalsCyber Criminals fromfrom Brazil & SpainBrazil & Spain hackhack 40,00040,000
TESCO Bank AccountsTESCO Bank Accounts with reported Theft ofwith reported Theft of £2.5m£2.5m fromfrom 9,0009,000
£16.4m Fine£16.4m Fine from UK FCAfrom UK FCA –– Financial Conduct AuthorityFinancial Conduct Authority
Command & Control (C2)Command & Control (C2) MalwareMalware ServersServers
-- “Global 21“Global 21stst CenturyCentury CyberCyber--ColonisationColonisation”” --
18
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Image:Image: www.fireeye.comwww.fireeye.com –– FireEyeFireEye Inc (c)Inc (c)
Typical C2Typical C2
MalwareMalware
SignaturesSignatures
19
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
SignaturesSignatures
Image:Image: www.fireeye.comwww.fireeye.com –– FireEyeFireEye Inc (c)Inc (c)
Intelligent RealIntelligent Real--TimeTime CyberCyber ToolsTools
• Defence against 21stC Terror Attacks requires Cyber
Operations in RealReal--Time @ Light Speed!Time @ Light Speed!
a) Smart Target SurveillanceSurveillance, Profiling & Tracking
b) User & Device AuthenticationAuthentication: “Internet of Things”
c) CyberBiometricsBiometrics & AIAI VideoAnalyticsVideoAnalytics:: Pre/Post Attack
20
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
c) CyberBiometricsBiometrics & AIAI VideoAnalyticsVideoAnalytics:: Pre/Post Attack
d) Real-Time Analysis of Social MediaSocial Media, Mail & Comms
e)e) SelfSelf--AdaptiveAdaptive User, IT Asset & Net Traffic ModellingModelling
..........Mitigation of AttacksMitigation of Attacks requiresrequires Intelligent CyberIntelligent Cyber
Computing Solutions runningComputing Solutions running @ Light Speed!@ Light Speed!
21
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Diary Link:Diary Link: www.valentina.net/PWP/www.valentina.net/PWP/
Royal Engineers:Royal Engineers: Radio SurveillanceRadio Surveillance forfor TerroristsTerrorists –– 19171917
-- Mozambique & TanzaniaMozambique & Tanzania –– Grandfather: Percy Probert!Grandfather: Percy Probert!
22
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Diary Link:Diary Link: www.valentina.net/PWP/www.valentina.net/PWP/
1 - 2121stst Background PerspectiveBackground Perspective
“Cyber Intelligence”“Cyber Intelligence”
22 –– IntegratingIntegrating Cyber & CCTVCyber & CCTV ToolsTools
“Cyber Convergence”“Cyber Convergence”
3 –Case Studies: Recent EventsCase Studies: Recent Events
“Urban Terrorism”“Urban Terrorism”
IntelligentIntelligent CyberCyber Surveillance!...Surveillance!...
22 –– Integrating Cyber & CCTV Tools!Integrating Cyber & CCTV Tools!
CyberCyber
23
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“Urban Terrorism”“Urban Terrorism”
4 –Smart Cities & Event SurveillanceSmart Cities & Event Surveillance
“Crowded Places”“Crowded Places”
5 –Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools
“AI Video Analytics”“AI Video Analytics”
6 – iometriciometric & Behaviour Profiles& Behaviour Profiles
“Cyber Biometrics”“Cyber Biometrics”
7–TrTransportansport, Retail, Culture, Defence, Retail, Culture, Defence
“Sector Surveillance”“Sector Surveillance”
88 –– Cyber Surveillance Visions!...Cyber Surveillance Visions!...
““CyberCyber 2025 Futures”2025 Futures”
9 –YOUR Security & Surveillance!
“YOUR Business Plan”“YOUR Business Plan”
22 –– Integrating Cyber & CCTV Tools!Integrating Cyber & CCTV Tools!
““CyberCyber ConvergnceConvergnce””
CyberCyber--PhysicalPhysical Threat ScenariosThreat Scenarios
•• Physical “Penetration”:Physical “Penetration”: Operations Perimeter penetrated to
allow theft or corruption of Cyber Information / IT DataBases
and Confidential Plans
•• Cyber “Hack”:Cyber “Hack”: Malicious changes to Cyber Access Controls &
IT Databases to allow Criminals/Terrorists to enter Target
Facilities (such as Military Bases, Banking HQ, Telco/Mobile
Network Operations)
24
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Network Operations)
•• Convergent ThreatsConvergent Threats – Criminals/Terrorists will attack at the
weakest links which in the 21stC will be BOTH Cyber Network
Operations and Physical Security Ops
.......Cyber AttacksCyber Attacks are now fully industrialised with Malicious
Code “Kits” & Botnets for sale “by the hour”“by the hour” on the DARKNETDARKNET
Regional CCTVRegional CCTV Control & SurveillanceControl & Surveillance
25
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
CCTV Control Room Operators with Multiple Displays needCCTV Control Room Operators with Multiple Displays need Cyber Analysis ToolsCyber Analysis Tools
IncludingIncluding High Speed Video Analytics, Facial Recognition and Data Mining ToolsHigh Speed Video Analytics, Facial Recognition and Data Mining Tools
VIDSYS:VIDSYS: Converged CyberConverged Cyber--Physical SecurityPhysical Security
26
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
www.vidsys.comwww.vidsys.com :: Integrated Traffic ControlIntegrated Traffic Control CentreCentre
1-- 2121stst Background PerspectiveBackground Perspective
“Cyber Intelligence”“Cyber Intelligence”
22 –– Integrating Cyber & CCTV ToolsIntegrating Cyber & CCTV Tools
“Cyber“Cyber Convergence”Convergence”
33 –– CaseCase Studies:Studies: Recent EventsRecent Events
“Urban Terrorism”“Urban Terrorism”
44 ––Smart Cities & Event SurveillanceSmart Cities & Event Surveillance 55 ––Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools 6 –Biometric & Behaviour ProfilesBiometric & Behaviour Profiles
IntelligentIntelligent CyberCyber Surveillance!...Surveillance!...
33-- Case Studies:Case Studies: Recent Terror EventsRecent Terror Events
“Urban Terrorism“Urban Terrorism””
27
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
44 ––Smart Cities & Event SurveillanceSmart Cities & Event Surveillance
“Crowded Places”“Crowded Places”
55 ––Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools
“AI Video Analytics”“AI Video Analytics”
6 –Biometric & Behaviour ProfilesBiometric & Behaviour Profiles
“Cyber Biometrics”“Cyber Biometrics”
7–TrTransportansport, Retail, Culture, Defence, Retail, Culture, Defence
“Sector Surveillance”“Sector Surveillance”
88–– Cyber Surveillance Visions!...Cyber Surveillance Visions!...
““CyberCyber 20252025 FuturesFutures””
9 –YOUR Security & Surveillance!
“YOUR Business Plan”“YOUR Business Plan”
“Urban Terrorism“Urban Terrorism””
2121ststC Warfare:C Warfare: “Urban Terrorism”“Urban Terrorism”
DefenceDefence againstagainst “Urban Terror”“Urban Terror” needsneeds
INTEGRATIONINTEGRATION ofof PHYSICALPHYSICAL && CYBERCYBER
Security Solutions =Security Solutions = SMART SECURITYSMART SECURITY
“Bad Guys”“Bad Guys” useuse Cyber ToolsCyber Tools
& Resources to extensively& Resources to extensively
ResearchResearch && LaunchLaunch MajorMajor
Physical Terror Attacks!Physical Terror Attacks!
28
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Physical Terror Attacks!Physical Terror Attacks!
(1)(1) DarkWebDarkWeb forfor Weapons!Weapons!
(2)(2) ResearchResearch Urban TargetsUrban Targets
(3)(3) Social MediaSocial Media forfor CommsComms
(4)(4) RecruitmentRecruitment & Training& Training
(5)(5) RansomwareRansomware for CAfor CA$$H..H..
Nice TruckNice Truck Terror AttackTerror Attack: 14: 14thth July 2016July 2016
29
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Nice TruckNice Truck Terror AttackTerror Attack: 14: 14thth July 2016July 2016
30
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Cyber Criminal TeamCyber Criminal Team SkillsetSkillset!...!...
• Skills required by the “Bad Guys”“Bad Guys” to launch and
manage major Cyber Crime Campaigns:
•• ICT:ICT: Cyber Technical Specialist (Hacking Tools)
•• Finance:Finance: Money Laundering & Campaign Budget
•• HRHR--Human Resources:Human Resources: Headhunting Cyber Talent!
•• Intelligence:Intelligence: Recruit “Insiders” in Business/Govt
31
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• Intelligence:Intelligence: Recruit “Insiders” in Business/Govt
•• Project Management:Project Management: Co-ordinate Campaign!
•• Security:Security: Detect “BackDoors” both in the Physical
and Cyber Defences of the Target Business/Govt
...In summary, the “Bad Guys”“Bad Guys” will often organise
themselves as an Criminal Cell or Illegal BusinessCriminal Cell or Illegal Business!
Recent Terror Events:Recent Terror Events: Case StudiesCase Studies
•• MoscowMoscow – Nord-Ost Theatre – October 2002
•• LondonLondon – Metro & Bus Attack – July 2005
•• ParisParis – Charlie Hebdo Attack – Jan 2015
•• TunisiaTunisia – Marhaba Hotel, Sousse – June 2015
•• ParisParis – Bataclan Theatre – Nov 2015
32
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• ParisParis – Bataclan Theatre – Nov 2015
•• BrusselsBrussels - Airport Attack – March 2016
•• LondonLondon – Westminster – March 2017/Aug 2018
•• ManchesterManchester – Arena - June 2017
........ALLALL Cultural, Tourist & Transport Facilities areCultural, Tourist & Transport Facilities are
vulnerable to attack invulnerable to attack in EVERYEVERY City & Country!City & Country!
Paris Terror Attack:Paris Terror Attack: Charlie HebdoCharlie Hebdo--Nov2011Nov2011
33
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Brussels Airport:Brussels Airport: Terror AttackTerror Attack––March 2016March 2016
34
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Terror Events:Terror Events: 11stst Oct 2018Oct 2018 -- WikiWiki
35
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Terror Incidents:Terror Incidents: 11stst to 14to 14stst Oct 2018 = 72Oct 2018 = 72
Terror Events:Terror Events: EarlyEarly Oct 2018Oct 2018 -- WikiWiki
36
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Terror Incidents:Terror Incidents: 11stst to 14to 14thth Oct 2018 = 72Oct 2018 = 72
1717thth Nov 2015Nov 2015: “Islamic State is Plotting: “Islamic State is Plotting
Deadly CyberDeadly Cyber--Attacks”:Attacks”: George OsborneGeorge Osborne
Sept 2018Sept 2018 -- £250m£250m CyberCyber--Force UnitForce Unit
To CombatTo Combat TerrorTerror & Gang Attacks& Gang Attacks
37
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
£1.9bn Cybercrime Budget£1.9bn Cybercrime Budget
UK National Cyber CentreUK National Cyber Centre
National Cyber Crime UnitNational Cyber Crime Unit
CyberEspionageCyberEspionage:: Middle East and AfricaMiddle East and Africa (2)(2)
38
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
CyberEspionageCyberEspionage Group:Group: Volatile CedarsVolatile Cedars
• “Volatile Cedars” :
Cyber Espionage Group
operating from Lebanon
since 2012 with in-depth
research and full report
by Checkpoint Software
39
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
by Checkpoint Software
Technologies Ltd (2015)
AnonymousAnonymous--Hacktivists declareHacktivists declare “Total War”“Total War”
onon ISISISIS afterafter Paris AttacksParis Attacks –– 1616thth Nov 2015Nov 2015
40
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
1-- 2121stst Background PerspectiveBackground Perspective
“Cyber Intelligence”“Cyber Intelligence”
22 –– Integrating Cyber & CCTV ToolsIntegrating Cyber & CCTV Tools
“Cyber Convergence”“Cyber Convergence”
3 – Case Studies: Recent EventsCase Studies: Recent Events
“Urban Terrorism”“Urban Terrorism”
44 ––SmartSmart Cities & Event SurveillanceCities & Event Surveillance 5 –Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools 6 –Biometric & Behaviour ProfilesBiometric & Behaviour Profiles
IntelligentIntelligent CyberCyber Surveillance!...Surveillance!...
44 –– Smart City and Event SurveillanceSmart City and Event Surveillance
“Crowded Places”“Crowded Places”
41
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
44 ––SmartSmart Cities & Event SurveillanceCities & Event Surveillance
“Crowded“Crowded PlacesPlaces””
5 –Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools
“AI Video Analytics”“AI Video Analytics”
6 –Biometric & Behaviour ProfilesBiometric & Behaviour Profiles
“Cyber Biometrics”“Cyber Biometrics”
7–TrTransportansport, Retail, Culture, Defence, Retail, Culture, Defence
“Sector Surveillance”“Sector Surveillance”
88–– Cyber Surveillance Visions!...Cyber Surveillance Visions!...
““CyberCyber 2025 Futures”2025 Futures”
9 –YOUR Security & Surveillance!
“YOUR Business Plan”“YOUR Business Plan”
Ship: HMT Ascanius – Devonport to Durban - 1917
“Crowded Places”“Crowded Places”
“Real“Real--Time”Time” City Video SurveillanceCity Video Surveillance
42
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Analysing and Tracking Targets requiresAnalysing and Tracking Targets requires Intelligent Video AnalyticsIntelligent Video Analytics
Metro Surveillance:Metro Surveillance: Charing Cross, LondonCharing Cross, London
43
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“Crowded Places”:Crowded Places”: ExamplesExamples
Theatres & Concert HallsTheatres & Concert Halls
Transportation HubsTransportation Hubs
Sports Events & StadiumsSports Events & Stadiums
Schools & College CampusSchools & College Campus
UK NationalUK National CounterCounter--Terrorism SecurityTerrorism Security OfficeOffice –– NaCTSONaCTSO
44
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Schools & College CampusSchools & College Campus
Retail Shopping MallsRetail Shopping Malls
Hospitals & HealthcareHospitals & Healthcare
Places of WorshipPlaces of Worship
Resorts & Theme ParksResorts & Theme Parks
“Crowded Places”:Crowded Places”: ExamplesExamples
Theatres & Concert HallsTheatres & Concert Halls
Transportation HubsTransportation Hubs
Sports Events & StadiumsSports Events & Stadiums
Schools & College CampusSchools & College Campus
UK NationalUK National CounterCounter--Terrorism SecurityTerrorism Security OfficeOffice –– NaCTSONaCTSO
45
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Schools & College CampusSchools & College Campus
Retail Shopping MallsRetail Shopping Malls
Hospitals & HealthcareHospitals & Healthcare
Places of WorshipPlaces of Worship
Resorts & Theme ParksResorts & Theme Parks
@@ www.gov.uk/government/publicationswww.gov.uk/government/publications/crowded/crowded--placesplaces--guidanceguidance
Smart Analysis ToolsSmart Analysis Tools:: 3D Simulation Modelling3D Simulation Modelling
forfor ”Security Crisis””Security Crisis” & “Disaster Management”& “Disaster Management”
46
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“Crowded Places”:“Crowded Places”: Security DefencesSecurity Defences
•• “Intelligent” Perimeter Fencing (Fibre/Sensors)“Intelligent” Perimeter Fencing (Fibre/Sensors)
•• Secure Access Doors & GatesSecure Access Doors & Gates
•• CCTV Surveillance & Video AnalyticsCCTV Surveillance & Video Analytics
•• Scanning Devices for Malicious AssetsScanning Devices for Malicious Assets -- CBRNCBRN
•• Biometric Technologies & Face IDBiometric Technologies & Face ID
47
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• Biometric Technologies & Face IDBiometric Technologies & Face ID
•• RealReal--Time Command & Control CentreTime Command & Control Centre
•• Converged Dashboard: Physical & Cyber FeedsConverged Dashboard: Physical & Cyber Feeds
....Effective....Effective $$ecurityecurity forfor “Crowded Places”“Crowded Places” requiresrequires
$$$$$$ Investment inInvestment in $$ecurityecurity $kills & $$kills & $olutionsolutions!....!....
1-- 2121stst Background PerspectiveBackground Perspective
“Cyber Intelligence”“Cyber Intelligence”
22 –– Integrating Cyber & CCTV ToolsIntegrating Cyber & CCTV Tools
“Cyber Convergence”“Cyber Convergence”
33 –– Case Studies: Recent EventsCase Studies: Recent Events
“Urban Terrorism”“Urban Terrorism”
IntelligentIntelligent CyberCyber Surveillance!...Surveillance!...
55 –– Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools
48
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“Cyber Intelligence”“Cyber Intelligence” “Cyber Convergence”“Cyber Convergence” “Urban Terrorism”“Urban Terrorism”
4 –Smart Cities & Event SurveillanceSmart Cities & Event Surveillance
“Crowded Places”“Crowded Places”
55 ––Advanced CyberAdvanced Cyber Analysis ToolsAnalysis Tools
“AI Video Analytics”“AI Video Analytics”
6 –Biometric & Behaviour ProfilesBiometric & Behaviour Profiles
“Cyber Biometrics”“Cyber Biometrics”
7–TrTransportansport, Retail, Culture, Defence, Retail, Culture, Defence
“Sector Surveillance”“Sector Surveillance”
88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends
“Cyber @ Sea”“Cyber @ Sea”
9 –YOUR Security & Surveillance!
“YOUR Business Plan”“YOUR Business Plan”
55 –– Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools
“AI Video Analytics”“AI Video Analytics”
“Cyber”“Cyber” Tracking & ProfilingTracking & Profiling:: “Bad Guys”“Bad Guys”
• Mitigating Global Crime & Terrorism requires us to
Profile & TrackProfile & Track the “Bad Guys” in “Real-Time” with
Intelligent Networked Computing Systems:
–– 3D AI Video Analytics3D AI Video Analytics from CCTV Facial Profiles
– Track On-Line Social MediaSocial Media, eMail & “Cell” Comms
– Scan ““DarkNetDarkNet”” for “Business Deals”, Plans & Messages
– Check, Track & Locate MMobilobilee Communications
49
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
– Check, Track & Locate MMobilobilee Communications
– Track “Bad Guys” in National Transport HubsTransport Hubs
–– DeployDeploy RFID DevicesRFID Devices to Track Highto Track High--Value & Strategic “Assets”Value & Strategic “Assets”
– Use RealReal--Time ANPRTime ANPR for Target Vehicle Tracking
...Cyber Computing Smart AppsCyber Computing Smart Apps can now Track Massive
Databases of Target “Bad Guy” Profiles @ Light Speed!...@ Light Speed!...
“Cyber”“Cyber” Tracking & ProfilingTracking & Profiling:: “Bad Guys”“Bad Guys”
• Mitigating Global Crime & Terrorism requires us to
Profile & TrackProfile & Track the “Bad Guys” in “Real-Time” with
Intelligent Networked Computing Systems:
–– 3D AI Video Analytics3D AI Video Analytics from CCTV Facial Profiles
– Track On-Line Social MediaSocial Media, eMail & “Cell” Comms
– Scan ““DarkNetDarkNet”” for “Business Deals”, Plans & Messages
– Check, Track & Locate MobileMobile Communications
50
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
– Check, Track & Locate MobileMobile Communications
– Track “Bad Guys” in National Transport HubsTransport Hubs
–– DeployDeploy RFID DevicesRFID Devices to Track Highto Track High--Value & Strategic “Assets”Value & Strategic “Assets”
– Use RealReal--Time ANPRTime ANPR for Target Vehicle Tracking
...Cyber Computing Smart AppsCyber Computing Smart Apps can now Track Massive
Databases of Target “Bad Guy” Profiles @ Light Speed!...@ Light Speed!...
:: AI CyberAI Cyber--Bio SurveillanceBio Surveillance
51
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
::AI Biometric Video AnalyticsAI Biometric Video Analytics --“Chinese Unicorn”“Chinese Unicorn”
www.sensetime.comwww.sensetime.com
:: AI CyberAI Cyber--Bio SurveillanceBio Surveillance
52
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
::AI Biometric Video AnalyticsAI Biometric Video Analytics --“Chinese Unicorn”“Chinese Unicorn”
www.sensetime.comwww.sensetime.com
:: AI CyberAI Cyber--Bio SurveillanceBio Surveillance
53
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
::AI Biometric Video AnalyticsAI Biometric Video Analytics --“Chinese Unicorn”“Chinese Unicorn”
www.sensetime.comwww.sensetime.com
OnOn--Line 3D HiLine 3D Hi--ResolutionResolution Aerial SurveillanceAerial Surveillance
54
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“Google Maps”“Google Maps” -- 3D Aerial & Satellite Images3D Aerial & Satellite Images -- Nice Airport, FranceNice Airport, France
OnOn--Line 3D HiLine 3D Hi--ResolutionResolution Aerial SurveillanceAerial Surveillance
55
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“Google Maps”“Google Maps” -- 3D Aerial & Satellite Images3D Aerial & Satellite Images -- Nice Airport, FranceNice Airport, France
OnOn--Line 3D HiLine 3D Hi--ResolutionResolution Aerial SurveillanceAerial Surveillance
56
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“Google Maps”“Google Maps” -- 3D Aerial & Satellite Images3D Aerial & Satellite Images -- Nice Airport, FranceNice Airport, France
OnOn--Line 3D HiLine 3D Hi--ResolutionResolution Aerial SurveillanceAerial Surveillance
57
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“Google Maps”“Google Maps” -- 3D Aerial & Satellite Images3D Aerial & Satellite Images -- Nice Airport, FranceNice Airport, FranceWest End Hotel, NiceWest End Hotel, Nice
58
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“Real“Real--Time”Time” Meteorological AnalysisMeteorological Analysis
59
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Satellite Mapping ofSatellite Mapping of “Extreme Weather”“Extreme Weather”
Counter Terrorism & Cyber SecurityCounter Terrorism & Cyber Security:: Newton LeeNewton Lee
Total Information AwarenessTotal Information Awareness “Springer“Springer –– 2015 Edition”2015 Edition”
60
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
1- - 2121stst Background PerspectiveBackground Perspective
“Cyber Intelligence”“Cyber Intelligence”
22 –– Integrating Cyber & CCTV ToolsIntegrating Cyber & CCTV Tools
“Cyber Convergence”“Cyber Convergence”
3 – Case Studies: Recent EventsCase Studies: Recent Events
“Urban Terrorism”“Urban Terrorism”
IntelligentIntelligent CyberCyber Surveillance!...Surveillance!...
66 –– Biometric & Behaviour ProfilesBiometric & Behaviour Profiles
“Cyber Biometrics”“Cyber Biometrics”
61
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“Urban Terrorism”“Urban Terrorism”
4 –– Smart Cities & Event SurveillanceSmart Cities & Event Surveillance
“Crowded Places”“Crowded Places”
5 –Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools
“AI Video Analytics”“AI Video Analytics”
66 ––Biometric & Behaviour ProfilesBiometric & Behaviour Profiles
““CyberCyber Biometrics”Biometrics”
7–TrTransportansport, Retail, Culture, Defence, Retail, Culture, Defence
“Sector Applications”“Sector Applications”
88–– Cyber Surveillance Visions!...Cyber Surveillance Visions!...
“Cyber 2025 Futures”“Cyber 2025 Futures”
9 –YOUR Security & Surveillance!
“YOUR Business Plan”“YOUR Business Plan”
“Cyber Biometrics”“Cyber Biometrics”
BiometricsBiometrics && RFIDRFID Security ApplicationsSecurity Applications
•• BiometricsBiometrics techniques may include:
– Finger and Palm Prints
– Retinal and Iris Scans
– 3D Vein ID
– Voice Scans & Recognition
– DNA Database – Criminal Records
– 3D Facial Recognition
62
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• RFIDRFID == Radio Frequency ID with applications that include:
– Personal ID Cards for Building, Secure Facility Access
– Tags for Retail Articles as a Deterrence to Shoplifting
– Powered RFID Tags for Vehicles to open Doors, Barriers & Switch Lights
– Plans to use RFID Tags for Perishable Products such as Fruit & Vegetables
– Asset Tags to manage the movement of High-Value & Strategic Assets
– Potential for Embedded Intelligent RFID Devices into Humans
IntegratedIntegrated CyberCyber Biometrics:Biometrics: PrePre--AttackAttack
•• Intelligent Biometrics ToolsIntelligent Biometrics Tools can significantly reduce
YOUR Risks of Cyber Threats & Attacks...
–– Device & Access AuthenticationDevice & Access Authentication by Fingerprints,
Retinal/Iris Scan or Palm Vein Scan
–– Facility AccessFacility Access with “Live” 3D Facial Recognition
–– “Behavioural Biometrics”“Behavioural Biometrics” for Secure User Authentication
City/CampusCity/Campus Regional Tracking with Intelligent 4K Networked
63
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“Behavioural Biometrics”“Behavioural Biometrics” for Secure User Authentication
–– City/CampusCity/Campus Regional Tracking with Intelligent 4K Networked
CCTV & Real-Time Self-Learning Video Analytics
–– “Live”“Live” CBRNCBRN ScanningScanning for Hazardous materials –
(CChemical, BBiological, RRadiological, NNuclear)
...It is crucial that Cyber Biometrics ToolsCyber Biometrics Tools are Integrated
with the CSO-led Business Security OperationsBusiness Security Operations
TypicalTypical CyberCyber--BiometricBiometric SolutionsSolutions
64
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
CyberCyber--Biometrics:Biometrics: Fingerprint SolutionsFingerprint Solutions
65
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Linear BiometricLinear Biometric Finger Print ScannerFinger Print Scanner
66
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
67
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
CharacteristicCharacteristic FingerprintFingerprint PatternsPatterns
CyberCyber--Biometrics:Biometrics: “Live” Vein Analytics“Live” Vein Analytics
68
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
CyberCyber--Biometrics:Biometrics: Retinal & Iris ScansRetinal & Iris Scans
69
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
BiometricBiometric IDID Authentication:Authentication: “IoT”“IoT”
• Biometric Security provides Crucial Cyber-
Defence for the “Internet of Things”“Internet of Things” –– “IoT”:“IoT”:
– Bio-ID & AuthenticationAuthentication for ALL Secure “IoT” Devices
– Real-Time Bio ProfilingProfiling & Behavioural Modelling
– Rapid Intrusion AlertsIntrusion Alerts for “IoT” Networks & Assets
– Bio ID Access for Secure Cloud Data & AppsCloud Data & Apps
70
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
– Bio ID Access for Secure Cloud Data & AppsCloud Data & Apps
– Mobile “IoT” Asset TrackingAsset Tracking with Bio ID Security
...ALL Secure “IoT” Devices should be Biometric
Protected to Mitigate ID Theft and Fraud!...Mitigate ID Theft and Fraud!...
Forensics:Forensics: Fast DNA Finger PrintingFast DNA Finger Printing
71
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Fast DNAFast DNA Sequencing:Sequencing:GrapheneGraphene NanoporeNanopore
72
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Biometrics & ForensicsBiometrics & Forensics: Glasgow University: Glasgow University
73
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Private Detective:Private Detective: “Sherlock Holmes”!“Sherlock Holmes”!
74
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Author:Author: Sir Arthur Conan DoyleSir Arthur Conan Doyle:: 18591859 -- 19301930
“Forensics Pioneer”“Forensics Pioneer”
a)a) Detective WorkDetective Work
b)b) FingerprintsFingerprints
c)c) Ciphers & CodesCiphers & Codes
d)d) FootprintsFootprints
e)e) HandwritingHandwriting
(5)(5) CyberCyber Digital Forensics:Digital Forensics: PostPost--AttackAttack
• Evidence from Cyber Digital Forensics can help to
identify the Criminals, Terrorists and Cyber Attackers:
•• Physical Forensics:Physical Forensics:
– Blood & Tissue Samples
– DNA & Genetic Analysis
– Chemical Agents, GSR, Fibres
•• Cyber Forensics:Cyber Forensics:
75
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• Cyber Forensics:Cyber Forensics:
– Cyber Attack IP Address/DNS/Proxies
– Malware/Trojan/Virus Analysis
– Botnet/DDOS , Targets & Payload
– RansomWare/Encryption & Attack “Signatures”
...Evidence from BOTH Cyber & Physical ForensicsCyber & Physical Forensics
will be relevant to 21stC Terror Threats & Attacks!...
1-- 2121stst Background PerspectiveBackground Perspective
“Cyber Intelligence”“Cyber Intelligence”
22 –– Integrating Cyber & CCTV ToolsIntegrating Cyber & CCTV Tools
“Cyber Convergence”“Cyber Convergence”
3 – Case Studies: Recent EventsCase Studies: Recent Events
“Urban Terrorism”“Urban Terrorism”
IntelligentIntelligent CyberCyber Surveillance!...Surveillance!...
77 –– Transport, Retail, Culture, Defence...Transport, Retail, Culture, Defence...
“Sector Surveillance”“Sector Surveillance”
76
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
44 –– Smart Cities & Event SurveillanceSmart Cities & Event Surveillance
“Crowded Places”“Crowded Places”
5 -Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools
“AI Video Analytics”“AI Video Analytics”
6 – Biometric & Behaviour ProfilesBiometric & Behaviour Profiles
“Cyber Biometrics”“Cyber Biometrics”
77––TrTransportansport, Retail, Culture, Defence, Retail, Culture, Defence
“Sector Surveillance”“Sector Surveillance”
88–– Cyber Surveillance Visions!...Cyber Surveillance Visions!...
“Cyber 2025 Futures”“Cyber 2025 Futures”
9 –YOUR Security & Surveillance!
“YOUR Business Plan”“YOUR Business Plan”
“Sector Surveillance”“Sector Surveillance”
CyberCyber--Bio:Bio: IntegratedIntegrated Security ScenariosSecurity Scenarios
•• Banks/Finance:Banks/Finance: eFraud, DDOS, Insider Threats
•• Government/Parliament:Government/Parliament: “Fake IDs” & File Theft
•• Defence/Military:Defence/Military: Cyber-Espionage & Attacks
•• Travel/Tourism:Travel/Tourism: Beach Resorts & Travel Hubs
•• Culture/Sports:Culture/Sports: Major Events & Competitions
•• Energy/Utilities:Energy/Utilities: Nuclear Theft, Explosions
77
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• Energy/Utilities:Energy/Utilities: Nuclear Theft, Explosions
•• Retail/Malls/Campus:Retail/Malls/Campus: Armed Attacks & Siege
•• Healthcare/Healthcare/PharmaPharma:: “Fake Drugs & Records”
...ALL Generic CyberCyber--Bio ThreatsBio Threats apply to ALL
Our Business Sectors & Critical Infrastructure!
Defence SectorDefence Sector -- C4ISR:C4ISR: CCommand,ommand, CControl,ontrol, CCommunications,ommunications,
CComputer,omputer, IIntelligence,ntelligence, SSurveillance, andurveillance, and RReconnaissance…….econnaissance…….
78
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
C4ISR:C4ISR: Integrated RealIntegrated Real--Time Defence ArchitectureTime Defence Architecture
Defence Sector:Defence Sector: DODDOD CyberCyber GuidelinesGuidelines
79
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Aug 2018Aug 2018
1-- 2121stst Background PerspectiveBackground Perspective
“Cyber Intelligence”“Cyber Intelligence”
22 –– Integrating Cyber & CCTV ToolsIntegrating Cyber & CCTV Tools
“Cyber Convergence”“Cyber Convergence”
3 – Case Studies: Recent EventsCase Studies: Recent Events
“Urban Terrorism”“Urban Terrorism”
IntelligentIntelligent CyberCyber Surveillance!...Surveillance!...
88 –– Cyber Surveillance Visions!...Cyber Surveillance Visions!...
“Cyber“Cyber 20252025 Futures”Futures”
80
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
4 –Smart Cities & Event SurveillanceSmart Cities & Event Surveillance
“Crowded Places”“Crowded Places”
5 –Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools
“AI Video Analytics”“AI Video Analytics”
6 – Biometric & Behaviour ProfilesBiometric & Behaviour Profiles
“Cyber Biometrics”“Cyber Biometrics”
7–TrTransportansport, Retail, Culture, Defence, Retail, Culture, Defence
“Sector Surveillance”“Sector Surveillance”
88–– Cyber Surveillance Visions!...Cyber Surveillance Visions!...
“Cyber“Cyber 20252025 Futures”Futures”
9 –YOUR Security & Surveillance!
“YOUR Business Plan”“YOUR Business Plan”
“Cyber“Cyber 20252025 Futures”Futures”
“Smart Glass”:“Smart Glass”: Augmented RealityAugmented Reality
-- Meta VisionMeta Vision ARAR HeadSetHeadSet:: 20172017 --
81
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Augmented Reality:Augmented Reality: “Skiing Challenge”“Skiing Challenge”
82
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Augmented RealityAugmented Reality –– ““Location Paris”Location Paris”
83
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
MultiMulti--Year Evolution of “Year Evolution of “WikiWiki--Web”Web”
Complex Adaptive SystemComplex Adaptive System:“Wiki.tudelft.nl”:“Wiki.tudelft.nl”
84
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Delft University of TechnologyDelft University of Technology -- NetherlandsNetherlands
RealReal--Time Brain Scan:Time Brain Scan: Neural NetworksNeural Networks
85
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization
JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert
86
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology
CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization
JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert
87
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology
CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization
JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert
88
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology
Web:Web: SiteVisor.usSiteVisor.us -- “Real“Real--Time Cyber Attack Alert System”Time Cyber Attack Alert System”
-- UN/ITUUN/ITU CyberSecurityCyberSecurity AgendaAgenda --
Quest forQuest for CyberConfidenceCyberConfidence (Eng/(Eng/RusRus))
89
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
LinkLink: www.itu.int/en/publications/
1-- 2121stst Background PerspectiveBackground Perspective
“Cyber Intelligence”“Cyber Intelligence”
22 –– Integrating Cyber & CCTV ToolsIntegrating Cyber & CCTV Tools
“Cyber Convergence”“Cyber Convergence”
3 – Case Studies: Recent EventsCase Studies: Recent Events
“Urban Terrorism”“Urban Terrorism”
IntelligentIntelligent CyberCyber Surveillance!...Surveillance!...
99 –– YOUR Business Security & SurveillanceYOUR Business Security & Surveillance
“YOUR Business Plan”“YOUR Business Plan”
90
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“Urban Terrorism”“Urban Terrorism”
4 – Smart Cities & Event SurveillanceSmart Cities & Event Surveillance
“Crowded Places”“Crowded Places”
5 -Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools
”AI Video Analytics””AI Video Analytics”
6 – Biometric & Behaviour ProfilesBiometric & Behaviour Profiles
“Cyber Biometrics”“Cyber Biometrics”
7–TrTransportansport, Retail, Culture, Defence, Retail, Culture, Defence
“Sector Surveillance”“Sector Surveillance”
88–– Cyber Surveillance Visions!...Cyber Surveillance Visions!...
“Cyber 2025 Futures”“Cyber 2025 Futures”
99 ––YOUR Security & Surveillance!YOUR Security & Surveillance!
“YOUR“YOUR Business PlanBusiness Plan””
“YOUR Business Plan”“YOUR Business Plan”
(9)(9) YOUR Top 3YOUR Top 3 Actions & RoadMapActions & RoadMap
•• Action 1:Action 1: CSO-Led Board-Level Review & Audit of
current Security Tools & Operations – 60 days
•• Action 2:Action 2: Investigate Major CyberSecurity Risks &
Potential “Terror Attack” Scenarios - 30 days
•• Action 3:Action 3: Develop Multi-Year Plan, Budget &
91
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• Action 3:Action 3: Develop Multi-Year Plan, Budget &
Roadmap to Mitigate Identified Risks to include:
a) Business-Wide CyberCyber--PhysicalPhysical Security Operations
b)b) “IoT” Cyber Security“IoT” Cyber Security for both Legacy & New Assets
c) Professional Cyber Security TrainingCyber Security Training & Development
d) Security Staff Scenario Exercises for “Terror Alerts”“Terror Alerts”
Integrated Cyber & Physical Security:Integrated Cyber & Physical Security: “The Shopping List”“The Shopping List”
...Smart Security for Business & Government is a Multi...Smart Security for Business & Government is a Multi--Year Programme!Year Programme!
1)1) Cybersecurity TeamCybersecurity Team:: Establishment of a CERT/CSIRT & Professionally Qualified
Cybersecurity Team within your Business or Government Organisation
2)2) CNI:CNI: Long Term Critical Infrastructure Protection (CNI) – Protect Critical Info Assets!
3)3) System UpgradesSystem Upgrades:: Technical Infrastructure Upgrades including Hardware, Software,
Databases, Secure Network Links, Biometrics & RFID
4) BackBack--UpUp:: Disaster Recovery, Business Continuity and Back-Up Systems
5)5) PhysicalPhysical :: Physical Security Applications – CCTV, Alarms, Control Centre
6)6) Awareness CampaignAwareness Campaign:: Business-Wide Campaign for Cybersecurity Awareness
92
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
6)6) Awareness CampaignAwareness Campaign:: Business-Wide Campaign for Cybersecurity Awareness
7)7) TrainingTraining:: Cybersecurity Skills, Certification & Professional Training Programme
8)8) EncryptionEncryption:: Implement Data Encryption for Business Critical Info
9)9) Rules & Policies:Rules & Policies: Develop and Communicate Cyber & Physical Security Policies for ALL
Staff & Contractors to cover topics such as Wi-Fi and “Bring your Own Device (BYOD)”
..….It is also recommended to develop an economic..….It is also recommended to develop an economic “Cost“Cost--Benefit”Benefit” analysis and detailedanalysis and detailed
Business Case in order to justifyBusiness Case in order to justify Cybersecurity InvestmentCybersecurity Investment for your Board of Directors!for your Board of Directors!
“Cyber Defence”“Cyber Defence” againstagainst ““Urban TerrorismUrban Terrorism””
Prepare for Terror Threats & Attacks
through YOUR Intelligent RealIntelligent Real--Time CyberTime Cyber
& Physical Surveillance Operations& Physical Surveillance Operations!!
Don’t be taken by surprise by БегемотБегемот
- The Satanic Terrorist CatThe Satanic Terrorist Cat - from
Bulgakov’s : “The Master & Margarita”
93
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Bulgakov’s Devil Cat – БегемотБегемот - Master & Margarita - 1972
Pen & Ink Drawing by Dr Alexander RimskiDr Alexander Rimski--KorsakovKorsakov
Bulgakov’s : “The Master & Margarita”
Graphic Print (1972) courtesy of :
Dr Alexander RimskiDr Alexander Rimski--KorsakovKorsakov
Great Grandson of the Composer
The Surrealistic Paintings of Dr Alexander RimskyThe Surrealistic Paintings of Dr Alexander Rimsky--KorsakovKorsakov
94
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Web LinkWeb Link:: www.valentina.net/ARK3/ark2.htmlwww.valentina.net/ARK3/ark2.html
CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!!
95
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
DownloadDownload CyberCyber Slides:Slides: www.valentina.net/NICE2018/www.valentina.net/NICE2018/
CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!...
3838thth EastEast--West Security Conference:West Security Conference: Nice, UKNice, UK
96
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“NICE“NICE –– 1880”1880”
ThankThank--You!You!ThankThank--You!You!
CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!...
3838thth EastEast--West Security Conference:West Security Conference: Nice, UKNice, UK
97
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“NICE“NICE –– 1880”1880”
ThankThank--You!You!ThankThank--You!You!
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/www.Valentina.net/NICE2018NICE2018//
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/www.Valentina.net/NICE2018NICE2018//
Download Presentation Slides:Download Presentation Slides:
www.Valentina.netwww.Valentina.net/NICE2018//NICE2018/
Download Presentation Slides:Download Presentation Slides:
www.Valentina.netwww.Valentina.net/NICE2018//NICE2018/
98
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Thank you for your time!Thank you for your time!Thank you for your time!Thank you for your time!
AdditionalAdditional CybersecurityCybersecurity ResourcesResources
99
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
LinkLink:: www.valentina.net/vaza/CyberDocswww.valentina.net/vaza/CyberDocs
Professional ProfileProfessional Profile -- Dr David E. ProbertDr David E. Probert
Computer Integrated Telephony (CIT)Computer Integrated Telephony (CIT) – Established and led British Telecom’s £25M EIGER Project during the mid-1980s’ to integrate computers with
telephone switches (PABX’s). This resulted in the successful development and launch of CIT software applications for telesales & telemarketing
Blueprint for Business CommunitiesBlueprint for Business Communities – Visionary Programme for Digital Equipment Corporation during late-1980’s that included the creation of the
“knowledge lens” and “community networks”. The Blueprint provided the strategic framework for Digital’s Value-Added Networks Business
European Internet Business Group (EIBGEuropean Internet Business Group (EIBG)) – Established and led Digital Equipment Corporation’s European Internet Group for 5 years. Projects included
support for the national Internet infrastructure for countries across EMEA as well as major enterprise, government & educational Intranet deployments.
Dr David Probert was a sponsoring member of the European Board for Academic & Research Networking (EARN/TERENA) for 7 years (1991 1998)
Supersonic Car (Supersonic Car (ThrustSSCThrustSSC)) – Worked with Richard Noble OBE, and the Mach One Club to set up and manage the 1st Multi-Media and e-Commerce Web-
Site for the World’s 1st Supersonic Car – ThrustSSC – for the World Speed Record.
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
100
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
networking products with technology partners from both UK and Taiwan.
Networked Enterprise SecurityNetworked Enterprise Security - Appointed as the New Products Director (CTO) to the Management Team of the Blick Group plc with overall
responsibility for 55 professional engineers & a diverse portfolio of hi-tech security products.
Republic of GeorgiaRepublic of Georgia – Senior Security Adviser – Appointed by the European Union to investigate and then to make recommendations on all aspects of IT
security, physical security and BCP/DR relating to the Georgian Parliament, and then by UN/ITU to review Cybersecurity for the Government Ministries.
UN/ITUUN/ITU – Senior Adviser – Development of Cybersecurity Infrastructure, Standards, Policies, & Organisations in countries within both Europe & Americas
Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1stst Class Honours Maths DegreeClass Honours Maths Degree
(Bristol University) & PhD from Cambridge University in Self(Bristol University) & PhD from Cambridge University in Self--Organising Systems (Evolution of Stochastic Automata) ,Organising Systems (Evolution of Stochastic Automata) ,
and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007--2018 Editions2018 Editions.
3838thth East West Security Conference:East West Security Conference: Nice, FranceNice, France
IntelligentIntelligent CyberCyber Surveillance!...Surveillance!...
101
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Ages of Computing, Networking & Intelligence:Ages of Computing, Networking & Intelligence: 19601960 –– 2020+2020+
•• 1960 to 1980 (Computing Big Bang1960 to 1980 (Computing Big Bang –– PhysicalPhysical DataData ):): “Big is Beautiful”
– Era of Massive Mainframe Computing with Minimal Networking
•• 1980 to 2000 (Network Architecture1980 to 2000 (Network Architecture –– Fluid InformationFluid Information):): “Small is
Beautiful” – Evolution of Networking (Ethernet, Token-Ring, and TCP/IP:
‘75 – Vint Cerf & Robert Kahn ), PCs, Web1.0: ‘92-’94 & Mobile Phones
102
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• 2000 to 2020+ (Intelligent Systems2000 to 2020+ (Intelligent Systems –– Cellular KnowledgeCellular Knowledge):): “Smart
Solutions”- Web2.0, Social Media, Smart Phones & Intelligent Apps.
•• Summary:Summary: The Evolution of ICT mirrors the Evolution of the Physical
Universe, DNA/RNA Bio-Architecture, Intelligent Organisms & Life.
Ages of Computing, Networking & Intelligence:Ages of Computing, Networking & Intelligence: 19601960 -- 21stC21stC
103
** “Intelligent Cyber Surveillance” **
- AI Video Analytics & Biometrics -
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference

Weitere ähnliche Inhalte

Was ist angesagt?

CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
Dr David Probert
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Dr David Probert
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Dr David Probert
 
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
Dr David Probert
 

Was ist angesagt? (20)

CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for Cybersecurity
 
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
 
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
 
Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!
 
YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital Forensics
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future Trends
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
 
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... 21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of Things
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in Cyberspace
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and Business
 

Ähnlich wie Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!

Ähnlich wie Intelligent Cyber Surveillance: AI Video Analytics & Biometrics! (17)

Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPolitics
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
 
hybrid_threats.pdf
hybrid_threats.pdfhybrid_threats.pdf
hybrid_threats.pdf
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
 
The Perils that PCI brings to Security
The Perils that PCI brings to SecurityThe Perils that PCI brings to Security
The Perils that PCI brings to Security
 
Digital Age-Preparing Yourself
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourself
 
Cool Infographics: what venture capitalists tell us about Homeland Security
Cool Infographics: what venture capitalists tell us about Homeland SecurityCool Infographics: what venture capitalists tell us about Homeland Security
Cool Infographics: what venture capitalists tell us about Homeland Security
 
AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)
 
Latest Trends in Information Technology - 2020
Latest Trends  in Information Technology - 2020Latest Trends  in Information Technology - 2020
Latest Trends in Information Technology - 2020
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...
 

Mehr von Dr David Probert

Mehr von Dr David Probert (6)

From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the Environment
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the Enterprise
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic Business
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!

  • 1. •• IntelligentIntelligent CyberCyber SurveillanceSurveillance AI Video Analytics & Biometrics!AI Video Analytics & Biometrics! 1 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference AI Video Analytics & Biometrics!AI Video Analytics & Biometrics! Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!
  • 2. •• ИнтеллектуальныйИнтеллектуальный киберкибер--наблюдениенаблюдение 2 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference киберкибер--наблюдениенаблюдение AI Видеоаналитика и биометрияAI Видеоаналитика и биометрия!! Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana! www.Valentina.net/NICE2018/www.Valentina.net/NICE2018/
  • 3. ““CyberVisionsCyberVisions for Business & Governments!”for Business & Governments!” Theme (1)Theme (1) -- CyberSecurity for Critical Infrastructure:CyberSecurity for Critical Infrastructure: Business & Governments!...Business & Governments!... -- CyberSecurity for Critical National InfrastructureCyberSecurity for Critical National Infrastructure (CNI):(CNI): -- Case Studies of National Government Cyber ProgrammesCase Studies of National Government Cyber Programmes -- Operational Cyber Standards, Laws & RegulationsOperational Cyber Standards, Laws & Regulations “Cyber Strategies for Critical Business”“Cyber Strategies for Critical Business” 66thth Nov:Nov: 9:459:45 –– 10:3010:30 ThemeTheme (2)(2) –– Intelligent Cyber Surveillance:Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!...AI Video Analytics & Biometrics!... -- 2121ststCC Cyber Landscape for Business & Government SurveillanceCyber Landscape for Business & Government Surveillance -- Advanced Surveillance Tools using AI Video Analytics & BiometricsAdvanced Surveillance Tools using AI Video Analytics & Biometrics 3 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference -- Advanced Surveillance Tools using AI Video Analytics & BiometricsAdvanced Surveillance Tools using AI Video Analytics & Biometrics -- Case Studies of Sector Surveillance: Transport, Retail, Culture, Defence...Case Studies of Sector Surveillance: Transport, Retail, Culture, Defence... “Cyber Surveillance”“Cyber Surveillance” 66thth Nov: 12:15Nov: 12:15 –– 13:0013:00 Theme (3)Theme (3) –– CyberVisionCyberVision 2020 to 20302020 to 2030:: YOURYOUR 2121stst CC CyberSecurity Toolkit!...CyberSecurity Toolkit!... -- Understanding and Mapping the Worldwide Cyber ThreatsUnderstanding and Mapping the Worldwide Cyber Threats -- Exploring New Cyber Tools using AI & Machine LearningExploring New Cyber Tools using AI & Machine Learning -- Discussion of Cyber Scenarios forDiscussion of Cyber Scenarios for 20202020 –– 20252025 –– 20302030 & Beyond !...& Beyond !... “Cyber“Cyber ToolKitToolKit”” 66thth NovNov: 16:15: 16:15 –– 17:0017:00 DownloadDownload:: www.valentina.net/www.valentina.net/NICE2018NICE2018//
  • 4. 11 –– 2121ststCC Background PerspectivesBackground Perspectives “Cyber Intelligence“Cyber Intelligence”” 22 –– Integrating Cyber & CCTV ToolsIntegrating Cyber & CCTV Tools “Cyber Convergence”“Cyber Convergence” 3 –– Case Studies: Recent EventsCase Studies: Recent Events “Urban Terrorism”“Urban Terrorism” IntelligentIntelligent CyberCyber Surveillance!...Surveillance!... 4 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “Cyber Intelligence“Cyber Intelligence”” “Cyber Convergence”“Cyber Convergence” “Urban Terrorism”“Urban Terrorism” 44 –– Smart Cities & Event SurveillanceSmart Cities & Event Surveillance “Crowded Places”“Crowded Places” 55 –– Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools “AI Video Analytics”“AI Video Analytics” 66 –– Biometric & Behaviour ProfilesBiometric & Behaviour Profiles “Cyber Biometrics”“Cyber Biometrics” 77 –– TransportTransport, Retail, Culture, Defence, Retail, Culture, Defence ““Sector SurveillanceSector Surveillance”” 88 –– Cyber Surveillance Visions!...Cyber Surveillance Visions!... ““CyberCyber 2025 Futures”2025 Futures” 9 – YOUR Security & Surveillance! “YOUR Business Plan”“YOUR Business Plan”
  • 5. 11 –– 2121ststCC Background PerspectivesBackground Perspectives “Cyber Intelligence“Cyber Intelligence”” 22 –– Integrating Cyber & CCTV ToolsIntegrating Cyber & CCTV Tools “Cyber Convergence”“Cyber Convergence” 3 –– Case Studies: Recent EventsCase Studies: Recent Events “Urban Terrorism”“Urban Terrorism” IntelligentIntelligent CyberCyber Surveillance!...Surveillance!... 11 –– 2121ststC Background PerspectivesC Background Perspectives 5 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “Cyber Intelligence“Cyber Intelligence”” “Cyber Convergence”“Cyber Convergence” “Urban Terrorism”“Urban Terrorism” 44 –– Smart Cities & Event SurveillanceSmart Cities & Event Surveillance “Crowded Places”“Crowded Places” 55 –– Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools “AI Video Analytics”“AI Video Analytics” 66 –– Biometric & Behaviour ProfilesBiometric & Behaviour Profiles “Cyber Biometrics”“Cyber Biometrics” 77 –– TransportTransport, Retail, Culture, Defence, Retail, Culture, Defence ““Sector SurveillanceSector Surveillance”” 88 –– Cyber Surveillance Visions!...Cyber Surveillance Visions!... ““CyberCyber 2025 Futures”2025 Futures” 9 – YOUR Security & Surveillance! “YOUR Business Plan”“YOUR Business Plan” 11 –– 2121 C Background PerspectivesC Background Perspectives “Cyber Intelligence”“Cyber Intelligence”
  • 6. Public, Private &Public, Private & Dark Web:Dark Web: -- Visible & Hidden Layers of the InternetVisible & Hidden Layers of the Internet -- Public Web:Public Web: Amazon, eBay, Google,Amazon, eBay, Google, FacebookFacebook, Wikipedia & Info........, Wikipedia & Info........ 6 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Dark Web:Dark Web: Cyber Criminals, TOR & VPN, Hacktivists & Illegal Trades.......Cyber Criminals, TOR & VPN, Hacktivists & Illegal Trades....... Private Web:Private Web: Government,Government, Agencies, Critical Sectors.....Agencies, Critical Sectors.....
  • 7. 2121ststC CybersecurityC Cybersecurity “Threats & Trends”“Threats & Trends” •• 25 Year25 Year Evolution of CyberCrime &Evolution of CyberCrime & CyberTerrorCyberTerror:: 19931993--20182018 •• “21“21stst Century Colonisation”Century Colonisation” of Worldwide Internet by eCriminals, Hacktivists and CyberTerrorist Organisations •• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI) significantly increases CyberTerror Risks for ALL Nations! 7 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI) significantly increases CyberTerror Risks for ALL Nations! •• High Security Risks:High Security Risks: Most Governments & Businesses are currently not well secured against Cyber Attacks & eCrime .......and the.......and the “Bad Guys”“Bad Guys” are currently winning!are currently winning!
  • 8. 2121ststC CybersecurityC Cybersecurity “Threats & Trends”“Threats & Trends” •• 25 Year25 Year Evolution of CyberCrime &Evolution of CyberCrime & CyberTerrorCyberTerror:: 19931993--20182018 •• “21“21stst Century Colonisation”Century Colonisation” of Worldwide Internet by eCriminals, Hacktivists and CyberTerrorist Organisations •• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI) significantly increases CyberTerror Risks for ALL Nations! 8 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• Global ConnectivityGlobal Connectivity of Critical National Infrastructure (CNI) significantly increases CyberTerror Risks for ALL Nations! •• High Security Risks:High Security Risks: Most Governments & Businesses are currently not well secured against Cyber Attacks & eCrime .......and the.......and the “Bad Guys”“Bad Guys” are currently winning!are currently winning! Image:Image: DavidDavid ShankboneShankbone: Occupy Wall Street: Occupy Wall Street –– Sept 2011Sept 2011
  • 9. RealReal--Time Cyber Threat MapTime Cyber Threat Map @ Light Speed@ Light Speed 9 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 10. NorseNorse CyberMapCyberMap:: RealReal--Time Cyber ThreatsTime Cyber Threats 10 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 11. KasperskyKaspersky CyberMapCyberMap:: RealReal--Time ThreatsTime Threats 11 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Link:Link: http://Cybermap.kaspersky.comhttp://Cybermap.kaspersky.com
  • 12. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 12 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
  • 13. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 13 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
  • 14. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 14 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!! Chemnitz StationChemnitz Station -- GermanyGermany
  • 15. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 15 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!! Chemnitz StationChemnitz Station -- GermanyGermany
  • 16. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 16 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!! Chemnitz StationChemnitz Station -- GermanyGermany .....Cost to UK National Health Service =.....Cost to UK National Health Service = £92M£92M
  • 17. CyberAttack:CyberAttack: Tesco BankTesco Bank –– Nov 2016Nov 2016 17 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 66thth Nov 2016:Nov 2016: Cyber CriminalsCyber Criminals fromfrom Brazil & SpainBrazil & Spain hackhack 40,00040,000 TESCO Bank AccountsTESCO Bank Accounts with reported Theft ofwith reported Theft of £2.5m£2.5m fromfrom 9,0009,000 £16.4m Fine£16.4m Fine from UK FCAfrom UK FCA –– Financial Conduct AuthorityFinancial Conduct Authority
  • 18. Command & Control (C2)Command & Control (C2) MalwareMalware ServersServers -- “Global 21“Global 21stst CenturyCentury CyberCyber--ColonisationColonisation”” -- 18 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Image:Image: www.fireeye.comwww.fireeye.com –– FireEyeFireEye Inc (c)Inc (c)
  • 19. Typical C2Typical C2 MalwareMalware SignaturesSignatures 19 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference SignaturesSignatures Image:Image: www.fireeye.comwww.fireeye.com –– FireEyeFireEye Inc (c)Inc (c)
  • 20. Intelligent RealIntelligent Real--TimeTime CyberCyber ToolsTools • Defence against 21stC Terror Attacks requires Cyber Operations in RealReal--Time @ Light Speed!Time @ Light Speed! a) Smart Target SurveillanceSurveillance, Profiling & Tracking b) User & Device AuthenticationAuthentication: “Internet of Things” c) CyberBiometricsBiometrics & AIAI VideoAnalyticsVideoAnalytics:: Pre/Post Attack 20 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference c) CyberBiometricsBiometrics & AIAI VideoAnalyticsVideoAnalytics:: Pre/Post Attack d) Real-Time Analysis of Social MediaSocial Media, Mail & Comms e)e) SelfSelf--AdaptiveAdaptive User, IT Asset & Net Traffic ModellingModelling ..........Mitigation of AttacksMitigation of Attacks requiresrequires Intelligent CyberIntelligent Cyber Computing Solutions runningComputing Solutions running @ Light Speed!@ Light Speed!
  • 21. 21 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Diary Link:Diary Link: www.valentina.net/PWP/www.valentina.net/PWP/
  • 22. Royal Engineers:Royal Engineers: Radio SurveillanceRadio Surveillance forfor TerroristsTerrorists –– 19171917 -- Mozambique & TanzaniaMozambique & Tanzania –– Grandfather: Percy Probert!Grandfather: Percy Probert! 22 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Diary Link:Diary Link: www.valentina.net/PWP/www.valentina.net/PWP/
  • 23. 1 - 2121stst Background PerspectiveBackground Perspective “Cyber Intelligence”“Cyber Intelligence” 22 –– IntegratingIntegrating Cyber & CCTVCyber & CCTV ToolsTools “Cyber Convergence”“Cyber Convergence” 3 –Case Studies: Recent EventsCase Studies: Recent Events “Urban Terrorism”“Urban Terrorism” IntelligentIntelligent CyberCyber Surveillance!...Surveillance!... 22 –– Integrating Cyber & CCTV Tools!Integrating Cyber & CCTV Tools! CyberCyber 23 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “Urban Terrorism”“Urban Terrorism” 4 –Smart Cities & Event SurveillanceSmart Cities & Event Surveillance “Crowded Places”“Crowded Places” 5 –Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools “AI Video Analytics”“AI Video Analytics” 6 – iometriciometric & Behaviour Profiles& Behaviour Profiles “Cyber Biometrics”“Cyber Biometrics” 7–TrTransportansport, Retail, Culture, Defence, Retail, Culture, Defence “Sector Surveillance”“Sector Surveillance” 88 –– Cyber Surveillance Visions!...Cyber Surveillance Visions!... ““CyberCyber 2025 Futures”2025 Futures” 9 –YOUR Security & Surveillance! “YOUR Business Plan”“YOUR Business Plan” 22 –– Integrating Cyber & CCTV Tools!Integrating Cyber & CCTV Tools! ““CyberCyber ConvergnceConvergnce””
  • 24. CyberCyber--PhysicalPhysical Threat ScenariosThreat Scenarios •• Physical “Penetration”:Physical “Penetration”: Operations Perimeter penetrated to allow theft or corruption of Cyber Information / IT DataBases and Confidential Plans •• Cyber “Hack”:Cyber “Hack”: Malicious changes to Cyber Access Controls & IT Databases to allow Criminals/Terrorists to enter Target Facilities (such as Military Bases, Banking HQ, Telco/Mobile Network Operations) 24 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Network Operations) •• Convergent ThreatsConvergent Threats – Criminals/Terrorists will attack at the weakest links which in the 21stC will be BOTH Cyber Network Operations and Physical Security Ops .......Cyber AttacksCyber Attacks are now fully industrialised with Malicious Code “Kits” & Botnets for sale “by the hour”“by the hour” on the DARKNETDARKNET
  • 25. Regional CCTVRegional CCTV Control & SurveillanceControl & Surveillance 25 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference CCTV Control Room Operators with Multiple Displays needCCTV Control Room Operators with Multiple Displays need Cyber Analysis ToolsCyber Analysis Tools IncludingIncluding High Speed Video Analytics, Facial Recognition and Data Mining ToolsHigh Speed Video Analytics, Facial Recognition and Data Mining Tools
  • 26. VIDSYS:VIDSYS: Converged CyberConverged Cyber--Physical SecurityPhysical Security 26 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference www.vidsys.comwww.vidsys.com :: Integrated Traffic ControlIntegrated Traffic Control CentreCentre
  • 27. 1-- 2121stst Background PerspectiveBackground Perspective “Cyber Intelligence”“Cyber Intelligence” 22 –– Integrating Cyber & CCTV ToolsIntegrating Cyber & CCTV Tools “Cyber“Cyber Convergence”Convergence” 33 –– CaseCase Studies:Studies: Recent EventsRecent Events “Urban Terrorism”“Urban Terrorism” 44 ––Smart Cities & Event SurveillanceSmart Cities & Event Surveillance 55 ––Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools 6 –Biometric & Behaviour ProfilesBiometric & Behaviour Profiles IntelligentIntelligent CyberCyber Surveillance!...Surveillance!... 33-- Case Studies:Case Studies: Recent Terror EventsRecent Terror Events “Urban Terrorism“Urban Terrorism”” 27 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 44 ––Smart Cities & Event SurveillanceSmart Cities & Event Surveillance “Crowded Places”“Crowded Places” 55 ––Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools “AI Video Analytics”“AI Video Analytics” 6 –Biometric & Behaviour ProfilesBiometric & Behaviour Profiles “Cyber Biometrics”“Cyber Biometrics” 7–TrTransportansport, Retail, Culture, Defence, Retail, Culture, Defence “Sector Surveillance”“Sector Surveillance” 88–– Cyber Surveillance Visions!...Cyber Surveillance Visions!... ““CyberCyber 20252025 FuturesFutures”” 9 –YOUR Security & Surveillance! “YOUR Business Plan”“YOUR Business Plan” “Urban Terrorism“Urban Terrorism””
  • 28. 2121ststC Warfare:C Warfare: “Urban Terrorism”“Urban Terrorism” DefenceDefence againstagainst “Urban Terror”“Urban Terror” needsneeds INTEGRATIONINTEGRATION ofof PHYSICALPHYSICAL && CYBERCYBER Security Solutions =Security Solutions = SMART SECURITYSMART SECURITY “Bad Guys”“Bad Guys” useuse Cyber ToolsCyber Tools & Resources to extensively& Resources to extensively ResearchResearch && LaunchLaunch MajorMajor Physical Terror Attacks!Physical Terror Attacks! 28 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Physical Terror Attacks!Physical Terror Attacks! (1)(1) DarkWebDarkWeb forfor Weapons!Weapons! (2)(2) ResearchResearch Urban TargetsUrban Targets (3)(3) Social MediaSocial Media forfor CommsComms (4)(4) RecruitmentRecruitment & Training& Training (5)(5) RansomwareRansomware for CAfor CA$$H..H..
  • 29. Nice TruckNice Truck Terror AttackTerror Attack: 14: 14thth July 2016July 2016 29 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 30. Nice TruckNice Truck Terror AttackTerror Attack: 14: 14thth July 2016July 2016 30 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 31. Cyber Criminal TeamCyber Criminal Team SkillsetSkillset!...!... • Skills required by the “Bad Guys”“Bad Guys” to launch and manage major Cyber Crime Campaigns: •• ICT:ICT: Cyber Technical Specialist (Hacking Tools) •• Finance:Finance: Money Laundering & Campaign Budget •• HRHR--Human Resources:Human Resources: Headhunting Cyber Talent! •• Intelligence:Intelligence: Recruit “Insiders” in Business/Govt 31 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• Intelligence:Intelligence: Recruit “Insiders” in Business/Govt •• Project Management:Project Management: Co-ordinate Campaign! •• Security:Security: Detect “BackDoors” both in the Physical and Cyber Defences of the Target Business/Govt ...In summary, the “Bad Guys”“Bad Guys” will often organise themselves as an Criminal Cell or Illegal BusinessCriminal Cell or Illegal Business!
  • 32. Recent Terror Events:Recent Terror Events: Case StudiesCase Studies •• MoscowMoscow – Nord-Ost Theatre – October 2002 •• LondonLondon – Metro & Bus Attack – July 2005 •• ParisParis – Charlie Hebdo Attack – Jan 2015 •• TunisiaTunisia – Marhaba Hotel, Sousse – June 2015 •• ParisParis – Bataclan Theatre – Nov 2015 32 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• ParisParis – Bataclan Theatre – Nov 2015 •• BrusselsBrussels - Airport Attack – March 2016 •• LondonLondon – Westminster – March 2017/Aug 2018 •• ManchesterManchester – Arena - June 2017 ........ALLALL Cultural, Tourist & Transport Facilities areCultural, Tourist & Transport Facilities are vulnerable to attack invulnerable to attack in EVERYEVERY City & Country!City & Country!
  • 33. Paris Terror Attack:Paris Terror Attack: Charlie HebdoCharlie Hebdo--Nov2011Nov2011 33 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 34. Brussels Airport:Brussels Airport: Terror AttackTerror Attack––March 2016March 2016 34 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 35. Terror Events:Terror Events: 11stst Oct 2018Oct 2018 -- WikiWiki 35 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Terror Incidents:Terror Incidents: 11stst to 14to 14stst Oct 2018 = 72Oct 2018 = 72
  • 36. Terror Events:Terror Events: EarlyEarly Oct 2018Oct 2018 -- WikiWiki 36 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Terror Incidents:Terror Incidents: 11stst to 14to 14thth Oct 2018 = 72Oct 2018 = 72
  • 37. 1717thth Nov 2015Nov 2015: “Islamic State is Plotting: “Islamic State is Plotting Deadly CyberDeadly Cyber--Attacks”:Attacks”: George OsborneGeorge Osborne Sept 2018Sept 2018 -- £250m£250m CyberCyber--Force UnitForce Unit To CombatTo Combat TerrorTerror & Gang Attacks& Gang Attacks 37 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference £1.9bn Cybercrime Budget£1.9bn Cybercrime Budget UK National Cyber CentreUK National Cyber Centre National Cyber Crime UnitNational Cyber Crime Unit
  • 38. CyberEspionageCyberEspionage:: Middle East and AfricaMiddle East and Africa (2)(2) 38 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 39. CyberEspionageCyberEspionage Group:Group: Volatile CedarsVolatile Cedars • “Volatile Cedars” : Cyber Espionage Group operating from Lebanon since 2012 with in-depth research and full report by Checkpoint Software 39 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference by Checkpoint Software Technologies Ltd (2015)
  • 40. AnonymousAnonymous--Hacktivists declareHacktivists declare “Total War”“Total War” onon ISISISIS afterafter Paris AttacksParis Attacks –– 1616thth Nov 2015Nov 2015 40 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 41. 1-- 2121stst Background PerspectiveBackground Perspective “Cyber Intelligence”“Cyber Intelligence” 22 –– Integrating Cyber & CCTV ToolsIntegrating Cyber & CCTV Tools “Cyber Convergence”“Cyber Convergence” 3 – Case Studies: Recent EventsCase Studies: Recent Events “Urban Terrorism”“Urban Terrorism” 44 ––SmartSmart Cities & Event SurveillanceCities & Event Surveillance 5 –Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools 6 –Biometric & Behaviour ProfilesBiometric & Behaviour Profiles IntelligentIntelligent CyberCyber Surveillance!...Surveillance!... 44 –– Smart City and Event SurveillanceSmart City and Event Surveillance “Crowded Places”“Crowded Places” 41 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 44 ––SmartSmart Cities & Event SurveillanceCities & Event Surveillance “Crowded“Crowded PlacesPlaces”” 5 –Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools “AI Video Analytics”“AI Video Analytics” 6 –Biometric & Behaviour ProfilesBiometric & Behaviour Profiles “Cyber Biometrics”“Cyber Biometrics” 7–TrTransportansport, Retail, Culture, Defence, Retail, Culture, Defence “Sector Surveillance”“Sector Surveillance” 88–– Cyber Surveillance Visions!...Cyber Surveillance Visions!... ““CyberCyber 2025 Futures”2025 Futures” 9 –YOUR Security & Surveillance! “YOUR Business Plan”“YOUR Business Plan” Ship: HMT Ascanius – Devonport to Durban - 1917 “Crowded Places”“Crowded Places”
  • 42. “Real“Real--Time”Time” City Video SurveillanceCity Video Surveillance 42 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Analysing and Tracking Targets requiresAnalysing and Tracking Targets requires Intelligent Video AnalyticsIntelligent Video Analytics
  • 43. Metro Surveillance:Metro Surveillance: Charing Cross, LondonCharing Cross, London 43 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 44. “Crowded Places”:Crowded Places”: ExamplesExamples Theatres & Concert HallsTheatres & Concert Halls Transportation HubsTransportation Hubs Sports Events & StadiumsSports Events & Stadiums Schools & College CampusSchools & College Campus UK NationalUK National CounterCounter--Terrorism SecurityTerrorism Security OfficeOffice –– NaCTSONaCTSO 44 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Schools & College CampusSchools & College Campus Retail Shopping MallsRetail Shopping Malls Hospitals & HealthcareHospitals & Healthcare Places of WorshipPlaces of Worship Resorts & Theme ParksResorts & Theme Parks
  • 45. “Crowded Places”:Crowded Places”: ExamplesExamples Theatres & Concert HallsTheatres & Concert Halls Transportation HubsTransportation Hubs Sports Events & StadiumsSports Events & Stadiums Schools & College CampusSchools & College Campus UK NationalUK National CounterCounter--Terrorism SecurityTerrorism Security OfficeOffice –– NaCTSONaCTSO 45 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Schools & College CampusSchools & College Campus Retail Shopping MallsRetail Shopping Malls Hospitals & HealthcareHospitals & Healthcare Places of WorshipPlaces of Worship Resorts & Theme ParksResorts & Theme Parks @@ www.gov.uk/government/publicationswww.gov.uk/government/publications/crowded/crowded--placesplaces--guidanceguidance
  • 46. Smart Analysis ToolsSmart Analysis Tools:: 3D Simulation Modelling3D Simulation Modelling forfor ”Security Crisis””Security Crisis” & “Disaster Management”& “Disaster Management” 46 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 47. “Crowded Places”:“Crowded Places”: Security DefencesSecurity Defences •• “Intelligent” Perimeter Fencing (Fibre/Sensors)“Intelligent” Perimeter Fencing (Fibre/Sensors) •• Secure Access Doors & GatesSecure Access Doors & Gates •• CCTV Surveillance & Video AnalyticsCCTV Surveillance & Video Analytics •• Scanning Devices for Malicious AssetsScanning Devices for Malicious Assets -- CBRNCBRN •• Biometric Technologies & Face IDBiometric Technologies & Face ID 47 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• Biometric Technologies & Face IDBiometric Technologies & Face ID •• RealReal--Time Command & Control CentreTime Command & Control Centre •• Converged Dashboard: Physical & Cyber FeedsConverged Dashboard: Physical & Cyber Feeds ....Effective....Effective $$ecurityecurity forfor “Crowded Places”“Crowded Places” requiresrequires $$$$$$ Investment inInvestment in $$ecurityecurity $kills & $$kills & $olutionsolutions!....!....
  • 48. 1-- 2121stst Background PerspectiveBackground Perspective “Cyber Intelligence”“Cyber Intelligence” 22 –– Integrating Cyber & CCTV ToolsIntegrating Cyber & CCTV Tools “Cyber Convergence”“Cyber Convergence” 33 –– Case Studies: Recent EventsCase Studies: Recent Events “Urban Terrorism”“Urban Terrorism” IntelligentIntelligent CyberCyber Surveillance!...Surveillance!... 55 –– Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools 48 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “Cyber Intelligence”“Cyber Intelligence” “Cyber Convergence”“Cyber Convergence” “Urban Terrorism”“Urban Terrorism” 4 –Smart Cities & Event SurveillanceSmart Cities & Event Surveillance “Crowded Places”“Crowded Places” 55 ––Advanced CyberAdvanced Cyber Analysis ToolsAnalysis Tools “AI Video Analytics”“AI Video Analytics” 6 –Biometric & Behaviour ProfilesBiometric & Behaviour Profiles “Cyber Biometrics”“Cyber Biometrics” 7–TrTransportansport, Retail, Culture, Defence, Retail, Culture, Defence “Sector Surveillance”“Sector Surveillance” 88–– 2121ststCC Maritime SecurityMaritime Security TrendsTrends “Cyber @ Sea”“Cyber @ Sea” 9 –YOUR Security & Surveillance! “YOUR Business Plan”“YOUR Business Plan” 55 –– Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools “AI Video Analytics”“AI Video Analytics”
  • 49. “Cyber”“Cyber” Tracking & ProfilingTracking & Profiling:: “Bad Guys”“Bad Guys” • Mitigating Global Crime & Terrorism requires us to Profile & TrackProfile & Track the “Bad Guys” in “Real-Time” with Intelligent Networked Computing Systems: –– 3D AI Video Analytics3D AI Video Analytics from CCTV Facial Profiles – Track On-Line Social MediaSocial Media, eMail & “Cell” Comms – Scan ““DarkNetDarkNet”” for “Business Deals”, Plans & Messages – Check, Track & Locate MMobilobilee Communications 49 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference – Check, Track & Locate MMobilobilee Communications – Track “Bad Guys” in National Transport HubsTransport Hubs –– DeployDeploy RFID DevicesRFID Devices to Track Highto Track High--Value & Strategic “Assets”Value & Strategic “Assets” – Use RealReal--Time ANPRTime ANPR for Target Vehicle Tracking ...Cyber Computing Smart AppsCyber Computing Smart Apps can now Track Massive Databases of Target “Bad Guy” Profiles @ Light Speed!...@ Light Speed!...
  • 50. “Cyber”“Cyber” Tracking & ProfilingTracking & Profiling:: “Bad Guys”“Bad Guys” • Mitigating Global Crime & Terrorism requires us to Profile & TrackProfile & Track the “Bad Guys” in “Real-Time” with Intelligent Networked Computing Systems: –– 3D AI Video Analytics3D AI Video Analytics from CCTV Facial Profiles – Track On-Line Social MediaSocial Media, eMail & “Cell” Comms – Scan ““DarkNetDarkNet”” for “Business Deals”, Plans & Messages – Check, Track & Locate MobileMobile Communications 50 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference – Check, Track & Locate MobileMobile Communications – Track “Bad Guys” in National Transport HubsTransport Hubs –– DeployDeploy RFID DevicesRFID Devices to Track Highto Track High--Value & Strategic “Assets”Value & Strategic “Assets” – Use RealReal--Time ANPRTime ANPR for Target Vehicle Tracking ...Cyber Computing Smart AppsCyber Computing Smart Apps can now Track Massive Databases of Target “Bad Guy” Profiles @ Light Speed!...@ Light Speed!...
  • 51. :: AI CyberAI Cyber--Bio SurveillanceBio Surveillance 51 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference ::AI Biometric Video AnalyticsAI Biometric Video Analytics --“Chinese Unicorn”“Chinese Unicorn” www.sensetime.comwww.sensetime.com
  • 52. :: AI CyberAI Cyber--Bio SurveillanceBio Surveillance 52 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference ::AI Biometric Video AnalyticsAI Biometric Video Analytics --“Chinese Unicorn”“Chinese Unicorn” www.sensetime.comwww.sensetime.com
  • 53. :: AI CyberAI Cyber--Bio SurveillanceBio Surveillance 53 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference ::AI Biometric Video AnalyticsAI Biometric Video Analytics --“Chinese Unicorn”“Chinese Unicorn” www.sensetime.comwww.sensetime.com
  • 54. OnOn--Line 3D HiLine 3D Hi--ResolutionResolution Aerial SurveillanceAerial Surveillance 54 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “Google Maps”“Google Maps” -- 3D Aerial & Satellite Images3D Aerial & Satellite Images -- Nice Airport, FranceNice Airport, France
  • 55. OnOn--Line 3D HiLine 3D Hi--ResolutionResolution Aerial SurveillanceAerial Surveillance 55 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “Google Maps”“Google Maps” -- 3D Aerial & Satellite Images3D Aerial & Satellite Images -- Nice Airport, FranceNice Airport, France
  • 56. OnOn--Line 3D HiLine 3D Hi--ResolutionResolution Aerial SurveillanceAerial Surveillance 56 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “Google Maps”“Google Maps” -- 3D Aerial & Satellite Images3D Aerial & Satellite Images -- Nice Airport, FranceNice Airport, France
  • 57. OnOn--Line 3D HiLine 3D Hi--ResolutionResolution Aerial SurveillanceAerial Surveillance 57 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “Google Maps”“Google Maps” -- 3D Aerial & Satellite Images3D Aerial & Satellite Images -- Nice Airport, FranceNice Airport, FranceWest End Hotel, NiceWest End Hotel, Nice
  • 58. 58 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 59. “Real“Real--Time”Time” Meteorological AnalysisMeteorological Analysis 59 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Satellite Mapping ofSatellite Mapping of “Extreme Weather”“Extreme Weather”
  • 60. Counter Terrorism & Cyber SecurityCounter Terrorism & Cyber Security:: Newton LeeNewton Lee Total Information AwarenessTotal Information Awareness “Springer“Springer –– 2015 Edition”2015 Edition” 60 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 61. 1- - 2121stst Background PerspectiveBackground Perspective “Cyber Intelligence”“Cyber Intelligence” 22 –– Integrating Cyber & CCTV ToolsIntegrating Cyber & CCTV Tools “Cyber Convergence”“Cyber Convergence” 3 – Case Studies: Recent EventsCase Studies: Recent Events “Urban Terrorism”“Urban Terrorism” IntelligentIntelligent CyberCyber Surveillance!...Surveillance!... 66 –– Biometric & Behaviour ProfilesBiometric & Behaviour Profiles “Cyber Biometrics”“Cyber Biometrics” 61 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “Urban Terrorism”“Urban Terrorism” 4 –– Smart Cities & Event SurveillanceSmart Cities & Event Surveillance “Crowded Places”“Crowded Places” 5 –Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools “AI Video Analytics”“AI Video Analytics” 66 ––Biometric & Behaviour ProfilesBiometric & Behaviour Profiles ““CyberCyber Biometrics”Biometrics” 7–TrTransportansport, Retail, Culture, Defence, Retail, Culture, Defence “Sector Applications”“Sector Applications” 88–– Cyber Surveillance Visions!...Cyber Surveillance Visions!... “Cyber 2025 Futures”“Cyber 2025 Futures” 9 –YOUR Security & Surveillance! “YOUR Business Plan”“YOUR Business Plan” “Cyber Biometrics”“Cyber Biometrics”
  • 62. BiometricsBiometrics && RFIDRFID Security ApplicationsSecurity Applications •• BiometricsBiometrics techniques may include: – Finger and Palm Prints – Retinal and Iris Scans – 3D Vein ID – Voice Scans & Recognition – DNA Database – Criminal Records – 3D Facial Recognition 62 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• RFIDRFID == Radio Frequency ID with applications that include: – Personal ID Cards for Building, Secure Facility Access – Tags for Retail Articles as a Deterrence to Shoplifting – Powered RFID Tags for Vehicles to open Doors, Barriers & Switch Lights – Plans to use RFID Tags for Perishable Products such as Fruit & Vegetables – Asset Tags to manage the movement of High-Value & Strategic Assets – Potential for Embedded Intelligent RFID Devices into Humans
  • 63. IntegratedIntegrated CyberCyber Biometrics:Biometrics: PrePre--AttackAttack •• Intelligent Biometrics ToolsIntelligent Biometrics Tools can significantly reduce YOUR Risks of Cyber Threats & Attacks... –– Device & Access AuthenticationDevice & Access Authentication by Fingerprints, Retinal/Iris Scan or Palm Vein Scan –– Facility AccessFacility Access with “Live” 3D Facial Recognition –– “Behavioural Biometrics”“Behavioural Biometrics” for Secure User Authentication City/CampusCity/Campus Regional Tracking with Intelligent 4K Networked 63 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “Behavioural Biometrics”“Behavioural Biometrics” for Secure User Authentication –– City/CampusCity/Campus Regional Tracking with Intelligent 4K Networked CCTV & Real-Time Self-Learning Video Analytics –– “Live”“Live” CBRNCBRN ScanningScanning for Hazardous materials – (CChemical, BBiological, RRadiological, NNuclear) ...It is crucial that Cyber Biometrics ToolsCyber Biometrics Tools are Integrated with the CSO-led Business Security OperationsBusiness Security Operations
  • 64. TypicalTypical CyberCyber--BiometricBiometric SolutionsSolutions 64 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 65. CyberCyber--Biometrics:Biometrics: Fingerprint SolutionsFingerprint Solutions 65 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 66. Linear BiometricLinear Biometric Finger Print ScannerFinger Print Scanner 66 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 67. 67 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference CharacteristicCharacteristic FingerprintFingerprint PatternsPatterns
  • 68. CyberCyber--Biometrics:Biometrics: “Live” Vein Analytics“Live” Vein Analytics 68 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 69. CyberCyber--Biometrics:Biometrics: Retinal & Iris ScansRetinal & Iris Scans 69 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 70. BiometricBiometric IDID Authentication:Authentication: “IoT”“IoT” • Biometric Security provides Crucial Cyber- Defence for the “Internet of Things”“Internet of Things” –– “IoT”:“IoT”: – Bio-ID & AuthenticationAuthentication for ALL Secure “IoT” Devices – Real-Time Bio ProfilingProfiling & Behavioural Modelling – Rapid Intrusion AlertsIntrusion Alerts for “IoT” Networks & Assets – Bio ID Access for Secure Cloud Data & AppsCloud Data & Apps 70 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference – Bio ID Access for Secure Cloud Data & AppsCloud Data & Apps – Mobile “IoT” Asset TrackingAsset Tracking with Bio ID Security ...ALL Secure “IoT” Devices should be Biometric Protected to Mitigate ID Theft and Fraud!...Mitigate ID Theft and Fraud!...
  • 71. Forensics:Forensics: Fast DNA Finger PrintingFast DNA Finger Printing 71 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 72. Fast DNAFast DNA Sequencing:Sequencing:GrapheneGraphene NanoporeNanopore 72 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 73. Biometrics & ForensicsBiometrics & Forensics: Glasgow University: Glasgow University 73 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 74. Private Detective:Private Detective: “Sherlock Holmes”!“Sherlock Holmes”! 74 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Author:Author: Sir Arthur Conan DoyleSir Arthur Conan Doyle:: 18591859 -- 19301930 “Forensics Pioneer”“Forensics Pioneer” a)a) Detective WorkDetective Work b)b) FingerprintsFingerprints c)c) Ciphers & CodesCiphers & Codes d)d) FootprintsFootprints e)e) HandwritingHandwriting
  • 75. (5)(5) CyberCyber Digital Forensics:Digital Forensics: PostPost--AttackAttack • Evidence from Cyber Digital Forensics can help to identify the Criminals, Terrorists and Cyber Attackers: •• Physical Forensics:Physical Forensics: – Blood & Tissue Samples – DNA & Genetic Analysis – Chemical Agents, GSR, Fibres •• Cyber Forensics:Cyber Forensics: 75 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• Cyber Forensics:Cyber Forensics: – Cyber Attack IP Address/DNS/Proxies – Malware/Trojan/Virus Analysis – Botnet/DDOS , Targets & Payload – RansomWare/Encryption & Attack “Signatures” ...Evidence from BOTH Cyber & Physical ForensicsCyber & Physical Forensics will be relevant to 21stC Terror Threats & Attacks!...
  • 76. 1-- 2121stst Background PerspectiveBackground Perspective “Cyber Intelligence”“Cyber Intelligence” 22 –– Integrating Cyber & CCTV ToolsIntegrating Cyber & CCTV Tools “Cyber Convergence”“Cyber Convergence” 3 – Case Studies: Recent EventsCase Studies: Recent Events “Urban Terrorism”“Urban Terrorism” IntelligentIntelligent CyberCyber Surveillance!...Surveillance!... 77 –– Transport, Retail, Culture, Defence...Transport, Retail, Culture, Defence... “Sector Surveillance”“Sector Surveillance” 76 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 44 –– Smart Cities & Event SurveillanceSmart Cities & Event Surveillance “Crowded Places”“Crowded Places” 5 -Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools “AI Video Analytics”“AI Video Analytics” 6 – Biometric & Behaviour ProfilesBiometric & Behaviour Profiles “Cyber Biometrics”“Cyber Biometrics” 77––TrTransportansport, Retail, Culture, Defence, Retail, Culture, Defence “Sector Surveillance”“Sector Surveillance” 88–– Cyber Surveillance Visions!...Cyber Surveillance Visions!... “Cyber 2025 Futures”“Cyber 2025 Futures” 9 –YOUR Security & Surveillance! “YOUR Business Plan”“YOUR Business Plan” “Sector Surveillance”“Sector Surveillance”
  • 77. CyberCyber--Bio:Bio: IntegratedIntegrated Security ScenariosSecurity Scenarios •• Banks/Finance:Banks/Finance: eFraud, DDOS, Insider Threats •• Government/Parliament:Government/Parliament: “Fake IDs” & File Theft •• Defence/Military:Defence/Military: Cyber-Espionage & Attacks •• Travel/Tourism:Travel/Tourism: Beach Resorts & Travel Hubs •• Culture/Sports:Culture/Sports: Major Events & Competitions •• Energy/Utilities:Energy/Utilities: Nuclear Theft, Explosions 77 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• Energy/Utilities:Energy/Utilities: Nuclear Theft, Explosions •• Retail/Malls/Campus:Retail/Malls/Campus: Armed Attacks & Siege •• Healthcare/Healthcare/PharmaPharma:: “Fake Drugs & Records” ...ALL Generic CyberCyber--Bio ThreatsBio Threats apply to ALL Our Business Sectors & Critical Infrastructure!
  • 78. Defence SectorDefence Sector -- C4ISR:C4ISR: CCommand,ommand, CControl,ontrol, CCommunications,ommunications, CComputer,omputer, IIntelligence,ntelligence, SSurveillance, andurveillance, and RReconnaissance…….econnaissance……. 78 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference C4ISR:C4ISR: Integrated RealIntegrated Real--Time Defence ArchitectureTime Defence Architecture
  • 79. Defence Sector:Defence Sector: DODDOD CyberCyber GuidelinesGuidelines 79 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Aug 2018Aug 2018
  • 80. 1-- 2121stst Background PerspectiveBackground Perspective “Cyber Intelligence”“Cyber Intelligence” 22 –– Integrating Cyber & CCTV ToolsIntegrating Cyber & CCTV Tools “Cyber Convergence”“Cyber Convergence” 3 – Case Studies: Recent EventsCase Studies: Recent Events “Urban Terrorism”“Urban Terrorism” IntelligentIntelligent CyberCyber Surveillance!...Surveillance!... 88 –– Cyber Surveillance Visions!...Cyber Surveillance Visions!... “Cyber“Cyber 20252025 Futures”Futures” 80 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 4 –Smart Cities & Event SurveillanceSmart Cities & Event Surveillance “Crowded Places”“Crowded Places” 5 –Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools “AI Video Analytics”“AI Video Analytics” 6 – Biometric & Behaviour ProfilesBiometric & Behaviour Profiles “Cyber Biometrics”“Cyber Biometrics” 7–TrTransportansport, Retail, Culture, Defence, Retail, Culture, Defence “Sector Surveillance”“Sector Surveillance” 88–– Cyber Surveillance Visions!...Cyber Surveillance Visions!... “Cyber“Cyber 20252025 Futures”Futures” 9 –YOUR Security & Surveillance! “YOUR Business Plan”“YOUR Business Plan” “Cyber“Cyber 20252025 Futures”Futures”
  • 81. “Smart Glass”:“Smart Glass”: Augmented RealityAugmented Reality -- Meta VisionMeta Vision ARAR HeadSetHeadSet:: 20172017 -- 81 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 82. Augmented Reality:Augmented Reality: “Skiing Challenge”“Skiing Challenge” 82 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 83. Augmented RealityAugmented Reality –– ““Location Paris”Location Paris” 83 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 84. MultiMulti--Year Evolution of “Year Evolution of “WikiWiki--Web”Web” Complex Adaptive SystemComplex Adaptive System:“Wiki.tudelft.nl”:“Wiki.tudelft.nl” 84 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Delft University of TechnologyDelft University of Technology -- NetherlandsNetherlands
  • 85. RealReal--Time Brain Scan:Time Brain Scan: Neural NetworksNeural Networks 85 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 86. CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert 86 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology
  • 87. CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert 87 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology
  • 88. CyberSecurity:CyberSecurity: Big Data VisualizationBig Data Visualization JapanJapan –– NICTNICT:: ““DaedalusDaedalus”” -- Cyber AlertCyber Alert 88 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference NICTNICT == NNationalational IInstitute ofnstitute of IInformation andnformation and CCommunicationsommunications TTechnologyechnology Web:Web: SiteVisor.usSiteVisor.us -- “Real“Real--Time Cyber Attack Alert System”Time Cyber Attack Alert System”
  • 89. -- UN/ITUUN/ITU CyberSecurityCyberSecurity AgendaAgenda -- Quest forQuest for CyberConfidenceCyberConfidence (Eng/(Eng/RusRus)) 89 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference LinkLink: www.itu.int/en/publications/
  • 90. 1-- 2121stst Background PerspectiveBackground Perspective “Cyber Intelligence”“Cyber Intelligence” 22 –– Integrating Cyber & CCTV ToolsIntegrating Cyber & CCTV Tools “Cyber Convergence”“Cyber Convergence” 3 – Case Studies: Recent EventsCase Studies: Recent Events “Urban Terrorism”“Urban Terrorism” IntelligentIntelligent CyberCyber Surveillance!...Surveillance!... 99 –– YOUR Business Security & SurveillanceYOUR Business Security & Surveillance “YOUR Business Plan”“YOUR Business Plan” 90 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “Urban Terrorism”“Urban Terrorism” 4 – Smart Cities & Event SurveillanceSmart Cities & Event Surveillance “Crowded Places”“Crowded Places” 5 -Advanced Cyber Analysis ToolsAdvanced Cyber Analysis Tools ”AI Video Analytics””AI Video Analytics” 6 – Biometric & Behaviour ProfilesBiometric & Behaviour Profiles “Cyber Biometrics”“Cyber Biometrics” 7–TrTransportansport, Retail, Culture, Defence, Retail, Culture, Defence “Sector Surveillance”“Sector Surveillance” 88–– Cyber Surveillance Visions!...Cyber Surveillance Visions!... “Cyber 2025 Futures”“Cyber 2025 Futures” 99 ––YOUR Security & Surveillance!YOUR Security & Surveillance! “YOUR“YOUR Business PlanBusiness Plan”” “YOUR Business Plan”“YOUR Business Plan”
  • 91. (9)(9) YOUR Top 3YOUR Top 3 Actions & RoadMapActions & RoadMap •• Action 1:Action 1: CSO-Led Board-Level Review & Audit of current Security Tools & Operations – 60 days •• Action 2:Action 2: Investigate Major CyberSecurity Risks & Potential “Terror Attack” Scenarios - 30 days •• Action 3:Action 3: Develop Multi-Year Plan, Budget & 91 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• Action 3:Action 3: Develop Multi-Year Plan, Budget & Roadmap to Mitigate Identified Risks to include: a) Business-Wide CyberCyber--PhysicalPhysical Security Operations b)b) “IoT” Cyber Security“IoT” Cyber Security for both Legacy & New Assets c) Professional Cyber Security TrainingCyber Security Training & Development d) Security Staff Scenario Exercises for “Terror Alerts”“Terror Alerts”
  • 92. Integrated Cyber & Physical Security:Integrated Cyber & Physical Security: “The Shopping List”“The Shopping List” ...Smart Security for Business & Government is a Multi...Smart Security for Business & Government is a Multi--Year Programme!Year Programme! 1)1) Cybersecurity TeamCybersecurity Team:: Establishment of a CERT/CSIRT & Professionally Qualified Cybersecurity Team within your Business or Government Organisation 2)2) CNI:CNI: Long Term Critical Infrastructure Protection (CNI) – Protect Critical Info Assets! 3)3) System UpgradesSystem Upgrades:: Technical Infrastructure Upgrades including Hardware, Software, Databases, Secure Network Links, Biometrics & RFID 4) BackBack--UpUp:: Disaster Recovery, Business Continuity and Back-Up Systems 5)5) PhysicalPhysical :: Physical Security Applications – CCTV, Alarms, Control Centre 6)6) Awareness CampaignAwareness Campaign:: Business-Wide Campaign for Cybersecurity Awareness 92 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 6)6) Awareness CampaignAwareness Campaign:: Business-Wide Campaign for Cybersecurity Awareness 7)7) TrainingTraining:: Cybersecurity Skills, Certification & Professional Training Programme 8)8) EncryptionEncryption:: Implement Data Encryption for Business Critical Info 9)9) Rules & Policies:Rules & Policies: Develop and Communicate Cyber & Physical Security Policies for ALL Staff & Contractors to cover topics such as Wi-Fi and “Bring your Own Device (BYOD)” ..….It is also recommended to develop an economic..….It is also recommended to develop an economic “Cost“Cost--Benefit”Benefit” analysis and detailedanalysis and detailed Business Case in order to justifyBusiness Case in order to justify Cybersecurity InvestmentCybersecurity Investment for your Board of Directors!for your Board of Directors!
  • 93. “Cyber Defence”“Cyber Defence” againstagainst ““Urban TerrorismUrban Terrorism”” Prepare for Terror Threats & Attacks through YOUR Intelligent RealIntelligent Real--Time CyberTime Cyber & Physical Surveillance Operations& Physical Surveillance Operations!! Don’t be taken by surprise by БегемотБегемот - The Satanic Terrorist CatThe Satanic Terrorist Cat - from Bulgakov’s : “The Master & Margarita” 93 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Bulgakov’s Devil Cat – БегемотБегемот - Master & Margarita - 1972 Pen & Ink Drawing by Dr Alexander RimskiDr Alexander Rimski--KorsakovKorsakov Bulgakov’s : “The Master & Margarita” Graphic Print (1972) courtesy of : Dr Alexander RimskiDr Alexander Rimski--KorsakovKorsakov Great Grandson of the Composer
  • 94. The Surrealistic Paintings of Dr Alexander RimskyThe Surrealistic Paintings of Dr Alexander Rimsky--KorsakovKorsakov 94 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Web LinkWeb Link:: www.valentina.net/ARK3/ark2.htmlwww.valentina.net/ARK3/ark2.html
  • 95. CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!! 95 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference DownloadDownload CyberCyber Slides:Slides: www.valentina.net/NICE2018/www.valentina.net/NICE2018/
  • 96. CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!... 3838thth EastEast--West Security Conference:West Security Conference: Nice, UKNice, UK 96 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “NICE“NICE –– 1880”1880”
  • 97. ThankThank--You!You!ThankThank--You!You! CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!... 3838thth EastEast--West Security Conference:West Security Conference: Nice, UKNice, UK 97 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “NICE“NICE –– 1880”1880” ThankThank--You!You!ThankThank--You!You! Download Presentation Slides:Download Presentation Slides: www.Valentina.net/www.Valentina.net/NICE2018NICE2018// Download Presentation Slides:Download Presentation Slides: www.Valentina.net/www.Valentina.net/NICE2018NICE2018//
  • 98. Download Presentation Slides:Download Presentation Slides: www.Valentina.netwww.Valentina.net/NICE2018//NICE2018/ Download Presentation Slides:Download Presentation Slides: www.Valentina.netwww.Valentina.net/NICE2018//NICE2018/ 98 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Thank you for your time!Thank you for your time!Thank you for your time!Thank you for your time!
  • 99. AdditionalAdditional CybersecurityCybersecurity ResourcesResources 99 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference LinkLink:: www.valentina.net/vaza/CyberDocswww.valentina.net/vaza/CyberDocs
  • 100. Professional ProfileProfessional Profile -- Dr David E. ProbertDr David E. Probert Computer Integrated Telephony (CIT)Computer Integrated Telephony (CIT) – Established and led British Telecom’s £25M EIGER Project during the mid-1980s’ to integrate computers with telephone switches (PABX’s). This resulted in the successful development and launch of CIT software applications for telesales & telemarketing Blueprint for Business CommunitiesBlueprint for Business Communities – Visionary Programme for Digital Equipment Corporation during late-1980’s that included the creation of the “knowledge lens” and “community networks”. The Blueprint provided the strategic framework for Digital’s Value-Added Networks Business European Internet Business Group (EIBGEuropean Internet Business Group (EIBG)) – Established and led Digital Equipment Corporation’s European Internet Group for 5 years. Projects included support for the national Internet infrastructure for countries across EMEA as well as major enterprise, government & educational Intranet deployments. Dr David Probert was a sponsoring member of the European Board for Academic & Research Networking (EARN/TERENA) for 7 years (1991 1998) Supersonic Car (Supersonic Car (ThrustSSCThrustSSC)) – Worked with Richard Noble OBE, and the Mach One Club to set up and manage the 1st Multi-Media and e-Commerce Web- Site for the World’s 1st Supersonic Car – ThrustSSC – for the World Speed Record. Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11 100 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11 networking products with technology partners from both UK and Taiwan. Networked Enterprise SecurityNetworked Enterprise Security - Appointed as the New Products Director (CTO) to the Management Team of the Blick Group plc with overall responsibility for 55 professional engineers & a diverse portfolio of hi-tech security products. Republic of GeorgiaRepublic of Georgia – Senior Security Adviser – Appointed by the European Union to investigate and then to make recommendations on all aspects of IT security, physical security and BCP/DR relating to the Georgian Parliament, and then by UN/ITU to review Cybersecurity for the Government Ministries. UN/ITUUN/ITU – Senior Adviser – Development of Cybersecurity Infrastructure, Standards, Policies, & Organisations in countries within both Europe & Americas Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1stst Class Honours Maths DegreeClass Honours Maths Degree (Bristol University) & PhD from Cambridge University in Self(Bristol University) & PhD from Cambridge University in Self--Organising Systems (Evolution of Stochastic Automata) ,Organising Systems (Evolution of Stochastic Automata) , and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007--2018 Editions2018 Editions.
  • 101. 3838thth East West Security Conference:East West Security Conference: Nice, FranceNice, France IntelligentIntelligent CyberCyber Surveillance!...Surveillance!... 101 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 102. Ages of Computing, Networking & Intelligence:Ages of Computing, Networking & Intelligence: 19601960 –– 2020+2020+ •• 1960 to 1980 (Computing Big Bang1960 to 1980 (Computing Big Bang –– PhysicalPhysical DataData ):): “Big is Beautiful” – Era of Massive Mainframe Computing with Minimal Networking •• 1980 to 2000 (Network Architecture1980 to 2000 (Network Architecture –– Fluid InformationFluid Information):): “Small is Beautiful” – Evolution of Networking (Ethernet, Token-Ring, and TCP/IP: ‘75 – Vint Cerf & Robert Kahn ), PCs, Web1.0: ‘92-’94 & Mobile Phones 102 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• 2000 to 2020+ (Intelligent Systems2000 to 2020+ (Intelligent Systems –– Cellular KnowledgeCellular Knowledge):): “Smart Solutions”- Web2.0, Social Media, Smart Phones & Intelligent Apps. •• Summary:Summary: The Evolution of ICT mirrors the Evolution of the Physical Universe, DNA/RNA Bio-Architecture, Intelligent Organisms & Life.
  • 103. Ages of Computing, Networking & Intelligence:Ages of Computing, Networking & Intelligence: 19601960 -- 21stC21stC 103 ** “Intelligent Cyber Surveillance” ** - AI Video Analytics & Biometrics - Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference