Video surveillance and counterterrorism: the application of suspicious activity recognition in visual surveillance systems to counterterrorism

  title={Video surveillance and counterterrorism: the application of suspicious activity recognition in visual surveillance systems to counterterrorism},
  author={Nick A. Mould and James L. Regens and Carl Jensen and David N. Edger},
  journal={Journal of Policing, Intelligence and Counter Terrorism},
  pages={151 - 175}
Video surveillance systems have become a key element in efforts by security services, the military and law enforcement to counterterrorism since the attacks of 11 September 2001. Primarily involving closed circuit television, collected using a variety of hardware platforms and software algorithms, systematic imagery analysis has typically been used as a tool for post-event forensics to identify tactics, techniques and perpetrators of terrorist attacks. Advanced video surveillance applied to… 
Anomalous Event Detection Methodologies for Surveillance Application
An attempt has been made to provide an insight into some of the prominent approaches employed by researchers to solve issues of unusual activity detection mechanism for surveillance application with a hope that it will benefit researchers towards developing a better surveillance system.
Anomalous Event Detection Methodologies for Surveillance Application: An Insight
An attempt has been made to provide an insight into some of the prominent approaches employed by researchers to solve unusual activity detection issues with a hope that it will benefit researchers towards developing a better surveillance system.
Surveillance: Technologies, Techniques and Ramifications
Since the 1990s there has been a rapid growth in the proliferation of an increasingly diverse range of technologies which are often primarily intended to monitor human activity, and determine (or
Applications of Generative Adversarial Networks in Anomaly Detection: A Systematic Literature Review
GANs are used in anomaly detection to address the problem of insufficient amount of data for the anomalous behaviour, either through data augmentation or representation learning, and the most commonly used GAN architectures are DCGANs, standard GANs, and cGANs.
PROTOCOL: Police programs that seek to increase community connectedness for reducing violent extremism behaviour, attitudes and beliefs
Community engagement and connectedness are identified as potential mitigating factors for those at risk of engaging in violent extremism. Police have a critical role in promoting social inclusion and
Social-BiGAT: Multimodal Trajectory Forecasting using Bicycle-GAN and Graph Attention Networks
A graph-based generative adversarial network that generates realistic, multimodal trajectory predictions by better modelling the social interactions of pedestrians in a scene and achieves state-of-the-art performance comparing it to several baselines on existing trajectory forecasting benchmarks.
SoPhie: An Attentive GAN for Predicting Paths Compliant to Social and Physical Constraints
SoPhie is presented; an interpretable framework based on Generative Adversarial Network (GAN), which leverages two sources of information, the path history of all the agents in a scene, and the scene context information, using images of the scene.
Augmenting human cognition to enhance strategic, operational, and tactical intelligence
  • J. L. Regens
  • Computer Science
    Intelligence and National Security
  • 2019
A technology-based approach for augmenting human cognition by leveraging high-performance computing and artificial intelligence applications to enhance the intelligence enterprise’s capability to identify, synthesize, and act on the key intelligence-relevant information elements embedded in those data.


Stopped Object Detection by Learning Foreground Model in Videos
This work introduces a model-based framework to segment static foreground objects against moving foreground objects in single view sequences taken from stationary cameras and shows the accuracy of the proposed stopped object detection approach.
Video Analytics for Surveillance: Theory and Practice [From the Guest Editors]
Video analytics, loosely defined as autonomous understanding of events occurring in a scene monitored by multiple video cameras, has been rapidly evolving in the last two decades. Despite this
Automated Real-Time Detection of Potentially Suspicious Behavior in Public Transport Areas
A framework that processes raw video data received from a fixed color camera installed at a particular location, which makes real-time inferences about the observed activities and obtains 3-D object-level information by detecting and tracking people and luggage in the scene using a real- time blob matching technique.
Video Anomaly Identification
A family of unsupervised approaches to video anomaly detection based on statistical activity analysis is described, which are robust to clutter arising from multiple activities and contamination arising from poor background subtraction or occlusions.
Imagery Library for Intelligent Detection Systems (i-LIDS); A Standard for Testing Video Based Detection Systems
  • iMars Team
  • Computer Science
    Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology
  • 2006
The Home Office Scientific Development Branch (HOSDB) evaluates intelligent CCTV and video-based detection systems (VBDS) for security and policing purposes and produces a video test library, i-LIDS (imagery library for intelligent detection systems), a sample of which was released on DVD in 2005.
Detection of Emergency Events in Crowded Scenes
The results on normal real data show the effectiveness in modelling the more diverse behaviour present in normal crowds, and improve the previous work in the detection of anomalies in pedestrian data.
Robust Real-Time Unusual Event Detection using Multiple Fixed-Location Monitors
A novel algorithm for detection of certain types of unusual events based on multiple local monitors which collect low-level statistics that is robust and works well in crowded scenes where tracking-based algorithms are likely to fail.
Abnormal crowd behavior detection using social force model
A novel method to detect and localize abnormal behaviors in crowd videos using Social Force model and it is shown that the social force approach outperforms similar approaches based on pure optical flow.
Dynamic human crowd modeling and its application to anomalous events detcetion
Optical flows are first estimated and then used for a clue to cluster human crowds into groups in unsupervised manner using the proposed clustering method and their behaviors with attributes, orientation, position and crowd size are characterized by a model of force field.
The Need for Closed Circuit Television in Mass Transit Systems
Closed circuit television video (CCTV) surveillance systems need to be introduced or enhanced in the public areas within United States' mass transit systems. London's extensive system was used very