Failed: Surveillance Tech Predictions

Author: John Honovich, Published on Jun 08, 2013

Days before 9/11, MIT's Technology Review released a tour de force review of surveillance technologies that would soon change the world. Now, nearly a dozen years later, nearly none of them are reality. In this note, we examine these projections.

Their warning is especially ominous:

"Many observers argue it’s no longer a question of whether ubiquitous surveillance will be applied, but under what guidelines it will operate-and to what end."

And with the recent uproar over the NSA and Prism, ubiquitous Internet surveillance is certainly a risk but in the physical world, we are still far from it. Here is a recap and commentary of the claims MIT TR made in 2011:

  • "The job of spotting suspicious people and behavior in this stream of electronic imagery is becoming automatic, with computers programmed with special algorithms for matching video pixel patterns to stored patterns associated with criminals or criminal actions-and the machines themselves passing initial judgment on whether a behavior is normal." Remains science fiction, or BRS Labs claims.
  • "Identifying specific human beings by measuring the color spectrum emitted by their skin." Science fiction.
  • "Automatically measure such characteristics as leg length and waist width to provide ... 'the measurements you give to a tailor.' The idea here, he says, is that those numbers should be able to serve as a kind of body fingerprint for identifying specific individuals." Science fiction.
  • "Developing sensor-riddled “smart floors” that can identify people by the “force profiles” of their walking feet." Science fiction.
  • "An antiterrorist technique that uses a special camera to identify individuals from a hundred meters off by the patterns of color, striation and speckles in their irises." There is Sarnoff's Iris or the move but that's a far simpler and more limited implementation.
  • "Record customers’ facial expressions and eye movements, tracking the effectiveness of in-store promotions." There are some tracking based on movement but little more sophisticated than that.
  • "System detects and tracks both invariant aspects of a face, such as the distance between the eyes, and transient ones, like skin furrows and smile wrinkles. This raw data is then reclassified as representing elemental actions of the face ... Many facial expressions reflect human emotions, such as fear, happiness or rage, which, in turn, often serve as visible signs of intentions." Science fiction.
  • "Automatically scan collective human activity for signs of anything from heart-attack-inducing Type-A behavior to sexual harassment to daydreaming at the wheel to homicidal rage." Science fiction.

It says quite a lot that a prestigious, respected publication could be that dramatically off, even given a decade for their projections to come through. 

The theme in these claims was summarized in the article as the “goal of developing computer systems that can detect human activity, recognize the people involved, understand their behavior, and respond appropriately.” While we have some basic video analytics, like tripwire detection, nearly none of this goal is close to being met even now.

Computer vision problems are incredibly hard. Even with ~8 generations of Moore's law, and computing power 2 orders of magnitude greater than a decade ago, they remain hard, and mostly out of reach. This will change over time (it remains the 'next big thing') but we have clearly and vastly underestimated the difficulty of delivering production physical surveillance systems.

Despite this, the ACLU warned then, in 2001, "The technology is developing at the speed of light." More like diamonds.

Comments (1): PRO Members only. Login. or Join.

Most Recent Industry Reports

Everbridge Mass Notification Service Examined on Mar 24, 2017
Everbridge is expanding in the security space. In January 2017 Everbridge acquired PSIM platform IDV, and have also begun integrating with other...
Hikvision Removing Auto 'Phone Home' on Mar 24, 2017
Facing pressure over their cameras auto phoning home and their Chinese government ownership, Hikvision has begun quietly removing automatic...
Axis Camera Vulnerabilities From Google Researcher Analyzed on Mar 23, 2017
A Google security researcher has reported 6 vulnerabilities for Axis cameras, affecting multiple models and firmware versions. In this report, we...
OpenEye Takes Aim At Exacq on Mar 23, 2017
First Milestone targeted Exacq with a takeover offer, and now OpenEye is gunning for them with an offer to swap out Exacq for their cloud-managed...
Lock Keyways For Access Control Guide on Mar 23, 2017
Lock keyways can be the difference between a lock working or not. Understanding keyways is important for access control. Indeed, a member recently...
Broken Browser Support for Video Surveillance on Mar 22, 2017
Modern web browsers have left the security industry behind. Current Chrome, Firefox, and Microsoft Edge browsers do not support NPAPI plugins,...
ADI Favorability Results on Mar 22, 2017
150 North American integrators provided feedback on 6 distributors, and why they do (or do not do) business with ADI. ADI is clearly a big name in...
1 Million Dahua Devices Exposed To Backdoor on Mar 22, 2017
Statistics show that 1 million Dahua devices are publicly exposed and vulnerable to the Dahua backdoor. Despite this, Dahua has downplayed the...
Hikvision Hires Crisis Communication Writer on Mar 21, 2017
Hikvision has hired a crisis communication writer as the company ramps up its efforts to deal with the 'crisis' it feels it is facing. 'Crisis...
Glass Break Sensor Tutorial on Mar 21, 2017
Burglars often break glass windows to get into a house. Using glass break detectors in conjunction with alarm contacts is a good way to protect the...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact