Failed: Surveillance Tech Predictions

Author: John Honovich, Published on Jun 08, 2013

Days before 9/11, MIT's Technology Review released a tour de force review of surveillance technologies that would soon change the world. Now, nearly a dozen years later, nearly none of them are reality. In this note, we examine these projections.

Their warning is especially ominous:

"Many observers argue it’s no longer a question of whether ubiquitous surveillance will be applied, but under what guidelines it will operate-and to what end."

And with the recent uproar over the NSA and Prism, ubiquitous Internet surveillance is certainly a risk but in the physical world, we are still far from it. Here is a recap and commentary of the claims MIT TR made in 2011:

  • "The job of spotting suspicious people and behavior in this stream of electronic imagery is becoming automatic, with computers programmed with special algorithms for matching video pixel patterns to stored patterns associated with criminals or criminal actions-and the machines themselves passing initial judgment on whether a behavior is normal." Remains science fiction, or BRS Labs claims.
  • "Identifying specific human beings by measuring the color spectrum emitted by their skin." Science fiction.
  • "Automatically measure such characteristics as leg length and waist width to provide ... 'the measurements you give to a tailor.' The idea here, he says, is that those numbers should be able to serve as a kind of body fingerprint for identifying specific individuals." Science fiction.
  • "Developing sensor-riddled “smart floors” that can identify people by the “force profiles” of their walking feet." Science fiction.
  • "An antiterrorist technique that uses a special camera to identify individuals from a hundred meters off by the patterns of color, striation and speckles in their irises." There is Sarnoff's Iris or the move but that's a far simpler and more limited implementation.
  • "Record customers’ facial expressions and eye movements, tracking the effectiveness of in-store promotions." There are some tracking based on movement but little more sophisticated than that.
  • "System detects and tracks both invariant aspects of a face, such as the distance between the eyes, and transient ones, like skin furrows and smile wrinkles. This raw data is then reclassified as representing elemental actions of the face ... Many facial expressions reflect human emotions, such as fear, happiness or rage, which, in turn, often serve as visible signs of intentions." Science fiction.
  • "Automatically scan collective human activity for signs of anything from heart-attack-inducing Type-A behavior to sexual harassment to daydreaming at the wheel to homicidal rage." Science fiction.

It says quite a lot that a prestigious, respected publication could be that dramatically off, even given a decade for their projections to come through. 

The theme in these claims was summarized in the article as the “goal of developing computer systems that can detect human activity, recognize the people involved, understand their behavior, and respond appropriately.” While we have some basic video analytics, like tripwire detection, nearly none of this goal is close to being met even now.

Computer vision problems are incredibly hard. Even with ~8 generations of Moore's law, and computing power 2 orders of magnitude greater than a decade ago, they remain hard, and mostly out of reach. This will change over time (it remains the 'next big thing') but we have clearly and vastly underestimated the difficulty of delivering production physical surveillance systems.

Despite this, the ACLU warned then, in 2001, "The technology is developing at the speed of light." More like diamonds.

Comments (0) : PRO Members only. Login. or Join.

Most Recent Industry Reports

IFSEC Show Report - Live From London on Jun 19, 2018
IPVM is live from London reporting on the IFSEC show. The Chinese have taken over the UK, centered on Hikvision, flanked by Dahua, Huawei and a...
Axis Guardian - Cloud VMS for Alarm Companies on Jun 19, 2018
Axis has struggled to deliver a cloud-based managed service video platform. Video service providers have utilized AVHS for over a decade, and have...
IPVM Vulnerability Scanner Released on Jun 18, 2018
IPVM is proud to announce video surveillance's first and only cybersecurity vulnerability scanner. This tool allows quickly and simply...
Hikvision Corrects False Cybersecurity Announcement on Jun 18, 2018
Hikvision has corrected a false cybersecurity announcement that claimed a British government-sponsored program endorsed the cybersecurity of...
July 2018 IP Networking Course on Jun 16, 2018
The last chance to save $50 on registration is this Thursday, June 21st. Register now and save. This is the only networking course designed...
The Dumb Ones: PSA's Bozeman On Cybersecurity on Jun 15, 2018
The smart ones are the hundred people who flew to Denver and spent $500+ on a 1.5-day conference featuring Dahua as a 'cyber responsible partner',...
Amazon Ring Launches $10 Monthly Professional Alarm Monitoring on Jun 15, 2018
Amazon's Ring has announced an alarm system with 24/7 professional alarm monitoring for $10 per month, a fraction of the $30+ per month traditional...
Axis Releases First New Access Controller In 5 Years (A1601) on Jun 15, 2018
It has been 5 years since Axis 2013 entry in the physical access control market, with the A1001 (IPVM test). Now, Axis has released its second...
Hikvision 12MP Fisheye Camera Tested (DS-2CD63C2F-IV) on Jun 14, 2018
Hikvision's DS-2CD63C2F-IV is their flagship panoramic camera, with a 12MP imager, 15m integrated IR, smart codec, and more. We tested the 63C2 in...
Four Major Outdoor Camera Install Problems on Jun 14, 2018
Over 140 integrators told us the top four camera installation mistakes that lead to unexpected problems and failures. Their comments often...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact