Can Remote Video Monitoring be Crowdsourced?

Author: John Honovich, Published on Oct 06, 2009

Crowdsourcing - the process of outsourcing tasks to the general public using the Internet to distribute work - is a hot trend. However will it work and can it compete with traditional remote monitoring providers?

A new entrant is proposing this approach for remote video surveillance monitoring. The company, UK based InternetEyes, plans to have volunteers remotely monitor video surveillance cameras over the Internet. Key elements of the plan include:

  • Monitors will be motivated by monthly cash prizes for the person who catches the most criminals (currently planned for $1,600 USD).
  • When a monitor finds a suspicious activity, they flag it and that flag goes through their system to end users
  • To minimize privacy concerns, monitors will not be told the locations of the areas they are monitoring (though, of course, it is still possible that some monitors will recognize the locations)
  • To minimze inaccuracy or prejudiced alerts, monitors will be blocked if they submit more than 3 false alerts
  • Customers will be charged 20 GBP/$32 USD. This is presumably per camera though the online documentation I found is not clear on this point.

While this is not the first attempt to do remote monitoring of video surveillance using the public, this is far superior in design to the previous effort. Over the last few years, a group in Texas called BlueServo has run the Texas Border Watch - a set of cameras on the US/Mexico borders streamed over the Internet. In July 2009, it came under significant criticism for high costs and limited results.

Nonetheless, this service will obviously compete with the growing market of proprietary remote video providers from both traditional alarm monitoring companies and new entrants dedicated to video/video analytics.

The more specific and key question is then: Can crowdsourcing remote video monitoring compete with proprietary monitoring?

*************- *** ******* ** *********** ***** ** *** ******* ****** using *** ******** ** ********** **** - ** * *** trend. ******* **** ** **** *** *** ** ******* **** traditional ****** ********** *********?

* *** ******* ** ********* **** ******** *** ****** ***** surveillance **********. *** *******, ** ***** ************, ***** ** **** ********** ******** ******* ***** ************ ******* **** *** Internet. *** ******** ** *** **** *******:

  • ******** **** ** ********* ** ******* **** ****** *** *** person *** ******* *** **** ********* (********* ******* *** $*,*** USD).
  • **** * ******* ***** * ********** ********, **** **** ** and **** **** **** ******* ***** ****** ** *** *****
  • ** ******** ******* ********, ******** **** *** ** **** *** locations ** *** ***** **** *** ********** (******, ** ******, it ** ***** ******** **** **** ******** **** ********* *** locations)
  • ** ******* ********** ** ********** ******, ******** **** ** ******* if **** ****** **** **** * ***** ******
  • ********* **** ** ******* ** ***/$** ***. **** ** ********** per ****** ****** *** ****** ************* * ***** ** *** clear ** **** *****.

***** **** ** *** *** ***** ******* ** ** ****** monitoring ** ***** ************ ***** *** ******, **** ** *** superior ** ****** ** *** ******** ******. **** *** **** few *****, * ***** ** ***** ****** ********* *** *** the***** ****** ***** - * *** ** ******* ** *** **/****** ******* ******** over *** ********. ** **** ****, ** **** ***** ******************** *** **** ***** *** ******* *******.

***********, **** ******* **** ********* ******* **** *** ******* ****** of *********** ****** ***** ********* **** **** *********** ***** ********** companies *** *** ******** ********* ** *****/***** *********.

*** **** ******** *** *** ******** ** ****: *** ************* remote ***** ********** ******* **** *********** **********?

[***************]

Advantages ** *************

************* *** ****. **** ** ****, ** ** ******* ** can ******* **** ** ********* *** **** ***** ****** ***** that *** ** ******* **** ***** ********.

*********, *** ****** ******* ****** ************ ** ********* * **** example ** *** ********** ** ******. *** **** ***** **** be ******* **** ******** ********, *********** ***** ****/*** ** ********** sections ** **** *******. *******, ** ********** ** ********* **, it ** ****** * **** ********** ** *** **** ******** ** ***** surveillance.

* ****** ******* *************.***, ** ****** ******* **** ******* ******* ********** $** *** for * ****** ****** ** ** * *** ********* **** of ********. **** ** * *** ****, ***** *** *** companies ** ***** ** ********* ******** ***** **** ***** *******.

* *** ********** *** ** ********* **** *** ******* ** this *******:

  • Professionals **** **** ****: Getting true "UI" experts easily costs 10-100 times as much. While this is nowhere near the same quality level as an expert, hearing from an "average user" could still find the most significant issues.
  • Easy ** ******: The reviewer can easily and instantly access the website to review. There' no need for special access or physically mailing information, etc.
  • Privacy *** * *******: The client will likely not be concerned about the reviewer disclosing the website or the information on it. Generally, there's not much secret or private information on commercial sites.
  • Infrequent ******* ******: This only needs to be done once in a while. Having a few people do a review (for about $100) may be good enough for a year or two. If companies needed to do this continuously, they would be more attracted to screening and hiring specific contactors.
  • Cannot ** *********: There's no easy way to automate usability for a computer to perform. As such, this service cannot be easily replaced by technology.
********* ***** ********** ************* *** ****.

Key ******** ** ****** ***** **********

***** **** **********, ** *** *** *** ****** ***** ********** will **** ********** **** **** ** ***** *:
  • Labor **** ***** ****: The only crowdsourcing advantage that remote monitoring clearly meets, it is likely that crowdsourcing remote monitors can be significantly less than on-site guards. This could be accomplished by paying people from lower income countries or those that are retired or disabled.
  • Very ********* ** ******: Accessing video surveillance feeds will be extremely difficult. Those customers using remote video monitoring today frequently set up a VPN with a trusted, bonded service provider. This is technically complex and does not scale to support widespread Internet distribution. Unlike telling someone to go to a website, remotely accessing a company's surveillance video is almost impossible without technical changes.
  • Privacy ** * ******* *** **** *** ***** *********: Even if a clever scheme can be devised to hide or randomize which monitors see what video, lots of security managers will remain concerned. If the crowdsourced remote video monitoring implements background checks and sophisticated tracking of who is monitoring, they may be able to allay this somewhat.
  • Continuous ******* ******: Most security managers will want such service on an ongoing basis. As an ongoing service, this will increase value of proprietary service.
  • Video ********* **** ****** **********: The premise of crowdsourcing video surveillance depends on reducing high manual labor costs. However, as video analytics mature, its use will grow and that will significantly reduce the need for labor. A response infrastructure will still be needed, including reviewing false alerts, etc. However, that can be done for a large number of customers with a small in-house staff that ensures privacy. Even an error prone video analytic based system is likely to be far preferable to having crowds of people watch continuous video.
** ***** * **********, *** ********* ******* ** *********** ***** sourcing *** ****** ** ** (*) *** ********** ** ********* video *** (*) ***** ********* ********* ***** *********.

***** **** ** **** ***** *********** ***** *********, ** ** unlikely ** ** ************ *********** **** *********** ****** ***** ********** services ***** *********.
Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Startup Turing Video Segway-Based Security Robot Profile on Sep 13, 2017
If security robots can not replace guards, perhaps the next best thing is a robot the guard can actually ride.  Turing Video has raised $5...
Alarm.com Vs. Honeywell Total Connect Shootout on Aug 30, 2017
In the smarthome and intrusion market, Alarm.com and Honeywell are two of the biggest names. Both platforms offer remote management of alarms, home...
BBC Featured Deep Learning Face Recognition Analyzed (Digital Barriers) on Aug 30, 2017
The UK's largest broadcaster, BBC, recently featured Digital Barriers (also based in the UK) on a segment highlighting face recognition technology....
Nvidia For Video Surveillance Examined on Aug 23, 2017
Nvidia is making a big push into the security market, claiming more than 50 partners, investing heavily in industry events, positioning their GPUs...
Honeywell Total Connect 2.0 Tested on Aug 22, 2017
Honeywell is one of the biggest brands in security, with Total Connect 2.0 being the company's remote security and smarthome platform. We bought...
IP Camera Specification / RFP Guide 2017 on Aug 14, 2017
RFPs are hard. Do them 'right' and it takes a lot of knowledge and time. Do them 'wrong' and you can be (a) unwittingly locked into a specific...
US Army Bans Chinese DJI Drones on Aug 08, 2017
The US Army has issued a ban on Chinese-made DJI drones. A US Army memo obtained by sUAS News references a classified document from the Army...
Babel Street Global Threat Monitoring Tool Examined on Jul 27, 2017
Intelligence on potential threats and terrorist attacks can often be found online hours, or days, before an actual event, particularly in obscure...
Bosch G-Series Intrusion Tested on Jul 26, 2017
Bosch is one of the biggest names in intrusion, and the company's G-Series panels are their most advanced commercial and high-security panels. But...
Healthy Skepticism for Deep Learning Is Prudent on Jul 26, 2017
The hype for deep learning in video surveillance is accelerating. Between the race to the bottom and dearth of a 'next big thing', certainly pent...

Most Recent Industry Reports

Avigilon 'Blue' Cloud Entry Examined on Sep 19, 2017
Avigilon is moving to the cloud. The company announced their Avigilon Blue platform, designed to be a web-managed surveillance system, utilizing...
HID Buys Mercury Security on Sep 19, 2017
One of the biggest access control deals in years. Mercury Security, the most widely used access hardware OEM, and partner to 20+ manufacturers,...
Hikvision Backdoor Exploit on Sep 18, 2017
Full disclosure to the Hikvision backdoor has been released, allowing easy exploit of vulnerable Hikvision IP cameras. As the researcher, Monte...
Avigilon Touting 'Made In America' on Sep 18, 2017
Canadian manufacturer Avigilon, who completed a US manufacturing facility in 2015, is now running a marketing campaign touting 'Made In America',...
Cloud Guy Prints Book, Misses Irony on Sep 15, 2017
On-premise security systems are dead. But $75 print books are alive and well. Such are the lessons from Brivo's CEO new book "The Five...
Forgotten Password Problem Importance on Sep 15, 2017
Forgotten passwords has become a major industry topic. For example, Hikvision has been emailing admin passwords in plain text until IPVM's...
September IP Networking Course on Sep 14, 2017
LAST Chance - Registration is ending. Register now. This is the only networking course designed specifically for video surveillance professionals...
Hikvision Launching Ezviz Pro on Sep 14, 2017
Hikvision is launching Ezviz Pro. In 2015, Hikvision expanded Ezviz, a direct to consumer offering, to North America. Now, Ezviz 'Pro' is...
Genetec Launches Community Connect Examined on Sep 14, 2017
Genetec has done best in large-scale, enterprise systems and relatively worse in smaller systems such as SMB. Now, Genetec is launching...
Master Keying Tutorial on Sep 14, 2017
Mechanical keys are the most fundamental, albeit unsophisticated, form of access control. Like access control, Master Keying allows large scale use...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact