Security Business

MAR 2014

Find news and information for the executive corporate security director, CSO, facility manager and assets protection manager on issues of policy, products, incidents, risk management, threat assessments and preparedness.

Issue link:

Contents of this Issue


Page 19 of 117

18 | SD&I | March 2014 wo articles about advances in consum- er-focused technologies have caught my eye recently. While neither was written with the theme of physical security, I neverthe- less saw their topics as potential game chang- ers in our market: Wearable cameras and soft- ware that tracks facial expressions to predict future behavior. Wearable Cameras The Wall Street Journal recently profiled two photographic cameras — the Narrative Clip ( and the Autographer ( — that capture a stream of images while being worn around the neck. The $279 Narrative Clip is a 5 MP camera which takes 2 geo-tagged photos per minute; has GPS, accelerometer and magnetometer sensors, USB connectivity, 8 GB of memory and two days of battery life. Its current capa- bility is two images per minute. The $399 Autographer is also a 5 MP camera with fisheye lens, accelerometer, compass and ther- mometer sensors, USB and Bluetooth connec- tivity, mobile app and 10 hours of battery life. The WSJ article focused on issues of privacy and proper etiquette, such as actually inform- ing people they are being photographed; how- ever, in security and adjacent applications, pendant or other semi-obvious devices have real potential, particularly in customer-facing situations, such as banking and retail — where a closer view or better camera angle could provide a better image than surveillance video. With increased storage and battery life, video versions of these devices are already popping up — mostly targeted at the law enforcement community, from vendors such as Digital Ally (, Vievu ( and others. Miniaturization, low cost, compact storage, and battery life are all unmistakable trends which will affect the way we deploy and use image technology, including thermal. If the hype around wearable technology at the Consumer Electronics Show is to be believed, surely security will find a way to use it. Security Meets Social Science The other piece I found interesting was pub- lished in the January issue of MIT's Technology Review. It describes an algorithm developed by a Massachusetts startup company named Affectiva ( that tracks facial expres- sions — raised eyebrows, frowns, smiles, etc. — and processes the data to predict future behavior. The product, called Affdex, is being developed as a "neuromarketing" tool, ie. a marketing and sales prediction tool. Security applications may be ripe for this technology. Could this potentially detect and process expressions of stress, fear or mal- intent? Could it predict shoplifting behavior, pre-robbery jitters, credit card fraud or an impending terror event? Would this be of use airport checkpoints, stadiums and arenas, or other high-security facilities? Behavior and behavioral analytics remains a significant area for advancement in predictive or proactive security. This particular technol- ogy works with standard webcams and an SDK is available for custom applications, so I sus- pect someone will investigate it for suitability in security event prediction. Combine develop- ments such as this in the behavioral arena with continuing advances in facial recognition and big data, the result could be very powerful predictive and analysis tools. ❚ Ray Coulombe is Founder and Managing Director of and He can be reached at, through LinkedIn, or on Twitter @RayCoulombe. T TECH TRENDS By Ray Coulombe "Behavior and behavioral ana- lytics remains a signifcant area for advancement in predictive or proactive secu- rity. This particu- lar technology works with stan- dard webcams and an SDK is available for custom applica- tions." Consumer Market Guinea Pigs Advances in consumer-based technologies offer a glimpse at security's future SDI_18-19_0314 Coulombe.indd 18 3/5/14 1:26 PM

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Business - MAR 2014