Base Protection Lab (BPL) Presentation to BMVA Symposium on Security and surveillance: performance evaluation ONR Program Officer: William “Kip” Krebs, 703-696-2575, william.krebs@navy.mil Alternate POC: Annetta Burger 703-696-1330, annetta.burger.ctr@navy.mil December 12, 2007 Objectives • Conduct basic research to provide more open public access to recreational and other non-restricted facilities on military bases and to improve the overall base safety and security utilizing advanced video and signal based surveillance. • Create test bed in Hawaii to evaluate whether novel sensors (video cameras, radio frequency identification, seismic, LIDAR, microwave, and infrared sensors) in combination with behavior analysis software can identify patterns of behavior. Page 2 PMRF BPL System Diagram PMRF Base Protection Laboratory (PBPL) Data Collection (Integrated Sensor Systems) RFID MW / IR Lidar Seismic Video Textual Others Alert Delivery & Situation Data Development Platform Sensor Data Links (Wireless) Sensor Data Processing Data Storage & Archiving Simulation & Playback Behavioral Analysis Middleware Remote Users and Developers: – SAIC Kauai – SAIC Maui – SAIC Arlington – UH Manoa – Novasol Oahu – Object Video – MHPCC Maui – Others Firewall Internet External (Wide Area) Network Base Security Data Fusion & Tracking - Automated Behavior Analysis (ABA) - Statistical Anomaly Detection (SAD) - Agent Based Modeling (ABM) Alert Generation Production System – Data Analysis and Management Page 3 Current BPL Sensor Configuration 22°00’51.66”N 159°46’56.28”W • Outdoor Test Bed – 4.5km by 1km area – Linked by wireless communications • Open Architecture • Hardware Configuration – Mobile sensors enable optimum sensor coverage for data collection exercises • Software Configuration – modular, flexible and reusable – Object-oriented software – Based on Java Jini architecture – Communication through a “blackboard” Page 4 Sensors RFID System – UltraWideBand 2 LIDAR motion trackers 5 License Plate Readers 8 Low Light Cameras 4 Video Cameras Seismic Array (2000 feet) 2 MW/IR Fence Posts (500 feet fence) Page 5 Data Collection • Data Collection – Scripted Scenarios for Abnormal Activity • 4 Days data of confederates – Normal Data • 2 Days data of base personnel and recreational visitors • Sensor Collection Results – 12 video cameras with advanced video analytics software • detected and tracked objects of interest without problems – LIDAR – converted for intrusion detection and alarm sensor • Detected and provided accurate alerts – Microwave and Infrared Detection Fences • 100% detection and 0% false alarms for motion detection – RFID • Limited coverage to be improved with tuning antennas and replacing fixed sensors with mobile units – Seismic • No data available due to compatibility issues • Sensors should be available Jan08 Page 6 Proposed RFID Coverage 2D coverage (coordinates) Seen by three or more receivers Provides (x, y) with 3m or better accuracy 1D coverage (a point between two sensors) Seen by two receivers Provides a point (xΣ , yΣ) on a line between the two sensors. 0D coverage (presence in an area) Seen by one receiver Provides the coordinates of the sensor (xS , yS) that sees the entity No detection (no information) Seen by none of the receivers Page 7 RFID Track Page 8 Video Tracks Page 9 LIDAR Sensor 1000 feet Page 10 LIDAR Tracks map overlay System Administrator Display - pedestrian and vehicle traffic Page 11 Challenges • Develop a reliable, plug-play, robust test bed to meet researcher requirements. • Develop common standard data sets that vary in difficulty that can be used to assess algorithm performance. • Develop valid and reliable metrics to evaluate and compare behavioral algorithm performance. Page 12 Future Plans • Create common data sets and metrics. • Distribute data sets to research community to test whether behavioral algorithms can detect “normal” and “anomalous” behavior for the prediction of threats and advance warning using a variety of sensors. • Test and evaluate sensor options to optimize early detection of threat behavior and reduce security manpower requirements. Page 13