Implementing a Converged Identification, Compliance and Reporting Strategy for Gaming Environments The Technologies and Considerations at Play Gaming Security Professionals of Canada Vancouver, British Columbia June 2012 Overview • • • • • • • • • • • • • Information and Today’s Security & Surveillance Concerns A Day in the Life of a Casino Layers of Security Licence Plate Recognition / ID Recognition / Reporting Challenges and Obstacles of Information Report Automation in the Gaming Environment Considerations for Reporting Personal Information Protection AML Reporting, Self Exclusion and Investigations Intelligent Interfaces, Security, Notification, Alerting, Best Practices Business Intelligence Tracking Outcomes Reporting – Results/Conclusions Information - What's Going on! • • • • The roles of Surveillance, Security, Compliance, and Risk Management in Customer Assistance Logs the modern gamingDaily environment are Dispatches complex and variedExclusion enforcement Exclusion management Audits The challenge is toGame provide a high level Game Protection Reports of protection to theIncident assets and Lost and Found Patrols employees of the casino in a busy Reports public environmentSubject information Subject profiling and management Subject manage Surveillance In order to control and the Trespasses associated risks, we have to have Visitor Management effective tools to doInvestigations the job! The primary tool of Surveillance , Security and Risk Management is Information! 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 Customer Assistance Investigations Visitor Management Trespasses Subject Surveillance Subject profiling and management Subject information Reports Lost and Found Patrols Today’s Security & Surveillance Concerns • Volume of Data » Cameras are installed everywhere but who is watching • Large Groups of Undesirables » To many faces to remember » Multi-location environments (subjects can move from location to location) • After the Fact (Post Event) » Need an easier way to search if individuals were in the building post event » Requirement to add individuals to an undesirables list • Lack of Available Manpower » Budget cuts » Doing more with less » Increased work loads on security/surveillance operations The Consequence of Information • In today’s Gaming environments, the sheer volume of people in contrast to available security & surveillance resources poses unique issues: • • Stand alone video is no longer the main viable basis for action Communication has increased between the various departments in casinos but there is still a time lag and/or disconnect Gaming regulations are ever tightening with higher expectations put on operators Post event analysis is often too late to reduce loses via theft, trespass, self exclusion or criminal activity Gaming facilities need tools to be pro-active and prevent issues before they happen • • • A Day in the Life of a Casino • • • • • • • • • • Distraction / Collusion Violence Criminal Activity / Money Laundering Harassment Theft (Internal / External) Fraud / Cheating Slot Investigations, Audits Counterfeits (Tokens, Currency, Credit) Trespass Management / Ban Re-entry Player / Dealer Tracking (Reviews and Audits) “I’m Positive We’ve Got A File On That Guy” “It’s in here somewhere . . .” “ Or is it in one of these boxes? ” “ And I’m sure his picture is here somewhere?! And where is the report ? ” Which scenario have you been faced with? Layers of Security and Finding “that” Guy • Breaking down the Gaming facility into logical layers based on location based subject identification provides: • Opportunity for better identification and associated best practices » Trespass/self exclusion management, under age enforcement • Risk and harm reduction by providing choke points for matching and identification » Validation (watch list), authentication (valid ID), Verification (under age), Anti Money Laundering, Fraud • Best use of manned and unmanned space » Exterior, interior What are Logical Available Pro Active Layers • Licence Plate Recognition • ID Recognition • Reporting License Plate Recognition (ANPR, LPR) • The intent of License Plate Recognition is to provide fully integrated recognition technology for aiding in reading, logging and identifying vehicles • Additionally LPR systems should allow for management of selected hotlist vehicles to issue automatic alerts when a registered vehicle enters or leaves a physical location • Integrated Patron linkages between persons of interest, vehicles, events (trespass, self exclusion, etc.), ID Today’s Edge LPR Camera Features • • • • • • • • • • Perfect read rate performance is around 90+% Internal 1024x768 high resolution LPR context camera Internal standard resolution color overview camera (640x480) Pulsed LED IR illuminator for effective use in 0 lux (total darkness) Up to 92-foot (28-meter) range with reflective license plates Embedded processors and LPR engines Reads up to 225 km/h (140MPH) Pan-tilt mount/Magnetic mount Tamper resistant with impact-proof capabilities Waterproof to IP67, -40C to 50C operating temperature ranges Dedicated LPR Solutions LPR Server IP LPR Cameras Alert/Reporting Clients Network • Alerts against enrolled license plates in Patron Management Platform • Unlimited Vehicle/Plate Support • Unlimited Subject Support • Subjects can be related to more than one vehicle • Real-time Alert shows/links live plate, matched plate, vehicle, subject and subject ban status Types of ID • • • • • • • • • • • Drivers Licence Birth Certificate Passport Military Visas Voter ID Employment Identification Old Age Security Alien Registration Permanent Resident Card Government (PIV) ID Standards • International Civil Aviation Organization » ID-1, ID-2, ID-3 and ID-000 • American Association of Motor Vehicle Administrators » North American (US/Canada) Licenses and IDs » Layout as ID-1 • • Federal Information Processing Standards 201 (USA) » » » • Personal Identity Verification (PIV) Physical access to Federally controlled facilities and logical access to Federally controlled information systems Government Programs Smart Cards (integrated circuit card [ICC]) - ID-1, ID-000 » • Barcode, Magnetic Stripe Smart cards can provide identification, authentication, data storage and application processing (Contact, contactless or hybrid formats Near Field Communication (NFC) » » Short-range wireless technologies, typically requiring a distance of 4 cm or less Likely to be used for purchasing from Smart Phones (BlackBerry Bold, Samsung, Google, Nokia) Reading and Authenticating ID (Readers) • Remove problems of human vulnerability to: » Fatigue, Distraction, etc. • Allow more focus on: » Human Behaviour, Facial Matching • Transaction Volumes • Multiple Types of IDs (Passports, Visas, DL, Other) Types of ID Readers • • • • • Low Magnetic Stripe OCR/Bar Code (1D/2D) MRZ (Passport) Smart Card (Chip) All-in-One (Selected Features) Price Performance High Reader Data Extraction • • • • • Reading and identifying document type Collecting information from document Confirming presence of known features Reference-checking information Presenting biometric for comparison ID Acquisition Technology Today • Easy to use • Touch screen integration • Easy operation for non-experienced users • Install on existing PCs and hardware • Limited training required • Full user/password security and Active Directory support Multiple ID Requirements (AML, Investigations) • Enhanced Customer Due Diligence (CDD) • Ability to support multiple IDs per patron • Ability to scan and maintain copies of IDs as required for compliance • Fully Searchable Subject Centric Requirements • At any given time, individual departments need to isolate subject specific events and activities • These subject driven events and activities may need to be expanded as additional information/reporting is required (AML, Visitor Management, Responsible Gaming, License Plate Reporting, etc.) • This provides investigators, analysts and departmental staff the ability to analyze patron behaviour for their specific requirements in isolation or as a whole • Incidents (Including Bans and Suspicious Transaction Reports) • AML Large Cash Transactions, Disbursements • Gaming Disputes • Vehicle, License Plate Information Challenges and Obstacles of Information • • • • • Cost Securing access to data Aggregation of data from different systems Interdepartmental cooperation Compliance Key Benefits of Report Automation in the Gaming Environment • • • • • • • Cost Savings Secure Interdepartmental Information Sharing Total Trespass & Self Exclusion Management Savings & Loss Tracking Risk Management & Analysis Compliance Peace of Mind Information – The Key to Effective Risk Management • • Information management is the key to any efficient security and compliance operation To be effective the information collected must be: » » » » » • Timely Accurate Consistent Rapidly retrievable Subject to logical work flow The need for an efficient integrated system to provide a solution for incident data collection, analysis, management, report generation, distribution and rapid access to subject and incident related data is paramount in modern gaming environments Interdepartmental Information Operational Considerations • • • • • Information originates from a variety of sources, some shared by default, others on an as required or need to know basis Access to specific information / records must be controlled on a departmental, positional and individual level Sensitive information (i.e. internal investigations) must be able to be restricted on a “need to know” basis All data must be subject to a detailed audit procedure Data flow and access must be configurable to comply with internal policies / procedures and best practices Surveillance Security Investigations Daily Logs Incident Reports As required Daily Logs As required As required As required Incident Reports As required As required Subject Information System Daily Logs Incident Reports Considerations for Reporting • Multiple information, reporting and processes: » » » » » » » » » » Personnel Management & Dispatch Detailed Investigations Security Reporting (Under Age, Assault, etc.) Surveillance Reporting (Game/Player/Dealer Audits, etc.) Self Exclusion & Responsible Gaming Reporting Compliance Reporting (AML, etc.) Suspicious Transaction Reporting Patron Trespass Management Patron/Activity Monitoring , Alerting and Custom Notification System Interfacing Personal Information Protection & Electronic Documents Act (PIPEDA) & Privacy • The use of personal information in Canadian commercial activities is protected by PIPEDA, or by substantially similar provincial legislation. • You have to inform individuals concerning the collection of personal information about them. However, you do not have to inform individuals when you include personal information about them in any of the reports that you are required to make to FINTRAC. • How organizations should collect, use and disclose personal information. They also address an individual's right to access his/her personal information and have it amended for commercial purposes. Accountability, Identifying Use, Consent , Limiting Collection, Limiting Use, Disclosure and Retention, Accuracy, Safeguarding Patron Information, Openness, Patron Access AML Reporting (Canada as an Example) • Large Cash Transactions (LCTs) must be reported to Canada's Financial Transactions and Reports Analysis Centre (FINTRAC). • FINTRAC receives, analyzes, assesses and discloses financial intelligence on suspected money laundering, terrorist financing, and threats to the security of Canada. The Centre is an integral part of our country's commitment to the fight against money laundering and terrorist activity financing. • Canadian businesses must report LCTs to FINTRAC within 15 days of the transaction. An LCT is defined as one or more transactions, received from a single party, and totalling $10,000 or more. AML Expanding Reporting Requirements • Globally, reporting requirements year over year are increasing and becoming more granular » » » » Full Time Compliance; Expanded reporting requirements; Expanded record keeping requirements; Expanded client identification (ID) requirements; • Moving towards the need for self-assessment of risk and mitigation AML Expanded Reporting Requirements • Receipt of Funds Records must be completed for every transaction; • Suspicious ATTEMPTED transactions must be reported. • You must not “tip off” the individual that you have, or intend to file, a report AML Expanded Record Keeping • Additional information must be kept: » Large Cash Transactions » Receipt of Funds Records » Client Information Records » Suspicious Transaction Records AML Expanded Record Keeping • Detailed individual information must now be obtained and kept on file; • Detailed account identification must be obtained and kept on file; • All reports must be secured, in electronic or hard copy, for X years; • If requested by AML agency– all records must be produced within X days. AML ID Requirements • Casinos must : • Verify client ID, date of birth, and occupation; • Confirm the existence of the entity they represent; • Attempt to collect identification and record findings; • If suspicious, report to AML Agency (AUSTRAC, FINTRAC, FIU, etc.) AML Third Party ID Requirements • If the client is not present, you must use a third party or entity to identify clients • Existence of third party must also be confirmed • Question of third party involvement in transaction must be asked of individual • Third parties defined by AML entities as someone issuing instructions AML Self-Assessment of Risk • This is a new requirement of compliance • Engaging senior management in the detection and deterrence of money laundering and terrorist financing • Built on a Risk-Based Approach • Risk assessment/mitigation of your business • Patron screening • Ongoing monitoring of higher risk transactions AML Supported Transactions • Buy-Ins - cash paid by the subject to the FINTRAC reporting entity • Foreign Exchange - cash changed from one currency to another by the subject • Deposits - cash deposited into the subject's account • Disbursement - cash or merchandise paid to the subject by the FINTRAC reporting entity Investigations & Self Exclusion • • • • • Link investigations to people, places, vehicles, etc. Drilldown to find historical information on individuals involved. Collect images, videos, word documents, emails, etc. in a single case Track Saving & Losses for each investigation Collect additional officers supplemental information Intelligent Data Interfaces (IT requirements) • Support for multiple Interfaces including PeopleSoft, Dacom, Bally’s, etc. • Business and importer workflow logic built in and configurable » i.e. Join or separate first and last name, remove spaces in names, clean-up data between systems • Configured for scheduled directory scans/imports for data automatic acquisition and updates Enhanced Security & Privacy • • • • • Encrypt data at rest, in transit and at field level for ultimate protection Document assignment at the user and department level Ability to make confidential to specific users, provide a high level of document security and protection Complex Permissions to control access to information Property, Department and role based security levels Notifications • Alert key individuals as activities happen • Keep information flowing with “realtime” updates • Multiple Notifications Type (Alert, email, etc.) • Send notifications to blackberry, iPhone and PDA’s • Used to integrate into 3rd party systems (Access Control, Alarm Management, etc) Integrated Alerting with open Architectures • Manage multiple system alerts • CMS Player Card Insertions • Escalation of alerts into security dispatches, investigations , etc. • Outbound notifications to 3rd Party Systems (HR, Access Control, CMS, etc.) Incident Reporting External System Alerts iTrak Platform Daily Activity Management Dispatching Best Practices (SOP, Rules of the Game, etc.) • Departmental specific documentation needs to be maintained including: • Standard operating procedures • Rules of the game • Compliance requirements Overlay Business Intelligence • BI delivers a unique approach to interactive data visualization. Using advanced link analysis - complemented by charts, timelines and other views - investigative analysts can discover non-obvious relationships and significant insights within their data more quickly than with other data visualization or business intelligence technology. • It allows analysts to easily combine disparate data sources and explore multiple visualizations in a single integrated workspace. • Connect to data for analysis, visualize hidden insights across disparate data, and share analysis results through collaboration. • Facebook, LinkedIn, etc. Tracking Outcomes Actions Taken • Integrated Outcomes can be documented • Multiple Entries • Denied Paid Outs • Trespass • Under Age Refusals • Vehicle Towing • Incident Reporting • Flag for follow-up actions Reporting – Results/Conclusions • Efficiency » Centralized shared information enhances productivity, allowing staff to work more effectively • Communication Among Groups, Departments And Agencies » Security, Surveillance, Risk Management, Legal, Health & Safety, Human Resources and Outside Agencies • Best Practices » Consistent documentation across departments ensures everyone is on the same page, avoiding conflicting reports on the same incident • Liability » Reduction in exposure » Solid trial / legal documentation • Reduction In Costs » Paper, storage, faxing, management • Recovery » Civil recovery and restitution » Tangible reportable savings and losses for budgeting purposes and action Questions & Answers James Moore – iView Systems jmoore@iviewsystems.com 905 829-2500 / 1-866-705-9671