“Over Watch” Project Project Members: Quinn Calvert, Mike Duong, Chris Kibler Employer: Mr. Buchs 1/16/12 2 Contents Problem Statement .................................................................................................................................... 4 Statement Elaboration: .............................................................................................................................. 4 Statistics .................................................................................................................................................. 4 Existing Approaches .............................................................................................................................. 4 Statement of Purpose ................................................................................................................................ 4 Executive Summary ................................................................................................................................... 5 Performance Benchmarks ........................................................................................................................ 6 MSE Concepts ............................................................................................................................................ 7 Mathematics ............................................................................................................................................ 7 Science .................................................................................................................................................... 7 Engineering ............................................................................................................................................. 7 Expert Input and Needs............................................................................................................................. 9 Past and Present Solutions .................................................................................................................... 10 Passive Infrared (PIR) Motion Sensors ............................................................................................ 10 Closed Circuit Television (CCTV) ...................................................................................................... 10 Glass Break Sensors ........................................................................................................................... 11 Magnetic Contact Sensors .................................................................................................................. 11 Infrared (IR) Camera............................................................................................................................ 12 Patents ................................................................................................................................................... 12 Market Research ...................................................................................................................................... 14 Evaluating the Competition: ................................................................................................................ 14 Users/Buyers: ....................................................................................................................................... 15 The Market: ........................................................................................................................................... 15 Gantt Chart ................................................................................................................................................ 17 3 Problem Statement “According to the annual report by the Boise City Police in 2007, 92% of all burglaries go unsolved throughout the residential U.S. In the past four years, this low identification rate has been due to conventional security system's lack of a tagging method, that is, a way of marking the intruder.” Statement Elaboration: Statistics 2,800,000 break-ins occur in the United States per year (1990-2010) 1-in-5 chance of being broken into per house Only 25% of Urban break-ins are solved 30% of homes have commercial security systems Existing Approaches Essentially, there has not been a product which addresses this problem Closed Circuit Television (CCTV) Systems are currently the primary source of intruder identification. o These lack a sufficiently successful identification rate, as is evident by the percentage of burglaries that go unsolved. The only other security products function are sensors that function Statement of Purpose “Develop a tagging system to mark intruders that is viable for use across the Residential United States.” 4 Executive Summary There have been 2,800,000 break-ins across the U.S. each year for the past twenty years (1990-2010); of these break-ins, more than 90% go unsolved. This low rate of criminal identification can be largely attributed to the lack of a sufficient tagging method – that is, some form of mark or trace (physical or digital) which can be used to bolster identification. That is why we here at HomeNet plan to develop a tagging system to mark intruders which is viable for use across the residential United States. The unique aspect of this problem is that there is virtually no existing documentation of attempted solutions – a promising and cautionary sign. Further research revealed that conventional security systems have a void when it comes to any form of identification improvement, with security cameras being the only product widely used to improve identification. The main issue with cameras is that they are extremely unreliable – one need only to wear a mask and the benefits of a camera are almost entirely mitigated. Initial market research shows that there should be a sizable profit available for an effective solution to this problem, but only if one were to sell to or partner with an existing security provider. This is mainly because the Security Industry relies greatly on established reputation, which current companies like ADT and Brinks embody. As such, the ability of an up-start company attain such a reputation among this market would require a time and capital investment far greater than is generally feasible. 5 Performance Benchmarks The idea is that a set list of topics will be used to measure the performance of the final solution and that these topics should be based upon what is considered important to the solution’s success. The following are the current benchmarks being used by this project: Ease of Use o A quantitative survey of a group who volunteered to test the system might be used to measure this. o A 5-point scale (or similar method) would be used to rate its ease, with 5 being easiest use. o The average score should be above a 4 (or whatever number fits the same meaning). o An additional feedback section may provide suggestions for design problems that need to be addressed. Ease of Installation o Essentially the same method as the ease of use, except it would be a survey of installation crews after a simulated installation. Ease of Mainatainence o Essentially the same method as the ease of use, except it would be a survey of maintainence crews after a simulated maintainence session. Will it damage the residence when in use? o A simple Yes/No check after usage testing Accuaracy o # of successful tags/# of attempted tags Effectiveness of the tag o Depending on the exact tag choice, this may relate to measuring the visability, durability, etc. Improvement in target identification due to the tag o This may be difficult to measure until after it has been implemented o An experiment could be generated to simulate a home break-in, at which point the identification of the tagging device would be compared to that of its closest competitor, the CCTV. o This theoretical experiment would be repeated many times in order to generate a sufficient identification rate. 6 MSE Concepts During the course of this design problem, we will need to research a wide variety of Math, Science, and Engineering (MSE) Concepts related to our envisioned solution. The current concepts are as follows: Mathematics Ballistics/Trajectory o One proposed solution involves the firing of some projectile tag, in such a situation, it would be vital to understand the ballistics and trajectory information behind it. Programming/Computer Science o Currently, all theorized solutions will require some deal of programming to fully realize them. Biometrics o These algorithmic techniques could be used to automatically disable the system for the home owners. o Further understanding may allow for feasible implementation and/or increased identification. Science Chemical and Material Properties o Will be vital in determining what tag type, assuming its physical, is best, as well as what to build the structures out of (essentially the same as Material/Chemical Engineering). Understanding of Light Properties (Especially IR, UV, and Microwave) o Will better allow for utilization of motion sensing and other optic technology. Criminology/Psychology o Would be beneficial to know how the possible intruder’s mind works, as it may give insight into a strategic placement of the solution, once made. Radioactivity o The predictable halflife times of various radioactive isotopes may prove useful in some form. o Otherwise, this subject area purely relates to one proposed solution that involves tracking radioactive tags with a greiger counter. Engineering Structural o On whatever solution we create, it must be housed in some sort of structure that allows it to function while still rendering it protected. 7 o Knowledge of the stuctural aspects of a home may prove necessary in certain solutions, especially when it comes to the possibility of embedding components into the walls. Material/Chemical Engineering o Should we pursue a physical tag, then knowledge of what materials and chemicals that are available to us may prove beneficial. Electrical o This should let us better create a modern system with efficient power designs that accomplishes what we need. Computer o A computerized interface will likely be used with whatever solution we decide upon, allowing the customization of controls for maximum ease of the customer. o It is likely that our solution will contain computerized components and thus it will be necessary to understand the engineering aspects of them. A better understanding of functionality of: o Paintball Guns o Servo Motors o Target Acquisition Systems o Security Sensors o Biodegradable Materials o Cell Networks 8 Expert Input and Needs Throughout the course of this project will be seeking and will need to seek expert input on the multitude of topics that this project will likely cover. Currently: Required Expert Inputs: o Intruder Identification Methods Biometrics Police Methodology o Security Industry Insights o Advanced Sensor Usage/Security System Design o Ballistics/Trajectory Current Expert Input o Vague biometric knowledge The first experts we requested input from replied with automated emails stating we should look at their webpage – which is why the information is vague. o Basic Sensor Understanding Also found from the websites of the contacted organizations This knowledge could use a great deal of improvement. 9 Past and Present Solutions Passive Infrared (PIR) Motion Sensors A device that emits a beam of infrared light to a partnered sensor or sensors, and uses this to monitor temperature. o Some variations will phase across a region to monitor a greater area. o The temperature differentials created by movement across multiple sectors cause the sensor to trigger. The problem is that the device is only a sensor: it detects the intrusion but does not react to it. o If combined with other systems, it can be made more reactive to an intrusion. Our tagging method would not be a replacement, but rather an addition, for a tagging method needs to have a trigger – and a PIR is a highly affective one. Closed Circuit Television (CCTV) o A network of surveillance cameras linked to a central control, usually a DVR or Computer. Most cameras tended to be low resolution and black/white images. Now, trends are changing towards HD color video. o The main issue is the necessity for a human being to review all of the footage surrounding the crime – often multiple times – on a 1:1 relation to actual time. The other defect is the camera’s inability to guarantee a usable image of the intruder. o A tagging method would likely accompany these, but could also replace them. A tagging method should – hopefully – have a better success rate than cameras and cut out or minimize the need to review video footage. 10 Glass Break Sensors A specialized sensor that functions in one of two ways: o It can detect the frequency emitted by glass breaking – such as that of a window – and thus will trigger regardless of location. o It can also function as a device that detects the vibration of glass breaking, but it must be placed on the window/glass. o Some variations of this device are capable of performing both methods simultaneously. The major shortcoming of this device is that it only detects an entry, nothing else. o There is also a good chance of the acoustic sensor triggering incorrectly if a piece of glassware is broken. Once again, this is a sensor – it would likely function in tandem with the tagging method for better results. o A tagging method solves identification, not detection. Magnetic Contact Sensors These sensors are a two part device that attach to a window, door, or drawer so that the contacts touch in the closed position. Thus, when separated, the connection is broken and the sensor triggers. o Can be inverted to trigger once contact is made. The major challenge is incorporating these into the residence while still concealing them. o Theoretically, a burglar who knows the location of these devices could use a magnet to percent the sensor from triggering. As has been said already, this sensor would augment the tagging method and not directly compete with it. o The tagging method would fill a niche that is apparently vacant and would integrate well into current systems with sensors like this – as well as many other sensor types. 11 Infrared (IR) Camera Using an IR filter lenses and IR emitting LEDs, this camera is capable of recording accurate temperature differential footage in real time, regardless of lighting conditions. The IR camera does not provide perfect physical details, due to its output of a thermal imaging spectrum. While technically competing with the tagging method, redundancy is a vital aspect of the security industry. o Thus, the tagging method would likely work in tandem with cameras to provide better results. Patents 1. Patent 4060039 Security System a. Early yet not exactly effective for identification and tagging 2. Patent 3131376 Security Line Surveillance System a. The technical base behind surveillance cameras, which are used for identification 3. Patent 3726238 Security System a. The basis of the modern-day security system, using sensors and a central command unit 4. Patent 4001771 Intruder Detecting Security System a. A basic version of the common process used by modern security systems, as to alert not only residing people within the victimized building, but also local authorities 5. Patent 3739703 Concealment of Cameras for Observation a. As thieves found more ways to bypass security systems, more compact cameras in domes real cameras, and improve the ability to identify and catch criminals 6. Patent 6830387 Modular Security Camera System a. The latest breakthrough in observation technology, this camera was able to detect temperature output, and through that, observe and show the viewer the position of criminals hidden in the dark 12 13 Market Research Evaluating the Competition: The strengths and weaknesses of the existing approaches used by Industry Leaders are instrumental in determining if the problem is still unsolved: - Generic Security Providers (ADT, First Alert, etc.) o While there is a slight competition – our solution and these both act as security methods – it is more likely that our solution be integrate into one of these systems, as that is the nature of the security industry. o The Generic Security System utilizes a variety of sensors linked to a central control pad and accompanied by external monitoring by the provider. Pros: Convenient for the homeowner to install, simple, effective at deterrence, and requires little maintenance. Cons: High energy consumption, Does not improve identification, Costly, Standardization allows criminals to develop bypass methods. - Surveillance Systems (Lorex, Honeywell, KemCo) o As both our solution and these act to deter and/or prepare intruders for identification after being apprehended. o CCTV systems are widely used by corporations and businesses to prevent or catch shoplifters and petty thieves. Activity is recorded with a maximum replay time, with data being wiped on a regular basis. Pros: Well favored concept, Most common identification method currently in use, Operation costs are minimal. Cons: Difficult for a clear image to be taken, Still lacks a real improvement to identification, Requires long hours of revision to notice criminal. - Biometrics (F7, TSA, FBI, Fulcrum Biometrics, Police CSI) o Competes on the identification basis, as both our solution and biometrics attempt to solve or improve identification of an individual. o Biometrics is the monitoring of unique physical characteristics for use in identification, including: DNA, fingerprints, retinal scans, height, complexion, gait, reaction, and general behavior. Pros: An augmentation to standard camera imaging systems, it allows a system to detect and “recognize” and individual with a high degree of certainty. Generally difficult to “fool”. Cons: The system needs data readily available for identification, limiting it to repeat offenders. Expensive. The security industry, in terms of new competitors, is largely static. The only future competitor we are able to envision would be software security companies (Such as Norton, AVG, or Avast), after homes become much more thoroughly integrated with technology. The greatest barrier for entry into this industry is its established dominance by a select group of major companies 14 Users/Buyers: User: One who will personally handle the system Anticipated Users: Police, Installation crew, Residents Buyer: A person or group who purchases product or design directly from HomeNet Industries Anticipated Buyer: Service provider (ADT) HomeNet Police Homeowner will contact Police as needed, who will use the system to help solve break-ins Security Provider Installation Crew Homeowner The Market: Major Company: This route includes selling the ‘Over Watch’ design to a major security company such as ADT as a supplement to their security systems for either a continuous fee or for an up-front free or some combination of the two. That company would then sell the product as part of their services to a customer. An installation, construction, or electrician team would install the product. The resident would turn the product on and off as needed, and the police would identify the intruder after being tagged by a system. Individual: This route includes directly selling to a resident and taking on the costs of production and all other costs related to the produce. HomeNet would manufacture, advertise, ship, and provide help for the product. Once sold, an installation, construction, or electrical team would install the product. The resident would turn the product on and off as needed, and the police would identify the intruder after being tagged by a system. Users: Police, Installation Crew, Residents Buyer: Resident Both: This route runs the other two options simultaneously. Users: Police, Installation Crew, Residents Buyers: Resident and Major Companies Selection of Target Market 15 Requirement Buyers and Users are in the market Able to do research on market Able to be done based on Resources Major Company Directly Selling Both YES YES YES YES YES YES YES NO NO Selected Route Major Company route is the only valid one out of the three options. Directly selling would require too many resources to be a legitimate solution. Since there was a clear best choice after the requirements identified, no more criteria or extra matrices were needed. The best target buyer for the HomeNet “Over Watch” project is some type of major security company (example: ADT). The target users are police, residents and installation teams. 16 Gantt Chart 10/24/2011 12/13/2011 2/1/2012 3/22/2012 5/11/2012 Define a Problem Brainstorming Research Ideas Explore Possibilities Select an Approach Develop a Proposal Create/Test Prototype Refine Design Create Solution Communicate Results Communicate Results Start Date 11/1/2011 Duration 185.00 Create Solution 4/1/2012 17.00 4/1/2012 Create/Test Prototype 3/12/2012 Develop a Proposal 3/1/2012 Select an Approach 2/23/2012 Explore Possibilities 2/1/2012 Research Ideas 1/15/2012 Brainstormin g 1/1/2012 Define a Problem 11/1/2011 14.00 20.00 10.00 7.00 22.00 17.00 14.00 61.00 Refine Design 17