Video Surveillance Monitoring and Analysis

The Objective: Improve the protection of the Nation’s critical infrastructure and military/civilian population from terrorist attacks by leveraging automated video surveillance technologies. Advanced video surveillance technologies provide faster, cheaper, and better methods for monitoring live video footage for instances of persons-of-interest. These technologies can provide security forces with time critical information needed to effectively respond to threats. Analysts, investigators and forensic examiners who conduct post-event analysis can determine the identity of unknown individuals and better understand the linkages and associations between criminal and terrorist networks.
MXSERVER Real-time check point facial recognition

MXSERVER Real-Time Check Point Facial Recognition


The Problem: Due to the rapid growth in development and fielding of digital video surveillance and still image collection systems, the military, intelligence agencies and other protective services have an ever increasing need to monitor live video feeds and analyze large volumes of archived video and photo collections to discover illicit activities and persons of interest. For current operations, the solution has been to assign large numbers of security personnel and video analysts to manually view the video looking for a list of activities, objects and persons of interest. If any of the given activities, objects or persons are spotted, the security officer or analyst issues an alert or report to the proper authorities. Compounding the problem is the explosive growth in the amount of video and photographs being disseminated and collected – making it impossible for a limited number of security officers/operators/investigators to effectively monitor and scrutinize this content. Clearly, applying automated video search and detection capabilities will provide dramatic payoffs in the effectiveness and efficiency of video monitoring and analysis.

The Solution: MXSERVER provides faster, cheaper, and better methods for extracting, managing and distributing intelligence from digital media (video, audio and photographs) using next-generation Web 2.0 and Cloud Computing technologies. Web 2.0 and Cloud Computing technologies are revolutionizing collaboration, knowledge sharing and system scalability in the public sector. These technologies have now been applied to deliver enterprise-class biometric identification and automated video analysis and exploitation solutions to meet various Intelligence Surveillance and Reconnaissance technical collection and analysis requirements. MXSERVER’s cloud-based architecture can process vast amounts of video and photo collections quickly – transforming digital video surveillance and images into searchable resources. MXSERVER is enabling security officers/operators to:

Create and manage web-based watch lists of persons of interest (such as known or suspected terrorists).

  • Automatically screen and monitor video surveillance feeds at check points, entry/exit portals, and secure facilities for persons on a watch list.
  • Automatically extract and index faces enabling recorded video surveillance and photo repositories to be searched biometrically or via metadata.
  • Identify a person of interest using face recognition.
  • Find instances where a person of interest has been seen and quickly review and exploit these video to identify, locate, and track persons of interest, their associates and their activities.

MXSERVER’s technical architecture is modular in design, facilitating the integration of new analytic capabilities. MXSERVER can be deployed as a turn-key capability or can be integrated into an existing video surveillance management system.

Benefits/Value Proposition: MXSERVER is delivering the following benefits:

  • Near real time alerting when a person-of-interest is detected provides improved situational awareness and heightened security.
  • Save countless man-hours being spent manually viewing video and photo collections.
  • Achieve Identity Dominance – better understand the identity of potential adversaries.

End User Profiles: Physical Security Officers, Force Protection Personnel, Law Enforcement Video Surveillance Units