Crime-fighting Tool Identifies Suspicious Individuals at Crime Scenes

It's become a standard plot device of television detective shows: criminals returning to the scene of the crime. And law enforcement officials believe that perpetrators of certain crimes, most notably arson, do indeed have an inclination to witness their handiwork. Also, U.S. military in the Middle East feel that IED bomb makers return to see the results of their work in order to evolve their designs.

Now a team of University of Notre Dame biometrics experts are developing a crime-fighting tool that can help law enforcement officials identify suspicious individuals at crime scenes.

Kevin Bowyer and Patrick Flynn of Notre Dame's Computer Science and Engineering Department have been researching the feasibility of image-based biometrics since 2001, including first-of-their-kind comparisons of face photographs, face thermograms, 3-D face images, iris images, videos of human gait, and even ear and hand shapes.

While attending a meeting in Washington, D.C, Bowyer listened as military and national security experts discussed the need for a tool to help identify IED bombers in the Middle East.

He decided to join forces with Flynn and Jeremiah Barr, a doctoral student in computer science and engineering, to tackle the challenge he heard expressed at the Washington meeting. The researchers developed a "Questionable Observer Detector (QuOD)" to identify individuals who repeatedly appear in video taken of bystanders at crime scenes.

The challenge was especially daunting because the researchers lacked a data base to compare faces against. Also, many times crime scene videos are shot by witnesses using handheld videos and are often of poor quality. Additionally, many criminals try to disguise their appearance in various ways.

In response, the Notre Dame team focused on an automatic facial recognition tool that didn't need to match people against an existing database of known identities. Instead, Bowyer, Flynn and Barr create "face tracks" for all individuals appearing in a video and repeat the process for all available video clips. The face tracks are compared to determine if any faces from different video clips look similar enough to match each other. When the technology spots a match, it adds it to a group of video appearances featuring just that person. In this way, it attempts to cluster together the pieces of different video clips that represent the same person.

An individual is considered suspicious if he or she appears too frequently in the set of videos. The "too many" number is determined by law enforcement officials based on the number of crimes and videos available.

Although the technology shows great promise, Bowyer, Flynn and Barr admit they still have serious technical challenges they are working to overcome. Optimum facial recognition technology requires high quality lighting and video resolution, which is often unavailable at crime scenes. Also, people may not be looking directly at the camera in video of crowds of bystanders. And the identification of a questionable observer becomes more computationally demanding in cases where there a large number of videos to be analyzed.

The researchers are confident, however, that these challenges can be overcome and are continuing to work to improve their system. They are also confident that civil liberties concerns are minimized and positive social benefit is invovled, given that the tool helps officials identify individuals by their actual presence at multiple crime scenes rather than by suspicion.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.