AI Scannning For Weapon At Sports Venues & Arenas

Artificial Intelligence (AI) is being used across Britain to help secure sites from sports arenas to churches and schools. Indeed, some of the world's biggest venues, including Manchester Arena, where an Islamist extremist suicide bomber detonated a shrapnel-laden homemade bomb in in May 2017, murdering 22 young concert goers, is now using the technology.

The technology is being used to scan for weapons, including guns, knives and explosives as people walk between standing panels. If a weapon is spotted, security standing by is alerted. But there are emerging concerns that it does not work well enough.

The company which operates the AI, Evolv, sells security arches that contain a combination of electronic surveillance and AI software to sift through signals and spot one gun-carrying individual among thousands of people filing into a concert. 

They claim they can detect all weapons, although according to reports, the AI may not be capable of detecting certain types of knives, bomb components and some other dangerous items. 

The current extremely high alert level for venues has prompted Evolv to blend AI software with radar to cut down on false alerts and keep the crowds flowing into a venue. without time-consuming delays. Fans are asked to keep items in like their phone, keys, wallet, and other personal items in their pockets, as they walk through an Evolv arch scanner.

In 2020 Evolv was asked if it could build arches into doorways and examine ways to widen the space between sensors to allow larger crowds to go through more quickly. This technology, Evolv Express, was used to screen VIPs at this year's Brit Awards at London's O2 centre.

Traditional metal detectors throw up a lot of alarms for innocent metallic objects, creating a bottleneck for ticket holders who just want to get to their seat in a stadium or concert hall. One single Evolv dual-lane unit can scan upwards of 3,500 people walking through per hour, a pace that is ten times faster than traditional metal detector. 

Evolv’s research shows that about every 90 out of 100 fans walk through its systems without setting off an alert for additional security screening.

Security teams can change the settings on Evolv’s machines through the company’s software, typically from an iPad, to increase or decrease the sensitivity levels for Evolv’s AI to identify something as being potentially dangerous. According to reports, it is this feature that might be causing problems. 

The technology should not just be looking for the shape of a gun as defined by the software, but also for small shards of metal packed into a confined space to create shrapnel around an explosive device as was tragically demonstrated in Manchester Arena bombing.

Evolv’s computer vision sensors are trained to detect threats, such as bombs or firearms, through scanning shapes, sizes and density of items as fans walk through its security system.

AI and machine learning enable the scanners to create unique "signatures" of weapons that differentiate them from items such as computers or keys, Evolv says, reducing manual checks and preventing long queues. "Metallic composition, shape, fragmentation - we have tens of thousands of these signatures, for all the weapons that are out there... all the guns, all the bombs and all the large tactical knives." Evolv's CEO Peter George said last year. 

For several years, independent security experts have expressed doubts about some of Evolv's claims.

Last year, Evolv gave permission to the US National Center for Spectator Sports Safety and Security (NCS4) to test its technology and NCS4's public report, gave Evolv a score of 2.84 out of three - many types of guns were detected 100% of the time. But it also produced a private report, obtained via a Freedom of Information request which has been reported by BBC News along with emails between Evolv and NCS4.

This report gave Evolv's ability to detect large knives a score of just 1.3 out of 3. In 24 walkthroughs, Evolv Express failed to detect large knives 42% of the time. "The system was incapable of detecting every knife on the sensitivity level observed during the exercise," the report says.

Evolv:      BBC:     IPVM Research:    SportsTechie:      BusinessTelegraph:     CyprusNews:    Techregister:

You Might Also Read: 

Artificial Intelligence & Its Impact On Cyber Security:

 

« Britain Has Secretly Contributed £6m To Ukraine’s Cyber Defence
Does Elon Musk Owning Twitter Increase Cyber Security Risks? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Global Secure Solutions (GSS)

Global Secure Solutions (GSS)

Global Secure Solutions is an IT security and risk consulting firm and authorised ISO training partner for the PECB.

Continuum

Continuum

Continuum is the IT management platform company that allows Managed IT Services Providers to maintain and back up on-premise and cloud-based servers, desktops, mobile devices and other endpoints

Herjavec Group

Herjavec Group

Herjavec Group's Managed Security Services practice defends your organization from increasingly sophisticated, targeted cybercrime threats.

PCI Pal

PCI Pal

PCI Pal’s secure cloud payment solutions are certified to the highest level of security by the leading card companies.

Me Learning

Me Learning

Me Learning provides engaging, informative and clearly explained learning materials for complex and challenging professional environments in areas including GDPR and Information Governance.

Cyber Security Austria (CSA)

Cyber Security Austria (CSA)

Cyber Security Austria (CSA) is an independent non-profit association with the aim to address security issues in the area of IT/cyber security of critical/strategic infrastructures in Austria.

Ksmartech

Ksmartech

Ksmartech provide services related to security and authentication in all areas where the connection of people to objects, and objects and objects is necessary.

AnChain.AI

AnChain.AI

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions.

Attack Research

Attack Research

We go far beyond standard tools and scripted tests. Find out if your network or technology can stand real-world and dedicated attackers.

Real Protect

Real Protect

Real Protect is a Brazilian provider of managed security (MSS) and cyber defense services.

Navisite

Navisite

Navisite is a combination of eight respected IT consulting and managed service providers that were brought together under the Navisite brand.

Bittnet Training

Bittnet Training

Bittnet Training is the leader in the IT Training market in Romania. We develop the IT skills of IT professionals as well as those who wish to start a career in IT.

Primus Institute of Technology

Primus Institute of Technology

At Primus Institute of Technology our mission is to inspire, support, and empower current and aspiring IT professionals through training and career development workshops.

Calamu

Calamu

Calamu is a software-defined storage security and resiliency platform that keeps your data secure and accessible wherever you choose to store it.

Washington Technology Solutions (WaTech)

Washington Technology Solutions (WaTech)

WaTech operates the state’s core technology infrastructure – the central network and data center, provides strategic direction for cybersecurity and protects state networks from growing cyber threats.

Trofi Security

Trofi Security

Trofi Security provides Information Technology and Information Security services to organizations in both the public and private sectors.