CovertMind powered by KernOSTM
The CovertMind managed service enhances the effectiveness of surveillance and analysis of CCTV bringing monitoring and alerting to where you need it most.
CovertMind provides continuous 360 degrees 24/7/365 security surveillance. By using cutting edge AI and machine learning with video streaming and management capabilities, CovertMind transforms security surveillance into a simple and proactive process.
CovertMind offers a complete solution including proprietary AI, facial and object recognition features to maximise security.
CovertMind powered by KernOSTM provides the capability of Full Motion Video FMV ingestion, exploitation and dissemination. All ingested feeds can be transcoded and/or translated to a variety of outputs depending on mission needs.
All video raw stored/archived is preserved to meet evidential integrity.
Facial Recognition Technology
CovertMind’s embedded Facial Recognition (FR) technology is designed to augment surveillance operations by dynamically detecting and alerting security personnel of potential threats. This technology provides security personnel vital and potentially lifesaving information in order to effectively prepare for and neutralise security threats.
CovertMind uses a comprehensive targetting database that allow users to create objectives, events, Significant Actors (SIGACTs) and threat streams. The application allows users to fuse events and SIGACTs with objectives in a streamlined workflow. The app has built-in alerts for facial recognition match or history that alerts users when any of the objectives have been detected. This information is then used to establish a geospatial pattern of life for the objective.
The events section allows organisations to track and report on friendly and hostile events from intelligence reporting and sources and link these events to objectives. The event creation tool allows users to insert images, audio, video and other related artifacts associated with the event as well as import suspected objectives, threat streams into the involved known parties section of the event report.
SIGACTs are searchable within the application using any keywords or fields such as type, threat stream, objectives, and other fields.
Objects and Behaviours
All of the above is straight out of the box. Complex objects and behaviours can be added to your requirement. Imagine the ability to monitor hostile reconnaissance, fights, civil disturbance , robberies or almost anything you can envision.
Easy ‘Social Media-like’ Functionality
Users can tag the event with any number of #hashtags which trigger the event to be posted on the tagged hashtag timeline for wide dissemination and immediate action.
User-groups and workflows can be created in ‘circles’ which operate like secure groups in your favourite social media platforms.