A FUTURE SYSTEM TO PREVENT SEXUAL ASSAULT ON THE TUBE
USER-FOCUSED DESIGN • FORESIGHT PRACTICES • PSS DESIGN • PROJECT MANAGEMENT
Brief
Outcome
Future Contextual Study
Analysis of signals, drivers and trends in a literature review led to the development of the future scenario, identifying why the issue cannot be solved now and the primary problems for the user - including non-functioning CCTV, feelings of responsibility from the victim and it not being safe to intervene. Technological enablers close to now, such as 5G rollout and edge computing, and ones further on, such as WiFi sensing and long battery life were identified, and we engaged in repeated discussion with the CTO of TfL and a professor of design against crime to further validate the predictions and the technology integration capabilities.
Recognising Behaviour
Anonymous accounts were taken from online and personal experiences, which were analysed to show how emotional responses are tied to physical ones, and used to differentiate sexual assault from other emotions, and prevent the EVM system triggering incorrectly.
EVM is a technique for amplifying subtle motions in video so that they are more noticeable. Using a combination of micro gestures, eye tracking and heart rate monitoring, it is possible to detect specific emotions that indicate sexual assault. Applying EVM to CCTV footage then running emotion detection algorithms increases detection accuracy and can be run locally on CCTV cameras through edge computing. A prototype was built in Python. Despite the limitations of today’s technologies, EVM was found to be a powerful tool for identifying expressions.
Person Identification
A large issue is that on a crowded carriage, CCTV cannot ‘see’ as areas are blocked. Wi-Fi sensing detects and follows movements or gestures utilising signals from IoT devices, for example phones. Wi-Fi sensing data can be converted into 3D skeleton diagrams of passenger’s positions through the use of a neural network, even if there are obstructions.
A prototype was created using two ESP32 microcontrollers. We were able to obtain models in a 20 metre range (sufficient for the London Underground where carriages are between 15 and 17 metres in length) and up to 4.6 cm accuracy. In 20 years this technology would be able to reliably detect contact.
Reporting
When a crime is detected and the system triggered, CCTV captures the appearance of the victim and perpetrator. Feature decomposition builds a picture using personal features to be able to identify the person even if they change their appearance. When the person touches out, cameras at the barriers scan them looking for a match from the incident.
Potential victims receive a notification on their lockscreen through the TfL app. Unlike a traditional notification, it is interactive so that a report can be made without having to unlock the device. In-app, users can opt in to receiving these notifications - but people who do not wish to, out of privacy concerns or due to previous experiences, do not have to. The outcome is shown in the flow diagram.
Privacy/Data
Privacy is at the core of the system. Data are only gathered when the system is activated, are stored in a local buffer, and data flow is one way - personal data cannot be identified from the stored information, only becoming accessible with opt-in consent or in an investigation. Human validation is always used to verify an assault has occurred before notifying the victim.
Despite the complex technology working in the background, the process is very simple for the user. For all travellers, the journey process remains unchanged, and for victims, the system mitigates the pitfalls of the current system, integrating seamlessly.
Implementation Roadmap
To make this a reality, actions from various bodies were identified. No one will do something just ‘to be nice’, so benefits of engaging in the system was established to encourage uptake.
An implementation roadmap was created, with future development opportunities. Barriers to implementation and potential pitfalls were outlined, and solutions identified so implementation can be as smooth as possible.