Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Twenty-One Police Technology Emergingand.

Slides:



Advertisements
Similar presentations
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Seven Police Technology Communications Dispatch.
Advertisements

ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Eleven Police Technology Information Exchange.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fifteen Police Technology Tracking and Surveillance.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
Automatic Data Capture Devices & Methods
CCTV TECHNOLOGY AND PRIVACY CONCERNS Susan F. Brinkley, Ph.D. University of Tampa.
BIOMETRICS Presented By Rickie Jackson.  Outline –Introduction –Biometrics techniques –Strengths, and weaknesses –FAR/FRR –Major Players –Summary.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
The Role of Global Positional Systems in Policing and Crime Prevention William J. Artis Jr. FRS 142: Where’s Waldo April 19, 2004.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
The Role of Computers in Surveillance ~ Katie Hatland.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
AUTOMATIC DATA CAPTURE  a term to describe technologies which aim to immediately identify data with 100 percent accuracy.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Five Police Technology Geographic Information.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics and Authentication Shivani Kirubanandan.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
CP1610: Introduction to Computer Components
Your Interactive Guide to the Digital World Discovering Computers 2012.
Marjie Rodrigues
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Police Technology Chapter Eight
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Nine Police Technology External Systems.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
بنام خدا کاربرد کامپیوتر در مهندسی صنایع (21774( نيمسال دوم تحصيلي يكشنبه ها و سه شنبه ها 9:00-10:30 Lecture 7 AIDC.
Alternative Input Devices Part B There will be a test on this information (both part a & b).
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Data Capture and Sensing Evanna Agnew CBLT. AIDC Technologies Automatic Identification and Data Capture (AIDC)
Office of Science and Technology NCITS Technical Committee M1 Biometrics Standards Chris Miles Senior Program Manager Crime Prevention.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
 Data or instructions entered into memory of computer  Input device is any hardware component used to enter data or instructions 2.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Presented by: Nada Aried, Paul Czerniak, Dan Lavender, Fabrice Toscano, Paul Zaher AutomaticAutomatic IdentificationIdentification.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
Biometrics.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Biometric Technologies
Describe how emerging technologies are having an impact on everyday life (e.g. artificial intelligence, biometrics, vision enhancement, robotics, quantum.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Copyright © Texas Education Agency, All rights reserved. 1 Risk Management Data Statistics & Risk Management.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Automatic Data Capture  Process where many techniques are used to automatically collect data without need for manual entry. Manual entry has following.
AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Describe how emerging technologies are having an impact on everyday life (e.g. artificial intelligence, biometrics, vision enhancement, robotics, quantum.
Input Devices.
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Chapter 2: Input and output devices
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Presentation transcript:

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Twenty-One Police Technology Emergingand Future Technologies

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Learning Objectives Understand the importance of looking at future technologies. Understand the importance of looking at future technologies. Explore a variety of potential technological applications in law enforcement. Explore a variety of potential technological applications in law enforcement.law enforcementlaw enforcement

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Futurists Qualitative Techniques Delphi Surveys, etc. Quantitative Techniques Statistical extrapolation, etc. Role-playing and simulation

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Finding Us Emergency Location Transmitters (ELT) Emergency Location Transmitters (ELT) Emergency Position Indicating Radio Beacons (EPIRB) Emergency Position Indicating Radio Beacons (EPIRB) Both use satellite technology different from GPS Both use satellite technology different from GPS

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Automatic Collision Notification Typically installed in new cars, it is a form of Automatic Vehicle Locator (AVL) technologies which is activated when an air- bad is deployed. Commercial service then contacts PSAP

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Universal Product Code Or Bar Coding, it is finding its way into evidence management and equipment management systems Or Bar Coding, it is finding its way into evidence management and equipment management systems

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Chipping Goods The installation of Radio Frequency (RF) transmitters into commercial goods. The installation of Radio Frequency (RF) transmitters into commercial goods. A means of inventory control and loss prevention. A means of inventory control and loss prevention. However, chips remain active – even when you take the product home. However, chips remain active – even when you take the product home. Someday, it is likely the “chipped” products in your refrigerator will “talk” to your refrigerator. Someday, it is likely the “chipped” products in your refrigerator will “talk” to your refrigerator.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Chipped Handguns? Many people are killed accidentally by handguns. Many people are killed accidentally by handguns. Many police officers are killed when offenders take the officer’s handgun. Many police officers are killed when offenders take the officer’s handgun.police officerspolice officers Chipping guns so that only the registered user can fire the handgun is one proposed method of prevention. Chipping guns so that only the registered user can fire the handgun is one proposed method of prevention.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Remote Control Information System Transmitter on a police officer constantly broadcasting and receiving information Transmitter on a police officer constantly broadcasting and receiving information Continuous contact with PSAP Continuous contact with PSAP Originally developed for military use Originally developed for military use Provide remote supervision Provide remote supervision Provide remote feedback on the user’s vital signs Provide remote feedback on the user’s vital signs

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Our Homes as Prisons Currently, a person under “home supervision” wears a transponder bracelet. At random intervals, the supervising agency calls the home and the transponder responds to the call.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Our Homes as Prisons Expansions of the transponder model involve the use of GPS and AVL technology so that offenders who are on probation are constantly sending out a signal as to their whereabouts. Expansions of the transponder model involve the use of GPS and AVL technology so that offenders who are on probation are constantly sending out a signal as to their whereabouts.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Scanning Us Magnetic Gradient Measuring and Passive Wave Millimeter Wave Imaging are two means to supplement traditional metal detectors Magnetic Gradient Measuring and Passive Wave Millimeter Wave Imaging are two means to supplement traditional metal detectors

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Optical License Plate Scanning Using Video, infrared light, optical character recognition and other hardware and software, license plates can be automatically scanned. Using Video, infrared light, optical character recognition and other hardware and software, license plates can be automatically scanned. The scan is compared against databases: The scan is compared against databases: Tolls Tolls Access control Access control Stolen vehicles Stolen vehicles Unpaid parking citations Unpaid parking citations

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Dataveillance A term used to describe the investigation and monitoring of individuals through data: A term used to describe the investigation and monitoring of individuals through data: Financial transactions (ATM, Credit card, etc) Financial transactions (ATM, Credit card, etc) Use of library resources (e.g., PATRIOT ACT). Use of library resources (e.g., PATRIOT ACT). Passing toll booths Passing toll booths Communication records Communication records Civil Records Civil Records Other government and commercial records Other government and commercial records

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Biometrics The science of automatically identify someone based on physiological and behavioral characteristics

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Biometrics Fingerprints Fingerprints Hand Geometry Hand Geometry Retina Retina Facial Characteristics Facial Characteristics Thermal Images Thermal Images Gait Gait Speech Speech Handwriting Handwriting

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Biometrics Two broad uses of biometrics: Two broad uses of biometrics: Access Control Access Control Identification Identification Passwords and identification cards are often combined with biometric information to increase accuracy and security

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Accuracy and Security Triangle Biometrics What you are: BIOMETRIC MEASUREMENT What you have: IDENTIFICATION CARD (Like ATM Card) What you know: PASSWORD

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Biometrics Iris and Retinal Scan Iris and Retinal Scan Low intensity beam into subject’s eyeball. Low intensity beam into subject’s eyeball. Patterns of veins are compared against database Patterns of veins are compared against database Facial Recognition Facial Recognition Measurements between Nodes (center of nose, eye, etc.) Measurements between Nodes (center of nose, eye, etc.) Over 80 points can be measured Over 80 points can be measured Compared against database Compared against database

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Biometrics Any biometric system that makes comparisons against a database needs to have the subject Enrolled for comparison

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Satellites Currently used by Law Enforcement for GPS, and some communications. Currently used by Law Enforcement for GPS, and some communications. May some day supplement visual surveillance – looking down like today’s military satellites May some day supplement visual surveillance – looking down like today’s military satellites

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Pursuit Technologies Most advances have been relatively low tech such as: Most advances have been relatively low tech such as: Spike strips Spike strips Pursuit Intervention Technique Pursuit Intervention Technique

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Pursuit Technologies Hi-Tech advances have surrounded the commercial installation of “chips” that allow the fleeing vehicle to be “turned off” by the police – The effect is similar to running out of gas Screen Capture provided by FAAC, Inc

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Less-Lethal Technologies Note that the term has changed from “non-lethal” to “less-lethal” because all techniques are dangerous. Note that the term has changed from “non-lethal” to “less-lethal” because all techniques are dangerous. Chemical gas and electrical shock fairly common. Chemical gas and electrical shock fairly common. The use of light beams and sound is being used by the military and some foreign police agencies. The use of light beams and sound is being used by the military and some foreign police agencies.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Getting Smaller Bicycle patrol and foot beat officers are now accessing databases via small hand-held computers. Photograph provided by CyberCop-Software

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Technology Combinations The combination of different types of technologies is creating innovative solutions for law enforcement The combination of different types of technologies is creating innovative solutions for law enforcement Screen captured by ShotSpotter, Inc.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Browse Criminal Justice Degree Information Criminal Justice DegreeCriminal Justice Degree at atwww.hitechcj.com/criminal-justice-degree-online