View
497
Download
1
Category
Tags:
Preview:
DESCRIPTION
Leveraging Mobile & Wireless Technology for Law and Order by Lishoy Bhaskar at c0c0n - International Cyber Security and Policing Conference http://is-ra.org/c0c0n/speakers.html
Citation preview
Leveraging Mobile & Wireless Technology for
law and order
Sneak peek into the gadgets used for law and order today…
• Wireless Set
• TETRA Radio
• GPS Navigation
• GPS Receiver
• e-Beat (RFID Reader)
• Audio Recorder
• Digital Camera
• Video Camera
• Mobile Phone
• e-Chalan
Functionalities…
• Data and voice connectivity• Voice/video/photo capture• GPS Navigation and Tracking• Real time reporting• Running custom applications
Limitations
• Radio/Phone communication can be tapped• Security is compromised • No internet connectivity for most devices
– No structured storage– Lack of transparency
• Multivendor-Multiplatform – Maintenance and support issues– Not platform and device agonistic
• COST
2-2.5 Lakh
SOLUTION….
Multi utility devices such as phone, PDA, Tablet with customized applications
SMART COP
Customized application
CHOOSE YOUR DEVICE!!!
• Smart Phone
• PDA
• Tablet
• These devices cannot be used in harsh environments.
• Gets phased out every six months• No long term support
Suggested DEVICES
Specially designed Devices• Scalable Hardware• Rugged• 3G/4G enabled• Platform and device agonistic• Build on open standards• Long term support• Cost is 1/10th
Use maps for NavigationCapture and share incidents
video, audio and PhotosConnect with your closest
Police Station/ Police Vehicles
Generate chalans and connect to the chalan server
Record beat track using the hybrid vehicle trackerRecord beat track using
the hybrid vehicle trackerEstablish Voice/Video calls with officers in the same network/control roomSecured/encrypted radio
transmission Live video Streaming to police network across state
Other Technologies
• Encrypted Phone
• Push To Talk (PPT)
• Voice Biometrics
Encrypted Phones
• Phone communication can be tapped
• Voice to Data• Data is encrypted• Send over GSM/CDMA network• Received at other end• Same process reversed
Encrypted Phones
Types of Encryption
• Software– Installed in the phone– Does the conversion and encryption
• Hardware– micro SD card– Inserted into micro SD slot
• Push to Talk permits users to use their phone as a walkie-talkie
• Unlimited range
• One to many communication
Push To Talk
PTT basic architecture
Encrypted Cloud server
PTT features
• Instant calls to individual and pre-determined groups at the push of a button
• Quick ad-hoc group calling• Call me alert-to another PTT user• Convert PTT calls to full-duplex
conversation• Presence and availability
Voice Biometrics• Used for identification and authentication
• Used by Law enforcement agencies globally
• Technology- far superior compared to finger prints
• Intercept callers, Identify languages, dialects and Gender
• Speech to text applications may be used Police department
for administration
• Speech to text are currently used by Supreme court and
High courts in India
• Create voice samples of criminals across the country
• Deploy intelligent Voice/call interceptors
• It takes just 60 seconds to create a voice identity of a person
• Voice biometric is based on intelligent algorithms which cannot be
duped
• Voice interception made easier
Road Map for Voice Biometrics
Physical and behavioral factors combine to produce unique voice patterns for every individual.
Speaker Identification
Keyword Spotting
Language Recognition
Gender Detection
Kidnappers Organized Criminals
Terrorists Drug Traffickers
biometric database
of voiceprints
Police Criminal Re
• Finding if an unknown voice sample belongs to
a known target
Solved Problem
Police Criminal Record
Equip security personnel with real-time in-field criminal & terrorist identification capabilities so that
they can apprehend individuals of interest before they can act
Prevent Crimes & Terrorist Activity
Speed up investigations by automatically identifying individuals of interest based on who they are,
who they are speaking with or what they are saying
Connect the Dots
Quickly
Deliver compelling evidence in court by submitting voice biometric
identification of accused criminals and terrorists
Support Successful
Prosecution
Stop known terrorists and criminals from entering the country. Identify individuals by their voice, which is
unique to every person, countering forged passports and altered
appearances
Border Control
Identify criminals by their voice, as captured over the phone through
lawful interception or recorded at a crime scene. Ensure prosecution with
voice biometric evidence
Criminal Investigation
Equip your in-field officials with the capability to accurately and quickly
identify individuals they have intercepted via their mobile device
In-Field Identification
Key Benefits & Applications
Key Features
Hyper-Accurate IdentificationNuance Monitor utilizes state-of the art i-Vector speaker identification technology, delivering unrivaled accuracy on text-independent voice verifications, ensuring your staff doesn’t waste time with false alarms or let a known terrorist or criminal avoid detection.
Thousands of Voiceprint Matches per SecondNuance Monitor delivers the scale and speed required for a country-wide voice biometric system, capable of rapidly and accurately identifying known individuals and flagging conversations of interest.
Mobility EnabledTransform in-field officials into mobile audio collection agents to capture conversations within their vicinity, extending the reach of audio monitoring beyond communication networks and select public places. Nuance Mobile Monitor is a fully embedded and continuously synchronized mobile monitoring tool.
THANK YOU!!!
Recommended