Leveraging mobile & wireless technology for Law and Order

Preview:

DESCRIPTION

Leveraging Mobile & Wireless Technology for Law and Order by Lishoy Bhaskar at c0c0n - International Cyber Security and Policing Conference http://is-ra.org/c0c0n/speakers.html

Citation preview

Leveraging Mobile & Wireless Technology for

law and order

Sneak peek into the gadgets used for law and order today…

• Wireless Set

• TETRA Radio

• GPS Navigation

• GPS Receiver

• e-Beat (RFID Reader)

• Audio Recorder

• Digital Camera

• Video Camera

• Mobile Phone

• e-Chalan

Functionalities…

• Data and voice connectivity• Voice/video/photo capture• GPS Navigation and Tracking• Real time reporting• Running custom applications

Limitations

• Radio/Phone communication can be tapped• Security is compromised • No internet connectivity for most devices

– No structured storage– Lack of transparency

• Multivendor-Multiplatform – Maintenance and support issues– Not platform and device agonistic

• COST

2-2.5 Lakh

SOLUTION….

Multi utility devices such as phone, PDA, Tablet with customized applications

SMART COP

Customized application

CHOOSE YOUR DEVICE!!!

• Smart Phone

• PDA

• Tablet

• These devices cannot be used in harsh environments.

• Gets phased out every six months• No long term support

Suggested DEVICES

Specially designed Devices• Scalable Hardware• Rugged• 3G/4G enabled• Platform and device agonistic• Build on open standards• Long term support• Cost is 1/10th

Use maps for NavigationCapture and share incidents

video, audio and PhotosConnect with your closest

Police Station/ Police Vehicles

Generate chalans and connect to the chalan server

Record beat track using the hybrid vehicle trackerRecord beat track using

the hybrid vehicle trackerEstablish Voice/Video calls with officers in the same network/control roomSecured/encrypted radio

transmission Live video Streaming to police network across state

Other Technologies

• Encrypted Phone

• Push To Talk (PPT)

• Voice Biometrics

Encrypted Phones

• Phone communication can be tapped

• Voice to Data• Data is encrypted• Send over GSM/CDMA network• Received at other end• Same process reversed

Encrypted Phones

Types of Encryption

• Software– Installed in the phone– Does the conversion and encryption

• Hardware– micro SD card– Inserted into micro SD slot

• Push to Talk permits users to use their phone as a walkie-talkie

• Unlimited range

• One to many communication

Push To Talk

PTT basic architecture

Encrypted Cloud server

PTT features

• Instant calls to individual and pre-determined groups at the push of a button

• Quick ad-hoc group calling• Call me alert-to another PTT user• Convert PTT calls to full-duplex

conversation• Presence and availability

Voice Biometrics• Used for identification and authentication

• Used by Law enforcement agencies globally

• Technology- far superior compared to finger prints

• Intercept callers, Identify languages, dialects and Gender

• Speech to text applications may be used Police department

for administration

• Speech to text are currently used by Supreme court and

High courts in India

• Create voice samples of criminals across the country

• Deploy intelligent Voice/call interceptors

• It takes just 60 seconds to create a voice identity of a person

• Voice biometric is based on intelligent algorithms which cannot be

duped

• Voice interception made easier

Road Map for Voice Biometrics

Physical and behavioral factors combine to produce unique voice patterns for every individual.

Speaker Identification

Keyword Spotting

Language Recognition

Gender Detection

Kidnappers Organized Criminals

Terrorists Drug Traffickers

biometric database

of voiceprints

Police Criminal Re

• Finding if an unknown voice sample belongs to

a known target

Solved Problem

Police Criminal Record

Equip security personnel with real-time in-field criminal & terrorist identification capabilities so that

they can apprehend individuals of interest before they can act

Prevent Crimes & Terrorist Activity

Speed up investigations by automatically identifying individuals of interest based on who they are,

who they are speaking with or what they are saying

Connect the Dots

Quickly

Deliver compelling evidence in court by submitting voice biometric

identification of accused criminals and terrorists

Support Successful

Prosecution

Stop known terrorists and criminals from entering the country. Identify individuals by their voice, which is

unique to every person, countering forged passports and altered

appearances

Border Control

Identify criminals by their voice, as captured over the phone through

lawful interception or recorded at a crime scene. Ensure prosecution with

voice biometric evidence

Criminal Investigation

Equip your in-field officials with the capability to accurately and quickly

identify individuals they have intercepted via their mobile device

In-Field Identification

Key Benefits & Applications

Key Features

Hyper-Accurate IdentificationNuance Monitor utilizes state-of the art i-Vector speaker identification technology, delivering unrivaled accuracy on text-independent voice verifications, ensuring your staff doesn’t waste time with false alarms or let a known terrorist or criminal avoid detection.

Thousands of Voiceprint Matches per SecondNuance Monitor delivers the scale and speed required for a country-wide voice biometric system, capable of rapidly and accurately identifying known individuals and flagging conversations of interest.

Mobility EnabledTransform in-field officials into mobile audio collection agents to capture conversations within their vicinity, extending the reach of audio monitoring beyond communication networks and select public places. Nuance Mobile Monitor is a fully embedded and continuously synchronized mobile monitoring tool.

THANK YOU!!!

Recommended