SlideShare a Scribd company logo
1 of 31
Leveraging Mobile &
Wireless Technology for
     law and order
Sneak peek into the gadgets
used for law and order today…
 •   Wireless Set

 •   TETRA Radio

 •   GPS Navigation

 •   GPS Receiver

 •   e-Beat (RFID Reader)

 •   Audio Recorder

 •   Digital Camera

 •   Video Camera

 •   Mobile Phone

 •   e-Chalan
Functionalities…

•   Data and voice connectivity
•   Voice/video/photo capture
•   GPS Navigation and Tracking
•   Real time reporting
•   Running custom applications
Limitations
• Radio/Phone communication can be tapped
• Security is compromised
• No internet connectivity for most devices
  – No structured storage
  – Lack of transparency
• Multivendor-Multiplatform
  – Maintenance and support issues
  – Not platform and device agonistic
• COST
2-2.5 Lakh
SOLUTION….

Multi utility devices such as phone, PDA
 Tablet with customized applications
Customized
      application




SMART COP
CHOOSE YOUR DEVICE!!!
• Smart Phone

• PDA

• Tablet

• These devices cannot be used in harsh
  environments.
• Gets phased out every six months
• No long term support
Suggested DEVICES
    Specially designed Devices
•   Scalable Hardware
•   Rugged
•   3G/4G enabled
•   Platform and device agonistic
•   Build on open standards
•   Long term support
•   Cost is 1/10th
Capture and share incidents
   Use maps for and Photos
    video, audio Navigation
  Connect with your closest
Police Station/ Police Vehicles
Generate chalans and connect
    to the chalan server


       Record beat track using
      the hybrid vehicle tracker
       Record beat track using
       Establish Voice/Video calls
      the hybrid vehicle tracker
        with officers in the same
        network/control room
       Secured/encrypted radio
              transmission
        Live video Streaming to
      police network across state
Other Technologies
• Encrypted Phone

• Push To Talk (PPT)

• Voice Biometrics
Encrypted Phones
• Phone communication can be tapped
Encrypted Phones
•   Voice to Data
•   Data is encrypted
•   Send over GSM/CDMA network
•   Received at other end
•   Same process reversed
Types of Encryption
• Software
  – Installed in the phone
  – Does the conversion and encryption


• Hardware
  – micro SD card
  – Inserted into micro SD slot
Push To Talk
• Push to Talk permits users to use their
  phone as a walkie-talkie

• Unlimited range

• One to many communication
PTT basic architecture



Encrypted Cloud
     server
PTT features
• Instant calls to individual and pre-
  determined groups at the push of a
  button
• Quick ad-hoc group calling
• Call me alert-to another PTT user
• Convert PTT calls to full-duplex
  conversation
• Presence and availability
Voice Biometrics
• Used for identification and authentication

• Used by Law enforcement agencies globally

• Technology- far superior compared to finger prints

• Intercept callers, Identify languages, dialects and Gender

• Speech to text applications may be used Police department

for administration

• Speech to text are currently used by Supreme court and

High courts in India
Road Map for Voice Biometrics
• Create voice samples of criminals across the country

• Deploy intelligent Voice/call interceptors

• It takes just 60 seconds to create a voice identity of a person

• Voice biometric is based on intelligent algorithms which cannot be

duped

• Voice interception made easier

 Physical and behavioral factors combine to
 produce unique voice patterns for every
 individual.
Speaker        Language    Gender     Keyword
Identification   Recognition Detection   Spotting
Solved
Problem                                          biometric
    • Finding if an
      unknown voice
                                                 database
      sample belongs to                        of voiceprints
      a known target




                                                   Organized
                                  Kidnappers
                                                   Criminals




                                                     Drug
                                  Terrorists
                                                  Traffickers




                           Police Criminal
                               Record
                          Police Criminal Re
Key Benefits & Applications
               Equip security personnel with real-                       Stop known terrorists and criminals
                 time in-field criminal & terrorist                      from entering the country. Identify
  Prevent                                                                 individuals by their voice, which is
                identification capabilities so that       Border
 Crimes &                                                                unique to every person, countering
               they can apprehend individuals of
 Terrorist                                                Control            forged passports and altered
                   interest before they can act
  Activity                                                                           appearances




                     Speed up investigations by                           Identify criminals by their voice, as
               automatically identifying individuals                       captured over the phone through
Connect the     of interest based on who they are,       Criminal        lawful interception or recorded at a
   Dots        who they are speaking with or what                       crime scene. Ensure prosecution with
                                                       Investigation
  Quickly                 they are saying                                      voice biometric evidence




               Deliver compelling evidence in court                      Equip your in-field officials with the
                  by submitting voice biometric                          capability to accurately and quickly
  Support       identification of accused criminals
                                                          In-Field          identify individuals they have
 Successful                and terrorists
                                                       Identification    intercepted via their mobile device
Prosecution
Key Features

                                                          Mobility Enabled
                                                          Transform in-field officials
                                                          into mobile audio
                             Thousands of                 collection agents to
                             Voiceprint Matches           capture conversations
                             per Second                   within their
Hyper-Accurate                                            vicinity, extending the
                             Nuance Monitor delivers
Identification               the scale and speed          reach of audio monitoring
Nuance Monitor utilizes      required for a country-      beyond communication
state-of the art i-Vector    wide voice biometric         networks and select
speaker identification       system, capable of rapidly   public places. Nuance
technology, delivering       and accurately identifying   Mobile Monitor is a fully
unrivaled accuracy on        known individuals and        embedded and
text-independent voice       flagging conversations of    continuously synchronized
verifications, ensuring      interest.                    mobile monitoring tool.
your staff doesn’t waste
time with false alarms or
let a known terrorist or
criminal avoid detection.
THANK YOU!!!

More Related Content

What's hot

Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniAdam Nurudini
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }AkshayJha40
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source IntelligenceOsama Ellahi
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINTAdam Compton
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA (European Emergency Number Association)
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceDeep Shankar Yadav
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and futureChristian Martorella
 
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesSyedAmoz
 
Stop pulling the plug
Stop pulling the plugStop pulling the plug
Stop pulling the plugKamal Rathaur
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance SocietyKaren Moxley
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsSloan Carne
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillancecfeutlinske
 
Dark web investigation
Dark web investigationDark web investigation
Dark web investigationCobinweb
 

What's hot (20)

Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINT
 
OSINT
OSINTOSINT
OSINT
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
Maltego
MaltegoMaltego
Maltego
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and future
 
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life Examples
 
Stop pulling the plug
Stop pulling the plugStop pulling the plug
Stop pulling the plug
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
Darknet
DarknetDarknet
Darknet
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
Dw communication
Dw communicationDw communication
Dw communication
 
Dark web investigation
Dark web investigationDark web investigation
Dark web investigation
 

Similar to Leveraging mobile & wireless technology for Law and Order

Ad:Tech Conference 2014
Ad:Tech Conference 2014Ad:Tech Conference 2014
Ad:Tech Conference 2014Filip Maertens
 
Ad:Tech Conference 2014
Ad:Tech Conference 2014Ad:Tech Conference 2014
Ad:Tech Conference 2014Argus Labs
 
Vampire Tactical Forensic Device - Product Sheet
Vampire Tactical Forensic Device - Product SheetVampire Tactical Forensic Device - Product Sheet
Vampire Tactical Forensic Device - Product SheetBooz Allen Hamilton
 
CSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha KranjacCSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha KranjacNCCOMMS
 
Computer Forensics & Cyber Crimes
Computer Forensics & Cyber CrimesComputer Forensics & Cyber Crimes
Computer Forensics & Cyber CrimesAnamZunaira
 
Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013Shane Turner
 
Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1Dan Miller
 
VAMPIRE™ Tactical Forensic Device
VAMPIRE™ Tactical Forensic DeviceVAMPIRE™ Tactical Forensic Device
VAMPIRE™ Tactical Forensic DeviceBooz Allen Hamilton
 
Biometric Security Systems.pptx
Biometric Security Systems.pptxBiometric Security Systems.pptx
Biometric Security Systems.pptxanupamas0191
 
Tools And Methods Of The Trade For Private Detectives
Tools And Methods Of The Trade For Private DetectivesTools And Methods Of The Trade For Private Detectives
Tools And Methods Of The Trade For Private DetectivesDetectivfrei
 
IEF for Military and Government
IEF for Military and GovernmentIEF for Military and Government
IEF for Military and GovernmentJADsoftware
 
Datasheet_Fraud_Detection_System
Datasheet_Fraud_Detection_SystemDatasheet_Fraud_Detection_System
Datasheet_Fraud_Detection_SystemRichard Hill
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationIntel IT Center
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric PresentationAnand Yadav
 

Similar to Leveraging mobile & wireless technology for Law and Order (20)

Ad:Tech Conference 2014
Ad:Tech Conference 2014Ad:Tech Conference 2014
Ad:Tech Conference 2014
 
Ad:Tech Conference 2014
Ad:Tech Conference 2014Ad:Tech Conference 2014
Ad:Tech Conference 2014
 
Firewalls
FirewallsFirewalls
Firewalls
 
Vampire Tactical Forensic Device - Product Sheet
Vampire Tactical Forensic Device - Product SheetVampire Tactical Forensic Device - Product Sheet
Vampire Tactical Forensic Device - Product Sheet
 
CSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha KranjacCSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha Kranjac
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
 
Computer Forensics & Cyber Crimes
Computer Forensics & Cyber CrimesComputer Forensics & Cyber Crimes
Computer Forensics & Cyber Crimes
 
Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013
 
Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1
 
Mforce solution
Mforce solutionMforce solution
Mforce solution
 
Biometric
Biometric Biometric
Biometric
 
VAMPIRE™ Tactical Forensic Device
VAMPIRE™ Tactical Forensic DeviceVAMPIRE™ Tactical Forensic Device
VAMPIRE™ Tactical Forensic Device
 
Biometric Security Systems.pptx
Biometric Security Systems.pptxBiometric Security Systems.pptx
Biometric Security Systems.pptx
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Tools And Methods Of The Trade For Private Detectives
Tools And Methods Of The Trade For Private DetectivesTools And Methods Of The Trade For Private Detectives
Tools And Methods Of The Trade For Private Detectives
 
IEF for Military and Government
IEF for Military and GovernmentIEF for Military and Government
IEF for Military and Government
 
Datasheet_Fraud_Detection_System
Datasheet_Fraud_Detection_SystemDatasheet_Fraud_Detection_System
Datasheet_Fraud_Detection_System
 
Methods
MethodsMethods
Methods
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User Authentication
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 

More from c0c0n - International Cyber Security and Policing Conference (6)

Cracking the Mobile Application Code
Cracking the Mobile Application CodeCracking the Mobile Application Code
Cracking the Mobile Application Code
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
Why Government & Corporate Cyber Programmes are Failing
Why Government & Corporate Cyber Programmes are Failing Why Government & Corporate Cyber Programmes are Failing
Why Government & Corporate Cyber Programmes are Failing
 
Public Private Partnership - Combating CyberCrime
Public Private Partnership - Combating CyberCrime Public Private Partnership - Combating CyberCrime
Public Private Partnership - Combating CyberCrime
 
Web-App Remote Code Execution Via Scripting Engines
Web-App Remote Code Execution Via Scripting EnginesWeb-App Remote Code Execution Via Scripting Engines
Web-App Remote Code Execution Via Scripting Engines
 
UI-Redressing Attacks - The Process & Exploitation
UI-Redressing Attacks - The Process & ExploitationUI-Redressing Attacks - The Process & Exploitation
UI-Redressing Attacks - The Process & Exploitation
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Leveraging mobile & wireless technology for Law and Order

  • 1. Leveraging Mobile & Wireless Technology for law and order
  • 2. Sneak peek into the gadgets used for law and order today… • Wireless Set • TETRA Radio • GPS Navigation • GPS Receiver • e-Beat (RFID Reader) • Audio Recorder • Digital Camera • Video Camera • Mobile Phone • e-Chalan
  • 3. Functionalities… • Data and voice connectivity • Voice/video/photo capture • GPS Navigation and Tracking • Real time reporting • Running custom applications
  • 4. Limitations • Radio/Phone communication can be tapped • Security is compromised • No internet connectivity for most devices – No structured storage – Lack of transparency • Multivendor-Multiplatform – Maintenance and support issues – Not platform and device agonistic • COST
  • 6. SOLUTION…. Multi utility devices such as phone, PDA Tablet with customized applications
  • 7. Customized application SMART COP
  • 8. CHOOSE YOUR DEVICE!!! • Smart Phone • PDA • Tablet • These devices cannot be used in harsh environments. • Gets phased out every six months • No long term support
  • 9. Suggested DEVICES Specially designed Devices • Scalable Hardware • Rugged • 3G/4G enabled • Platform and device agonistic • Build on open standards • Long term support • Cost is 1/10th
  • 10.
  • 11.
  • 12. Capture and share incidents Use maps for and Photos video, audio Navigation Connect with your closest Police Station/ Police Vehicles Generate chalans and connect to the chalan server Record beat track using the hybrid vehicle tracker Record beat track using Establish Voice/Video calls the hybrid vehicle tracker with officers in the same network/control room Secured/encrypted radio transmission Live video Streaming to police network across state
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Other Technologies • Encrypted Phone • Push To Talk (PPT) • Voice Biometrics
  • 19. Encrypted Phones • Phone communication can be tapped
  • 20. Encrypted Phones • Voice to Data • Data is encrypted • Send over GSM/CDMA network • Received at other end • Same process reversed
  • 21. Types of Encryption • Software – Installed in the phone – Does the conversion and encryption • Hardware – micro SD card – Inserted into micro SD slot
  • 22. Push To Talk • Push to Talk permits users to use their phone as a walkie-talkie • Unlimited range • One to many communication
  • 24. PTT features • Instant calls to individual and pre- determined groups at the push of a button • Quick ad-hoc group calling • Call me alert-to another PTT user • Convert PTT calls to full-duplex conversation • Presence and availability
  • 25. Voice Biometrics • Used for identification and authentication • Used by Law enforcement agencies globally • Technology- far superior compared to finger prints • Intercept callers, Identify languages, dialects and Gender • Speech to text applications may be used Police department for administration • Speech to text are currently used by Supreme court and High courts in India
  • 26. Road Map for Voice Biometrics • Create voice samples of criminals across the country • Deploy intelligent Voice/call interceptors • It takes just 60 seconds to create a voice identity of a person • Voice biometric is based on intelligent algorithms which cannot be duped • Voice interception made easier Physical and behavioral factors combine to produce unique voice patterns for every individual.
  • 27. Speaker Language Gender Keyword Identification Recognition Detection Spotting
  • 28. Solved Problem biometric • Finding if an unknown voice database sample belongs to of voiceprints a known target Organized Kidnappers Criminals Drug Terrorists Traffickers Police Criminal Record Police Criminal Re
  • 29. Key Benefits & Applications Equip security personnel with real- Stop known terrorists and criminals time in-field criminal & terrorist from entering the country. Identify Prevent individuals by their voice, which is identification capabilities so that Border Crimes & unique to every person, countering they can apprehend individuals of Terrorist Control forged passports and altered interest before they can act Activity appearances Speed up investigations by Identify criminals by their voice, as automatically identifying individuals captured over the phone through Connect the of interest based on who they are, Criminal lawful interception or recorded at a Dots who they are speaking with or what crime scene. Ensure prosecution with Investigation Quickly they are saying voice biometric evidence Deliver compelling evidence in court Equip your in-field officials with the by submitting voice biometric capability to accurately and quickly Support identification of accused criminals In-Field identify individuals they have Successful and terrorists Identification intercepted via their mobile device Prosecution
  • 30. Key Features Mobility Enabled Transform in-field officials into mobile audio Thousands of collection agents to Voiceprint Matches capture conversations per Second within their Hyper-Accurate vicinity, extending the Nuance Monitor delivers Identification the scale and speed reach of audio monitoring Nuance Monitor utilizes required for a country- beyond communication state-of the art i-Vector wide voice biometric networks and select speaker identification system, capable of rapidly public places. Nuance technology, delivering and accurately identifying Mobile Monitor is a fully unrivaled accuracy on known individuals and embedded and text-independent voice flagging conversations of continuously synchronized verifications, ensuring interest. mobile monitoring tool. your staff doesn’t waste time with false alarms or let a known terrorist or criminal avoid detection.