securitylinkindia

Hikvision Showcases Innovations in AI Enabled Security Solutions at SAFE 2018

Hikvision showcased its innovations in AI enabled security solutions at the 4th edition of the Security and Fire Expo (SAFE) South India (28-30 June) held in Hitex Exhibition Center, Hyderabad. SAFE was inaugurated by T V Sashidhar Reddy, IPS, Addl. Director, RBVRR (Telangana State Police Academy) and R Nanda Kumar, President, Electronic Security Association of India among other key dignitaries. The expo brought together internationally renowned exhibitors, consultants, industry experts and key government officials on a single platform from the Indian and the international industries. Commenting on the SAFE 2018, Ashish P Dhakan, MD and CEO, Prama Hikvision India said, “For Hikvision, SAFE 2018 is the gateway to South India’s fast growing market, we expect this platform to grow as a force multiplier for the security industry. Being at the forefront of artificial intelligence and deep learning technologies, Hikvision is committed to offer best-in-class technology and innovations for vertical specific solutions related to smart cities, safe cities, transportation, BFSI, oil & gas, airport & seaport, real estate, education, hospitality, pharma & healthcare.” He further added, “We are hopeful that all our latest products and cuttingedge AI technology applications will add value to the end-users quest for an evolved and intelligent security solution.” Hikvision showcased the vast range of latest products and solutions including AI technology (face recognition/ people tracking/ perimeter protection), command control centre, thermal cameras, video door phone, access control system, intrusion (pyronix), ezviz products, HDTVI 5.0, Easy IP 3.0, intelligent transport solutions, swing barriers, under vehicle surveillance system and transmission solutions. Hikvision’s storage partner SEAGATE also showcased the latest storage solutions at Hikvision’s booth. Hikvision booth at SAFE 2018 witnessed good footfall and relevant visitors including security professionals, dealers, distributors, system integrators, consultants, business experts, key government officials and end users from across all verticals.

Read More

HW-18 Explosive Ordnance Disposal Robot

HW-18 EOD Robot is to replace EOD personnel, carry and transfer suspicious explosive and other hazardous goods; and what’s more – it can destroy bomb by disrupt or installed through water cannon interface, observe on the spot and transmit images in real time for security personnel, be equipped with shotgun to attack criminals, and carry detecting equipment to inspect hazardous area and goods. EOD robot consists of mobile robot body and control system. The optional touch screen of control system is suitable for the beginners to operate. Optional accessories are tail, wireless transmitting antenna, and hardware tool including cutter, hook, rake, drill and clipper. Application environment Transfer and destruction of the suspicious objects in public places (metro, airport, railway station, shopping mall, conference center etc.), Detection of prohibited to carrying goods by their images in 7 projections, Applied in such environment as dud elimination, roadside bomb elimination and mine elimination etc., Material fetching and transfer under hazardous biological and toxic environment, Reconnaissance, detection, material fetching and transfer within the ruins environment after disaster, and Material fetching and transfer under nuclear radiation environment, simple detection and maintenance work.

Read More

Fake Goods Arrests and Seizures in Worldwide Operations

Pharmaceuticals, food, vehicle parts, tobacco products, clothing and agro-chemicals are among tonnes of fake goods seized in INTERPOL-led operations across four continents. Coordinated by INTERPOL between March and May 2018 in 36 countries across Africa, Asia, the Middle East and South America, operations sought to dismantle factories and supply chains behind a wide range of counterfeit goods and the organized crime networks directing them. With 645 suspects identified or arrested so far, and more than 1,300 inquiries launched, further arrests and prosecutions are foreseen as ongoing investigations unfold. Global seizures worth USD 25 million I nvolving officers from a range of law enforcement agencies, customs and health regulatory bodies, operations triggered raids at shops, markets, chemists, retail outlets, warehouses and border control points. Global seizures include 7.2 million counterfeit, and illicit items weighing more than 120 tonnes and 90,000 litres of liquids. Beyond product seizures, national authorities have identified major trade routes and shut down points of sale as well as laboratories. Crucial global police support from INTERPOL Throughout operations, involved countries were able to check infor mation against INTERPOL’s criminal databases via its I-24/7 secure global police communications network. Coordinated by INTERPOL’s Illicit Goods and Global Health unit with support from the regional bureaus in Buenos Aires, Abidjan and Harare, the operations were made possible by the INTERPOL Foundation for a Safer World which helps raise funds globally to tackle the critical issues shaping the global security landscape. “By attacking the distribution networks, and by disrupting production at the source, participating countries have contributed towards globally protecting people from potentially unsafe goods, and made them safer by dismantling illegal networks which are often connected to other forms of serious crime,” said Tim Morris, “INTERPOL’s Executive Director of Police Services, “The sheer volume of seizures and follow-up investigations generated by these simultaneous global operations are testimony to the fundamental role of INTERPOL in shaping a coordinated response in regional and international operations : it is all about collaboration.” A truly global exercise Operations were conducted across Africa (with two operations codenamed ‘Afya’ and ‘Heera II’), Asia (‘Rainfall’), South America (‘Jupiter IX’) and the Middle East and North Africa (‘Qanoon’). More than three million packets of cigarettes and cigars were seized across South America during Operation Jupiter, along with 9.5 tonnes of food products, tens of thousands of fashion accessories, alcoholic drinks, school supplies and more than 35,000 litres of smuggled fuel. During Africa’s Operation Afya, Botswana police authorities arrested a man smuggling 2,500 counterfeit brand shoes, jackets, and handbags across the border with South Africa. In the Namibian capital, authorities seized 14,000 items of counterfeit goods. In Dar es Salaam, Tanzania’s Food and Drug Administration seized USD 8,300-worth of counterfeit medical products including antibiotics, antimalarial tablets, Ferrous Sulphate and analgesics. Zimbabwe police seized 5,700 tablets of counterfeit pharmaceuticals and 250kg of skin lotions smuggled from Zambia. In Western Africa, Operation Heera II saw the identification of smuggling transit routes including one where a counterfeit brand of antalgic tablet was being distributed to western African countries by road after importation to Benin, Ghana and Togo seaports. At Niger’s Makalondi Border Crossing Point, police intercepted 29 tonnes of counterfeit medicines in two trucks thought to be travelling from Ghana. Three suspects were arrested and investigations are ongoing. In Ghana and Cote d’Ivoire, authorities closed down 10 chemists and one illicit manufacturing facility and arrested 11 suspects. Across the Middle East and North Africa, Operation Qanoon saw authorities in Saudi Arabia detect, investigate and shut down 100 social media accounts used to distribute counterfeit medical products and unlicensed cosmetics and herbal products. Mauritania seized tens of thousands of counterfeit medical products including antihistamines, corticosteroids, antibiotics, antimalarial tablets, analgesics, pregnancy tests, and vitamin supplements. At Jordan’s Aqaba seaport, authorities seized a container from India containing 500,000 pills of antalgic pills bound for Iraq. In Asia, Operation Rainfall saw Nepalese police seize 5,399 doses of opioid analgesics in a vehicle thought to have travelled from India. Laotian Customs, Food and Drug Department worked with Thai national police at the Lao-Thai Friendship Bridge, seizing 25 kg of illegal traditional medicines.

Read More

Hikvision Face Recognition Terminals

Hikvision has launched a range of groundbreaking face recognition terminals. Hikvision’s face recognition terminals are embedded with deep-learning algorithms for access control and office scenarios for improving building operations, workforce management and safety operations. Three face recognition terminal models are available, each one uniquely and flexibly designed for a wealth of applications and scenarios: Wall-mounted face recognition terminal: DS-K1T604MF & DS-K1T606MF. Base- or wall-mounted face recognition terminal: DSK1T605MF. Face recognition component for access turnstile: DS-K5603-Z. All three of these models are easy to install and use. The wall-mounted terminal is well-suited for quick access at an entrance. The base and wall-mounted terminal can be mounted on convenient vertical surfaces or on the front desk. The face recognition component is designed for use in conjunction with access turnstiles. If needed, this model can be rotated horizontally upon installation for capturing facial images at the most effective angle. Various models and types are available with a wide variety of front-end or back-end combinations to meet a multitude of scenarios and environments. Hikvision’s face recognition terminals support 1:1 or 1:N matching modes, authentication via Mifare cards, and TCP/IP or RS-485 connectivity. Accurate and fast face recognition Hikvision has embedded Deep-Learning algorithms into its face recognition terminals, providing fewer trans mission delays and a reduced load on backend components. As a result, the terminals have a high success rate – the facecapture rate can hit 99% accuracy at less than 0.5 seconds. During rush hours, access turnstiles equipped with Hikvision’s face recognition terminals can respond in less than a half-second, passing up to 40 persons per minute. DS-K5603-Z with access turnstile Hikvision’s face recognition terminals apply to a wide variety of scenarios and environments and can be highly personalized. Multiple authentication modes are available – face images, swiping ID card and comparing images, custom modes, and more. Applications range from commercial real estate, government agencies, small to very large businesses or factories, just to name a few.

Read More

Benefits of Edge Analytics Camera

Edge analytics refers to the approach adopted by companies towards data collection and analysis. So, instead of waiting for the data to arrive at a centralized location or data store, it is analyzed by means of automated computation at the network switch or device. As the Internet of Things or IoT gains momentum, edge analytics is becoming crucial for companies worldwide. The massive glut of data that gets collected over time is impossible to manage unless of course you have proper analytics algorithm in place. Edge analytics can save time, though full efficiency can be attained only if you have a good edge analytics camera. The role of edge analytics varies depending on the type of algorithms used and the kind of data that needs to be analyzed. So, if you are using an edge analytics enabled camera in a highly sensitive area, the camera can be configured to trigger an alarm on any kind of unusual movement in the zone of coverage so as to alert the respective system operators or managers about the same. This kind of arrangement helps managers efficiently manage their facility. Scalability is yet another benefit that is making edge analytics extremely popular. Despite the vast number of connected devices, organizations do not feel the strain of processing such high volumes of data. Edge analytics, which is nothing but built-in intelligence within the camera, helps reduce the processing load on the server. It empowers the network video recorders or the NVRs to perform more efficiently. It also offsets the additional cost of having on-board analytics since the network bandwidth and storage requirements are less stringent. Edge analytics uses several algorithms to learn a particular situation and create alarms based on anomalies. Commonly used edge analytics include motion detection, loitering detection, wire cross detection, intrusion detection, abandon detection, loss detection, face detection, people counting, crowd density detection, crowd gathering detection, fights detection, queue length detection, customer focus detection, exceptional sound detection etc. The specifications of the edge analytics camera should therefore be strong enough to capture such intelligent information. –Milind Borkar, Vice President – India, Middle East & Africa   

Read More

Fortinet Reminds Parents in India to Protect Children Online

Fortinet, the leading global player in broad, integrated and automated cybersecurity solutions, has recently cautioned parents to supervise children’s online activities and educate them on safe surfing. The Internet provides unprecedented opportunities for children to communicate, learn and develop new skills. However, parents need to be aware that predators lurk online and could potentially expose children to inappropriate content, criminal behavior and falsehoods. According to a UNESCO global survey on cyber-bullying covering over 7,600 children and youth (aged 8-17 years old) in 25 countries, the highest rate of cyber-bullying is in Asia – China (70%), Singapore (58%), and India (53%). China and Singapore were also the only countries to report a higher rate of online bullying than face-to-face bullying. Other Asian countries that reported lower levels of cyber-bullying include Malaysia (33%), Pakistan (26%) and Japan (17%). “As the Internet, particularly mobile broadband, becomes more accessible and affordable, more children are going online for longer periods. Parents need to be more aware of the dangers lurking on the Internet,” said Rajesh Maurya, Regional Vice President, India & SAARC, Fortinet, “While the Internet offers educational material, fun games and ways to connect with friends, it can also be a virtual playground for cyber bullying, malicious content, and for criminals or predators to prey on kids and their families, leading to things such as identity theft, crime and much worse.” To help ensure kids stay safe online, Fortinet’s cybersecurity experts advised parents to: 1.Talk to children about your expectations for them online: Try setting boundaries that may include rules about how long they are allowed to be on the computer, what sites they are allowed to visit, what software programs can be used, and what tasks or activities they are allowed to do based on age suitability, knowledge and maturity. 2.Teach the importance of keeping information private: Personal information and photos posted on the Internet can be dangerous as they can be used against families by those who meant harm. Once uploaded on the public domain, it can be difficult to remove them and can have haunting effects later if misused. Check the kid’s privacy settings on social media sites to prevent strangers from accessing personal information. Make sure your children understand: Never to give their name, phone number, email address, password, address, school name, or picture without your permission. Do not respond to malicious or hurtful posts. Do not open e-mails or attachments from people they don’t know. Do not get together with anyone they ‘meet’ online. Let them know that if they see something, say something: Children should be warned about the dangers of the Internet so that they recognize suspicious behaviour or activity. Allow children to come to the parents with questions or concerns if they happen to see something on a website, in an email or in a chat room that does not seem right or makes them uncomfortable. Be aware of their computer activities: Monitor your children’s activities online including which websites they are visiting. Ensure you have a sense of who they are communicating with and that your children actually know the people they are talking to if they are using email, instant messaging or chat rooms. Keep computers in a common area: It will be much easier to monitor computer activity if you keep your computer in a common area. This prevents kids from doing things they shouldn’t do, and you can also intervene should you notice a behavour that could have negative consequences. Consider implementing parental controls: Certain web browsers enable you to restrict or allow only certain websites to be viewed on computer, which is known as ‘whitelisting,’ and these settings can be protected by a password. Although no technology is fool-proof, there are available commercial software applications that can be installed to monitor, filter and restrict access to dangerous content online. Parents can also check with their Internet service providers and mobile carriers if they provide restriction services as optional addons. Fortinet secures large enterprises, service providers, and government organizations around the world, and empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network – today and into the future. The Fortinet Security Fabric architecture can deliver security features without compromise to address the most critical security challenges, whether in networked, application, cloud or mobile environments. Fortinet ranks #1 in the most security appliances shipped worldwide and more than 350,000 customers trust Fortinet to protect their businesses. As every family situation is different, you need to decide what is best for your family. Parents need to help their kids become more cyber-savvy and at the same time, put effective protection methods in place to keep them safe online. – Rajesh Maurya Regional Vice President, India & SAARC, Fortinet  

Read More

The Convergence between Security Systems & IT Networking

It wasn’t so long ago that deploying a CCTV system involved a number of cameras, a roll of coax and a digital video recorder (DVR). If an access control system was required, that made a standalone system that used twisted pair for the card reader and door strike, and the integration between the two systems was extremely limited. Today’s security systems have dramatically evolved and offer far greater functionality. They are truly integrated, and the integration lies not only between the different elements of the security system but extends to other systems as well; for instance, an access control system is integrated with the payroll and human resources systems for time and attendance information. The drivers for this integration or convergence are two-fold – first being the advances in technology that have enabled these systems to move from standalone to fully integrated ones, especially the standardization in the digitization, encapsulation and transmission of information. The second driver is the rising demand from customers for platforms that deliver greater functionality or improved efficiency, or both. As information from access control, CCTV, building management systems (BMS) and other associated platforms has evolved from analog to digital; they can easily be transported over modern communication systems. These communication systems include local networks where Category 5, 6 or 7 unshielded twisted pair (UTP) is commonly used, or where distance is the limiting factor, fibre may be used. Wireless technology is also becoming increasingly popular for temporary installations, or where deployment of copper or fibre infrastructure is either impractical or cost prohibitive. All of these physical mediums have one thing in common that they are used to deliver connectivity between devices or components of an integrated security system. These devices can include cameras, encoders, card readers, access control panels, servers, storage and workstations, to name a few. The protocol or standard that enables them to communicate with each other, regardless of vendor or physical media, is the Internet Protocol or IP. IP, often referred to as TCP/ IP, is a suite of different protocols that are used to interconnect devices within a network. While IP may be seen by many as a black art exclusively for techno-geeks, due to the convergence that is occurring in many areas such as voice communications and physical security, it has become necessary for PBX technicians and security installers to have a greater understanding of how today’s IT networks work. This is not just limited to IP but also to the underlying physical media as the application for different media in an IP network may be quite different to that of an analog installation. The good news is that while there are plenty of individuals and organizations that profit from making networking out to be a black-art that is complex and difficult, the reality is that with the basic understanding of how networks work, it’s not as difficult. There are two primary protocols that are used within the IP protocol suite – Transmission Control Protocol or TCP and User Datagram Protocol or UDP. TCP can be seen as similar to a voice conversation on a telephone where a call is established, and information is transmitted and acknowledged until there is no further information to be transmitted, or where the call is torn down. If the information is lost, an acknowledgment is not received and the information is resent. UDP is more akin to a letter that is sent by post where the information is encapsulated and sent across the network, and if all goes well, the information will arrive at its intended destination, but there are no guarantees. TCP is ideal for the transmission of lots of information where the accuracy of the information is important. Examples of applications that use TCP include Web traffic (using the HTTP protocol) and email (using the SMTP protocol). UDP is ideal for the transmission of real-time information such as voice (using the SIP protocol) and video (using protocols like RTP). The primary reason for using UDP over TCP for realtime transmission is that if information is lost, there is little point in asking for it to be retransmitted as it is no longer relevant; and with a well-designed network using equipment from a reputable networking vendor, the probability of errors is extremely low. In order to design an IP network for a security system or solution, there are many points/ questions that need to be asked/ addressed: Which application or applications (i.e., CCTV, access control, IP intercom, BMS, VoIP) will operate across the network? Do the applications use unicast or multicast system for the transmission of information? If CCTV is in use – how many cameras, which frame rate, and what resolution of the cameras will be used? Do the end-points require POE (802.3af) or POE+ (802.3at) or even POE++ (802.3bt), and if so, what POE class do the devices belong to? What speed does each of the endpoints connect at? Is the given installation new or an upgrade, or extension of an existing system, and what physical media exists or has been proposed? What level of redundancy (interface, link, power, device, site) is required from the network? While this list may sound extensive, there is a reason for asking each question and the answer will better enable the network to be dimensioned. When designing a network, it is beneficial to create a virtual LAN (VLAN) for each different application in use on the network. This separation reduces the number of devices in any given VLAN which reduces the amount of broadcast traffic and improves performance and also ensures that if one application is misconfigured or misbehaves, it is less likely to affect other applications using the network. Unicast traffic is similar to a voice conversation between two people where information is sent from one to another. This is the kind of traffic that is used between a workstation and the server when retrieving a file. Multicast traffic is similar to a magazine subscription where specific information is sent to specific recipients…

Read More

Ashish P Dhakan Recognized as IFSEC Global Influencer 2018

Ashish P Dhakan, India’s renowned security technology leader and the MD & CEO of Prama Hikvision has been named as IFSEC Global Influencer 2018 in the Security Tech Leaders category. He was the only Indian entry among the top ten security technology leaders list. The IFSEC Global influencer recognition is an honour that reaffirms the faith in our vision, and inspires us to develop more India specific products and solutions. We remain committed to bring in our globally acclaimed technology like deep learning, AI, AI Cloud, big data and IoT to ensure that our country and fellow countrymen remain safe. – Ashish P Dhakan MD & CEO, Prama Hikvision Mr. Dhakan has been working relentlessly to raise the bar of the security industry in India through innovation, technology, training, awareness and advocacy. He has been instrumental in the success of Prama Hikvision – the first joint venture company formed by Hikvision beyond China – through a pan-India network of dealers, distributors and system integrators. His ability to elevate the industry globally gave him this recognition. According to the IFSEC Global nomination, “His involvement with the relevant bodies in our industry, complemented by his blogs and contributions to industry media channels, has helped shape the shift from traditional people-based deployment to technology-led solution deployment. He has set up an exclusive forum for current and potential clients to debate and discuss the future of the security industry, challenging the norm and constantly assessing emerging technologies.” IFSEC Global defines an influencer as someone who plays a key role in driving technological innovations, has been a driving force in changing regulation and standards, an opinion leader, a turnaround business leader, and someone who has been an influential voice in the national media for the overall security and surveillance industry. Mr. Dhakan has played a key role in setting up a state-of-the-art training centre in India to train system integrators, partners and end-users. He is also a driving force behind Hikvision’s ‘Make-in–India’ plan supporting the government’s ambitious ‘Makein-India’ programme. With this initiative Hikvision will be setting up a world-class manufacturing plant to cater to India and the overseas market.

Read More

Make in India for UAS

FICCI has recently organised a conference on ‘Make in India for UAS’ at Federation House, New Delhi, in association with Ministry of Civil Aviation, Government of India. Amitabh Kant, CEO, NITI Aayog, Government of India said in his keynote address that integrating UAVs in civilian space is a challenging job, and therefore, requires an appropriate regulatory framework, however, Unmanned Aircraft System (UAS) has the potential to transform many sectors and modernize India rapidly. India must aspire to become a global manufacturing hub of Unmanned Aircraft System.   – Amitabh Kant CEO, NITI Aayog, Govt. of India   “It is important for India to facilitate and promote the development of UAS industry, strive towards global leadership, and also aspire to become a global manufacturing hub in times to come. Widespread adoption of UAS through a facilitative framework would be a transformation step in ease of doing business,” Mr. Kant said. He reiterated that drones are going to replace 80% of the operations presently carried out by the manned aircrafts. Indian market for UAS will be US $50 billion over the next 15 years. India must realize the full potential of this technology and leverage it as a powerful tool not only for the security and safety, good governance, increased productivity, but also to encourage consumer in commercial applications to develop a sophisticated UAS industry sector and make a new India by 2022.” He also recommended that: The sector must aggregate the demand and push for make in India, India should aspire to be a global hub for design, development and manufacture for all types of UAS, and The regulatory framework for opening up UAS operations for civil and commercial services be promulgated early in line with the global best practices. Anil Aggarwal, Joint Secretary, DIPP, Govt. of India said that the Civil Aviation Ministry is likely to begin the registration process of drones soon, “We need regulations for usage of drones in terms of altitude, endurance and categorization. UAS industry is at the cusp now. As per the estimates, by 2023, UAS industry has US$1 billion opportunity in India.” He added that the policy is going to be comprehensive, and we must have the capabilities of designing and manufacturing in India so that the IP stays with us. Rahul Chaudhary, Chair, FICCI Homeland Security Committee and Former CEO, Tata Power SED said that if the regulations are right, UAS industry can be a growth driver for the Indian economy in times to come. He added that the Indian UAV market is projected to grow at a CAGR of 18%. Vaibhav Gupta, Member, FICCI Homeland Security Committee and Director, MKU Pvt. Ltd. said that better policy framework will ensure safety and also an online portal for application and approval would make the process efficient and transparent thereby generating more interest and encouraging more usage. Rammohan Thygarajan, Partner, Advisory Services – Digital, EY, in his theme address said that there is a need to leverage synergies between UAS and emerging technologies to draw insights across industries. India should create an environment for various players in this ecosystem of companies and start-ups to collaborate and create value for each other.

Read More

Tackling Future Policing Challenges with AI, Robotics

The latest robots, virtual communication tools and facial recognition software were recently on display at the INTERPOL Global Complex for Innovation, as experts from different sectors gathered to consider practical applications of these new technologies for law enforcement. Technological advances in the fields of artificial intelligence and robotics – from facial recognition to ‘future casting’ technology – can have many implications for police worldwide, both positive and negative. In the hands of criminals, these technologies can pose digital and physical threats, while at the same time these tools offer new opportunities to police in combating crime. The first global meeting to examine the opportunities and risks of AI and robotics for law enforcement was organized by INTERPOL’s Innovation Centre and the United Nations Interregional Crime and Justice Research Institute (UNICRI), through its Centre for Artificial Intelligence and Robotics. The two-day (11 and 12 July) conference brought together some 50 participants from law enforcement in 13 countries and partners from the private sector and academia to exchange expertise on the latest developments in the fields of AI and robotics, understand how they can be used by the law enforcement to support their activities, and gain insight on potential challenges. Discussions on ways that police could adopt these emerging solutions looked at the use of AI for conducting virtual autopsies; crime prediction systems to support police to optimize resources; behaviour detection tools; techniques to autonomously research, analyse and respond to international mutual legal assistance requests; blockchain-based traceability approaches that respect privacy; and autonomous patrol vehicles. The participants also considered ethical challenges such innovations could present to police such as ensuring AI is fair, explainable and transparent and balancing the need for security with the right to privacy. They underlined the need to have further discussions on ethics and privacy, and a call was made for a follow-up meeting on this topic. “Innovation is not a matter for police alone. Strong partnerships between all stakeholders with expertise is necessary to ensure police can quickly adapt to future challenges and formulate inventive solutions,” said Anita Hazenberg, Director of INTERPOL’s Innovation Centre. Several private sector companies gave live demonstrations of virtual communications, facial recognition, and incident prediction and response optimization systems to provide their law enforcement counterparts a better understanding of how such technologies work and could benefit the policing community. Police forces which are already using innovative technologies such as the Singapore Police Force’s patrolling robots, to assist their daily work shared their experiences during the conference. “I believe that we are taking critical first steps to build a platform for ‘future-proofing’ law enforcement,” said Irakli Beridze of the UNICRI Centre for Artificial Intelligence and Robotics. “Initiatives such as this will help us prepare for potential future types of crime and capitalize on technological advancements to develop new and effective tools for law enforcement,” he concluded. Building upon the issues discussed during the conference, INTERPOL are exploring whether the many examples presented could be part of the Interpol Police Technology and Innovation Radar. INTERPOL will also hold a drone expert forum in August to further assist police in understanding how drones can at the same time be a tool, a threat and a source of evidence.

Read More