Police Automation
Today, one of the main objectives of the government and other state institutions is to provide security for its people. With the expansion of EU, massive globalization programs, increased internationalization, the officials are facing a challenge to sustain law and order in a big multinational society. The police has to be efficient at dealing with different day-to-day operations in order to maintain its competitiveness and authoritative power in a modern environment.
CCIS CCS's mission in this industry is to provide Command and Control Software for the automation of Police Records, Resources and Operations. CCS differentiates its products by providing its users with solution of ultimate performance, flexibility and interoperability.
The most important requirement for any real time command and control system is the ability to offer a commander the information to make a rapid assessment of the dynamic situation. The quality and speed of the information allows the user to make decisions more quickly and shortens the response time to the changing tactical situation. CCIS is the solution which facilitates the provision of security services to people at large, and the control of specific situations with people and of selected populations, ensuring rapid deployment and secure Incident Control. Diverse data integration and wide area geo-spatial coverage that we offer are a key to successful solutions in a variety of command and control applications.
ABCS (Automatic Border Control System) provides automation and tracking mechanisms for all activities related to traffic across a territory's borders. ABCS allows Police, Customs and Security Personnel to account for anyone arriving in, or departing from any defined territory. Such a solution indirectly involves the function of political control. Recent trends and innovations, including the implications of globalization, militarization, and immigration, gives rise to the need of thorough control systems in UK and worldwide. Developments in surveillance technology, including the emergence of new forms of local, national and international communications interceptions networks requires fast and efficient border monitoring system. ABCS is designed to streamline critical immigration functions by synchronizing information between all border points, all airports, all seaports and any other checkpoints that may be necessary to maintain order and civil liberty within the state where the system is incorporated. ABCS takes into account its multi-functionality and its role in yielding an extension of scope, efficiency and growth of policing power. It identifies the continuum of control by monitoring the travelers' activities. ABCS is multilingual and can also utilize Biometric information for increased security. ABCS updates relevant records of travelers around borders 'in real time' so that the system provides up-to-date information for users such as Immigration Check-Point officers.
AFIS CCS works closely with our renowned technology partners around security applications. CCS constructs solutions that are evolved around identification systems. The latter is usually categorized into three main areas: what an individual possesses (e.g. bank smartcard), what an individual knows (e.g. PIN number), and what an individual has as part of themselves which is unique to that individual, such as a biometric characteristic (e.g. fingerprints). Only one of these characteristCCS cannot be replicated, and that is biometric information. CCS regards biometric technology as a highly reliable and cost effective solution to be implemented in many different scenarios and industry systems requiring verification or identification of an individual.
A biometric attribute is unique and is impossible to change or copy. Therefore, When considering a biometric solution the type of biometric must be carefully assessed to ensure user acceptance of the system. When dealing with the public it has been proven that retina and facial scanning is not acceptable to most individuals and the latter often involves high fixed costs, however finger or hand scanning received a positive response. Our solution, which involves fingerprint identification, has uses in passports, identity cards, driving licenses, computer security and access control systems, as well as forensic and CID applications. AFIS (Automatic Fingerprint Information System) uses technology now employed by police, governments and commercial markets around the globe.
Biometric systems can be broadly categorized into two areas:
Verification Verification involves ascertaining and verifying that an individual is who they purport to be. In an AFIS system this involves several steps:
- The individual's biometric data, in this case a fingerprint, must be registered on the system - this is a one off process.
- The biometric data must be stored on a fast retrieval medium.
- The biometric must be read, to verify the individual.
- The biometric must be matched against the stored image of the relevant biometric, and verified that a positive match has been made.
- The transaction can then proceed.
In the case of verification the scanned biometric need only be matched against one stored image to ascertain validity of the individual. In the case of a financial institution the stored biometric image would be linked to a clients account number therefore when the client requests a transaction the stored biometric is retrieved along with the account details and information. This ensures a rapid turn around of the processing of the transaction. A three way verification process can be implemented whereby the fingerprint image is stored both at a central database and on the client's bank smartcard. The following illustrates an ATM transaction as an example:
- The client inserts their card into the ATM.
- The ATM accepts and reads the relevant data from the card.
- The ATM issues a request to the host for account details.
- The host responds with account details and relevant biometric image.
- The client is prompted to place their finger on the scanner.
- The ATM verifies the placed image against the image from the host and the image stored on the smartcard.
- The transaction is ratified or rejected.
In the above scenario a PIN number may still be requested to add a further layer of security.
Dependent on the IT and Communications infrastructure the verification process will add very little time to the whole transaction as the only added overhead is the processing of one image against another single image. In certain cases such as joint account holders the image may have to be verified against two images.
Identification Identification can be described as identifying an individual against millions of other unique individuals. This form of systems is predominantly used in a Law Enforcement environment to identify an unknown individual. To identify a unique unknown individual is a considerably lengthier process than verifying an individual. The reasons for this are: An unknown individual is as it implies unknown therefore a biometric characteristic of that individual may well exist however because the individual is unknown his/her biometric characteristic must be checked against every individual biometric image stored on a biometric system. This may take only several seconds should the scanned image match one of the first images stored on the database; however it may well take several hours if the whole database has to be scanned. A typical example of biometric identification is the system in use by the American FBI; this system has in excess of 30 million images stored on it. Search time can therefore be lengthy; however in this case speed of identification is not necessarily a critical factor.
Verification versus Identification Verification is used in scenarios where fast matching of a known individual to a single known biometric image is required. Typically this is required in a Banking environment where transaction time is mission critical and reliability of the match is vital. Identification is used in scenario's where the speed of matching an unknown Individual to a known biometric image is not critical. Typically this is used in Law Enforcement applications.