Police Innovative Reporting Technology

The latest version of a documentation and report system for law enforcement professionals was unveiled recently.

Dragon Law Enforcement by Nuance Communications is a professional productivity solution designed specifically for law enforcement professionals.

The system brings highly customised dictation and documentation capabilities to police officers, sergeants, detectives, and other command and support staff, at the station and while on patrol.

Accurate, timely and detailed documentation is extremely important to law enforcement and criminal justice proceedings, typically required within hours of an incident.

However, this time-consuming documentation process often impacts timely report filing, limits officer visibility in the community, and, more importantly, can compromise situational awareness when officers are “heads down” reporting or looking up license plate information.

With advanced speech recognition and robust voice command capabilities, law enforcement professionals can create detailed and accurate documentation of incidents.

This is all in real-time by voice, speed data entry into records management systems (RMS), and keep their eyes on their surroundings by minimising the use of the mobile data terminal (MDT) keyboard while stationary in patrol cars.

The development has been updated to include a next-generation speech engine leveraging Nuance Deep Learning technology, so it delivers high-recognition accuracy with the ability to learn and adapt to a variety of accents and environments; making it ideal for large workgroups and a variety of settings.

Its customised language model has also been updated to support common words and phrases used by law enforcement such as car and truck makes and models.

The vocabulary can also be additionally expanded to include custom or localised words and phrases specific to a department’s needs, such as particular names or terminology they use with a high degree of frequency.

Dragon Law Enforcement’s powerful license plate lookup mode also enables officers to automatically switch from dictation to conducting common lookup tasks where they can use the NATO phonetic alphabet.

I-HLS:

You Might Also Read

Visualisation Tech Helps Police Process Complex Data:

Police Connectivity: In-Car Video & Body Cameras:

 

 

 

« Major Defence Company Adopts Blockchain
EU Nations Expand Their Cyber Defences »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

HyTrust

HyTrust

HyTrust specialises in security, compliance and control software for virtualization and cloud environments.

SBS CyberSecurity

SBS CyberSecurity

SBS CyberSecurity is a premier cybersecurity consulting and audit firm.

PECB

PECB

PECB is a certification body for persons, management systems, and products on a wide range of international standards in a range of areas including Information Security and Risk Management.

Centurion Information Security

Centurion Information Security

Centurion Information Security is a consulting firm based in Singapore that specialises in penetration testing and security assessment services.

Cybersecurity Competence Center (C3)

Cybersecurity Competence Center (C3)

The Cybersecurity Competence Center was created to further strengthen the Luxembourg economy in the field of cybersecurity.

Vigilant Software

Vigilant Software

Vigilant Software develops industry-leading tools for intelligent, simplified compliance, including ISO27001-risk management and EU GDPR.

24By7Security

24By7Security

24By7Security are Cybersecurity & Compliance Specialists with extensive hands on experience helping businesses build a defensive IT Infrastructure against all cyber security threats.

DeepFactor

DeepFactor

DeepFactor is the industry’s first Continuous Observability platform enabling Engineering and AppSec teams to find and triage RUNTIME security, privacy, and compliance risks in your applications.

Swissbit

Swissbit

Swissbit AG is the leading European manufacturer of storage, security and embedded IoT solutions for demanding applications.

Aite-Novarica Group

Aite-Novarica Group

Aite-Novarica's Cybersecurity practice provides ongoing research and advisory services to chief information security officers focused on protecting their companies’ assets.

Nasuni

Nasuni

The Nasuni File Data Platform offers the protection, detection, and recovery of file shares from ransomware attacks or random disasters within minutes.

Ghost Security

Ghost Security

Ghost is a venture backed, product-led startup building the new standard in application security for the modern enterprise.

Segra

Segra

Segra owns and operates one of the nation’s largest fiber networks and provides best-in-class broadband and data security solutions throughout the Southeast and Mid-Atlantic.

Inholo

Inholo

Inholo offers tools to manage the risks of synthetic realities, starting with an AI-photo detection service.

Resmo

Resmo

Resmo is an all in one platform for SaaS app and access management for modern IT teams.

CardinalOps

CardinalOps

The CardinalOps platform continuously assesses your detection posture and eliminates coverage gaps in your existing detection stack so you can easily implement a threat-informed defense.