World First Police 3D Security Scanner

Law enforcement teams can now determine if someone is carrying a weapon or explosive, all without the need for a physical search, and rapidly identify a person of interest, thanks to the world’s first mobile 3D imaging scanner.

The device attaches to a smartphone and is controlled by a dedicated app. From a distance of up to 40 feet, security agents or law enforcement personnel can scan individuals in a crowd or an approaching person of interest simply by pointing their smartphone at them with the SWORD device attached. 

It can be used also to scan backpacks and handbags that are being carried or have been left unattended. It can also detect listening devices used for espionage and intelligence gathering. The device, based on a unique mobile platform developed by Royal Holdings, encompasses proprietary software integrated with AI, machine learning, and facial recognition capabilities.
It attaches to a Google Pixel 2 XL smartphone and Apple’s iPhone 8 Plus. 

A featureless outline of the person being scanned is displayed, instantly alerting agents to location and type of concealed weapons or explosives. 

The technology employs artificial intelligence to quickly cross-check and verify weapons and explosives with its securely maintained cloud-based database. In addition, built-in facial recognition operating in real time compares suspects to watch lists for positive identification. 

According to officer.com, the device operates globally and features real-time location sharing and generates real-time alerts in the event of a mass shooting, terror threat, or terror attack. 

Response time to possible threats is cut to mere seconds, empowering safety and security teams with vital information they can use to proactively diffuse or contain a potential threat.

SWORD is based on a programmable 3D sensor that penetrates objects via radio frequency technology. When a security agent directs the handheld device at a person and begins scanning, an array of antennae transmits signals towards the individual, illuminating the area in front of the person.  The same antennae receive returning signals which are captured and recorded by a System-on-Chip (SoC) integrated circuit. The system simultaneously interfaces with two databases: one for weapons and explosives, one for persons of interest on a watch list developed by the user. 

The facial recognition feature scans the person’s face, checks the image against the watch list, and alerts the user if there is a match. Should an individual displaying threatening behavior not be on the watch list, SWORD can access an extensive, strictly managed law enforcement database.

All of these functions occur in milli-seconds, giving agents in the field the edge they need to prevent or mitigate harm in a potentially life-threatening situation.

I-HLS

You MIght Also Read: 

High Performance Face Recognition:

Anti-Surveillance Clothing Thwarts Facial Recognition:

« NCSC Investigate Giant Dixons Data Breach
Are US Federal Cyber Workers Good Enough? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

TrustedSec

TrustedSec

TrustedSec is an information security consulting services, providing tailored solutions and services for small, mid, and large businesses.

APMG International (APM Group)

APMG International (APM Group)

APM Group is a global accreditation, certification and examination body specializing in certification schemes for individuals, organizations and software.

LexisNexis Risk Solutions

LexisNexis Risk Solutions

LexisNexis Risk Solutions provides technology solutions for Anti-Money Laundering, Fraud Mitigation, Anti-Bribery and Corruption, Identity Management, Tracing and Investigation.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

Eperi

Eperi

Eperi is a leading provider of Cloud Data Protection (CDP) solutions with 15 years of experience in data encryption for databases, (SaaS) applications and files.

NDK InfoSec

NDK InfoSec

NDK InfoSec is a specialist Information Security and Cyber Security search firm. We're not just a security function in a larger generalist recruitment company.

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky addresses all the cybersecurity needs of industrial organizations in its Kaspersky Industrial CyberSecurity (KICS) portfolio.

Bugv

Bugv

Bugv is a crowdsourcing cybersecurity platform powered by human intelligence where we connect businesses with cyber security experts, ethical hackers, bug bounty hunters from all around the world.

Beyon Cyber

Beyon Cyber

Beyon Cyber offer a complete portfolio of advanced solutions & services for cyber security in Bahrain.

Velum Labs

Velum Labs

Velum Labs is a cyber intelligence company that provides simple and non-intrusive, cloud and cyber intelligence solutions; built from a market-leading understanding of cyber-attack methodology.

D.med Software

D.med Software

D.med Software is a company with a focus on cybersecurity for embedded software and cloud applications for the medical industry.

Systal Technology Solutions

Systal Technology Solutions

Systal is a global managed network and security service and transformation specialist. We help enterprise-level businesses maximise the security and business value of their complex IT infrastructure.

OxCyber

OxCyber

OxCyber's mission is to ignite and encourage cybersecurity and technology growth in the Thames Valley through meetings, webinars, in person events, workshops and mentorship programs.

OpenAI

OpenAI

OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity.

American Binary

American Binary

American Binary is a Quantum Safe Networking (TM) and post-quantum encryption company.

National Cyber Force (NCF)

National Cyber Force (NCF)

The National Cyber Force (NCF) is a partnership between defence and intelligence.