World First Police 3D Security Scanner

Law enforcement teams can now determine if someone is carrying a weapon or explosive, all without the need for a physical search, and rapidly identify a person of interest, thanks to the world’s first mobile 3D imaging scanner.

The device attaches to a smartphone and is controlled by a dedicated app. From a distance of up to 40 feet, security agents or law enforcement personnel can scan individuals in a crowd or an approaching person of interest simply by pointing their smartphone at them with the SWORD device attached. 

It can be used also to scan backpacks and handbags that are being carried or have been left unattended. It can also detect listening devices used for espionage and intelligence gathering. The device, based on a unique mobile platform developed by Royal Holdings, encompasses proprietary software integrated with AI, machine learning, and facial recognition capabilities.
It attaches to a Google Pixel 2 XL smartphone and Apple’s iPhone 8 Plus. 

A featureless outline of the person being scanned is displayed, instantly alerting agents to location and type of concealed weapons or explosives. 

The technology employs artificial intelligence to quickly cross-check and verify weapons and explosives with its securely maintained cloud-based database. In addition, built-in facial recognition operating in real time compares suspects to watch lists for positive identification. 

According to officer.com, the device operates globally and features real-time location sharing and generates real-time alerts in the event of a mass shooting, terror threat, or terror attack. 

Response time to possible threats is cut to mere seconds, empowering safety and security teams with vital information they can use to proactively diffuse or contain a potential threat.

SWORD is based on a programmable 3D sensor that penetrates objects via radio frequency technology. When a security agent directs the handheld device at a person and begins scanning, an array of antennae transmits signals towards the individual, illuminating the area in front of the person.  The same antennae receive returning signals which are captured and recorded by a System-on-Chip (SoC) integrated circuit. The system simultaneously interfaces with two databases: one for weapons and explosives, one for persons of interest on a watch list developed by the user. 

The facial recognition feature scans the person’s face, checks the image against the watch list, and alerts the user if there is a match. Should an individual displaying threatening behavior not be on the watch list, SWORD can access an extensive, strictly managed law enforcement database.

All of these functions occur in milli-seconds, giving agents in the field the edge they need to prevent or mitigate harm in a potentially life-threatening situation.

I-HLS

You MIght Also Read: 

High Performance Face Recognition:

Anti-Surveillance Clothing Thwarts Facial Recognition:

« NCSC Investigate Giant Dixons Data Breach
Are US Federal Cyber Workers Good Enough? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Bloombase

Bloombase

Bloombase is the leading innovator in Next-Generation Data Security solutions for Global 2000-scale organizations

RPC

RPC

RPC is a business law firm. Practice areas include technology and cyber risk.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Parsons

Parsons

Parsons has developed a converged security offering that combines cybersecurity, integrated network solutions, and critical infrastructure protection.

AntemetA

AntemetA

AntemetA specializes in network infrastructure, security and cloud computing, helping companies transform their Information Systems.

CSIRT-NQN

CSIRT-NQN

CSIRT-NQN is the Computer Incident Response Team for the Argentine province of Neuquen.

Telelogos

Telelogos

Telelogos is a European provider of Enterprise Mobility Management software, Digital Signage software and Data Transfer and Synchronization software.

URS Certification

URS Certification

United Registrar of Systems (URS Certification) is an independent certification body operating in more than 30 countries within the multinational URS Holdings.

IMQ Group

IMQ Group

IMQ is one of Europe’s top players in the field of conformity assessment. We offer certification services to support all the major sectors of the manufacturing and service industries.

Prevasio

Prevasio

Prevasio is a next-gen Cloud Security Posture Management (CSPM) with a built-in Vulnerability and Anti-Malware Scan for Containers.

Concourse Labs

Concourse Labs

Concourse Labs Security Guardrails continuously verify cloud infrastructure and workloads. Continuously assess clouds for security, resiliency, and regulatory compliance.

RealTyme

RealTyme

RealTyme is a secure communication and collaboration platform with privacy and human experience at its core.

ArmorPoint

ArmorPoint

ArmorPoint redefines the traditional approach to cybersecurity by combining network operations, security operations, and SIEM technology in one platform.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

Cyber Explorers

Cyber Explorers

Cyber Explorers is a fun, free and interactive learning platform for future digital superstars. An exciting addition to UK curriculum delivery or after school activities.

SecureLake

SecureLake

SecureLake (formerly Managni) is one of the most trusted US-based IT security and infrastructure companies.