World First Police 3D Security Scanner

Law enforcement teams can now determine if someone is carrying a weapon or explosive, all without the need for a physical search, and rapidly identify a person of interest, thanks to the world’s first mobile 3D imaging scanner.

The device attaches to a smartphone and is controlled by a dedicated app. From a distance of up to 40 feet, security agents or law enforcement personnel can scan individuals in a crowd or an approaching person of interest simply by pointing their smartphone at them with the SWORD device attached. 

It can be used also to scan backpacks and handbags that are being carried or have been left unattended. It can also detect listening devices used for espionage and intelligence gathering. The device, based on a unique mobile platform developed by Royal Holdings, encompasses proprietary software integrated with AI, machine learning, and facial recognition capabilities.
It attaches to a Google Pixel 2 XL smartphone and Apple’s iPhone 8 Plus. 

A featureless outline of the person being scanned is displayed, instantly alerting agents to location and type of concealed weapons or explosives. 

The technology employs artificial intelligence to quickly cross-check and verify weapons and explosives with its securely maintained cloud-based database. In addition, built-in facial recognition operating in real time compares suspects to watch lists for positive identification. 

According to officer.com, the device operates globally and features real-time location sharing and generates real-time alerts in the event of a mass shooting, terror threat, or terror attack. 

Response time to possible threats is cut to mere seconds, empowering safety and security teams with vital information they can use to proactively diffuse or contain a potential threat.

SWORD is based on a programmable 3D sensor that penetrates objects via radio frequency technology. When a security agent directs the handheld device at a person and begins scanning, an array of antennae transmits signals towards the individual, illuminating the area in front of the person.  The same antennae receive returning signals which are captured and recorded by a System-on-Chip (SoC) integrated circuit. The system simultaneously interfaces with two databases: one for weapons and explosives, one for persons of interest on a watch list developed by the user. 

The facial recognition feature scans the person’s face, checks the image against the watch list, and alerts the user if there is a match. Should an individual displaying threatening behavior not be on the watch list, SWORD can access an extensive, strictly managed law enforcement database.

All of these functions occur in milli-seconds, giving agents in the field the edge they need to prevent or mitigate harm in a potentially life-threatening situation.

I-HLS

You MIght Also Read: 

High Performance Face Recognition:

Anti-Surveillance Clothing Thwarts Facial Recognition:

« NCSC Investigate Giant Dixons Data Breach
Are US Federal Cyber Workers Good Enough? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

2Secure

2Secure

2Secure is one of Sweden's largest private security companies. Service inlcude personal security, corporate security, information and cyber security.

Cyberwrite

Cyberwrite

Cyberwrite was founded to provide underwriters around the world a unique and innovative Cyber Underwriting platform.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

CyberArrow

CyberArrow

CyberArrow (formerly EBDAA) is a consultancy company providing high quality consultancy services in Risk & Compliance and Awareness & Education.

Nuspire

Nuspire

Nuspire provide services to protect your network with best-in-class managed detection and response, allowing you to stay focused on managing your business.

Cyber Covered

Cyber Covered

Cyber Covered provide complete website & data cover with market leading cyber insurance and powerful compliance software in one affordable package.

Tesserent

Tesserent

Tesserent (formerly Pure Security) is a full-service cybersecurity solutions provider. We partner with clients across Australia and New Zealand in the protection of their digital assets.

Ministry of Information and Communications (MIC) - Vietnam

Ministry of Information and Communications (MIC) - Vietnam

The Ministry of Information & Communications of Vietnam is the policy making and regulatory body in the field of information technology and national information and and communication infrastructure.

Iterasec

Iterasec

Iterasec provides a full range of security services to hacker-proof your products and make software engineering process secure by design.

CyNam

CyNam

CyNam is a platform for enabling the growth and development of people and organisations within Cheltenham’s flourishing cyber technology ecosystem.

tTech

tTech

tTech is the first and foremost company providing outsourced Information Technology solutions to businesses in Jamaica.

VulnCheck

VulnCheck

VulnCheck helps organizations outpace adversaries with vulnerability intelligence that predicts avenues of attack with speed and accuracy.

National Centre for Digital Security (CNSD) - Peru

National Centre for Digital Security (CNSD) - Peru

The National Center for Digital Security manages and supervises the operation of Digital Security in Peru in order to strengthen digital trust.

CyberNut

CyberNut

CyberNut are a security awareness training solution built exclusively for schools.

SentryMark

SentryMark

Stay a Step Ahead of Emerging Threats. Deviate from the traditional siloed defenses and get the proactive and responsive cybersecurity solutions and services you deserve with SentryMark today.

Gathid

Gathid

Gathid is a unique and versatile identity governance platform providing organizations with the ability to model, explore, audit, and track complex access-related scenarios.