World First Police 3D Security Scanner

Law enforcement teams can now determine if someone is carrying a weapon or explosive, all without the need for a physical search, and rapidly identify a person of interest, thanks to the world’s first mobile 3D imaging scanner.

The device attaches to a smartphone and is controlled by a dedicated app. From a distance of up to 40 feet, security agents or law enforcement personnel can scan individuals in a crowd or an approaching person of interest simply by pointing their smartphone at them with the SWORD device attached. 

It can be used also to scan backpacks and handbags that are being carried or have been left unattended. It can also detect listening devices used for espionage and intelligence gathering. The device, based on a unique mobile platform developed by Royal Holdings, encompasses proprietary software integrated with AI, machine learning, and facial recognition capabilities.
It attaches to a Google Pixel 2 XL smartphone and Apple’s iPhone 8 Plus. 

A featureless outline of the person being scanned is displayed, instantly alerting agents to location and type of concealed weapons or explosives. 

The technology employs artificial intelligence to quickly cross-check and verify weapons and explosives with its securely maintained cloud-based database. In addition, built-in facial recognition operating in real time compares suspects to watch lists for positive identification. 

According to officer.com, the device operates globally and features real-time location sharing and generates real-time alerts in the event of a mass shooting, terror threat, or terror attack. 

Response time to possible threats is cut to mere seconds, empowering safety and security teams with vital information they can use to proactively diffuse or contain a potential threat.

SWORD is based on a programmable 3D sensor that penetrates objects via radio frequency technology. When a security agent directs the handheld device at a person and begins scanning, an array of antennae transmits signals towards the individual, illuminating the area in front of the person.  The same antennae receive returning signals which are captured and recorded by a System-on-Chip (SoC) integrated circuit. The system simultaneously interfaces with two databases: one for weapons and explosives, one for persons of interest on a watch list developed by the user. 

The facial recognition feature scans the person’s face, checks the image against the watch list, and alerts the user if there is a match. Should an individual displaying threatening behavior not be on the watch list, SWORD can access an extensive, strictly managed law enforcement database.

All of these functions occur in milli-seconds, giving agents in the field the edge they need to prevent or mitigate harm in a potentially life-threatening situation.

I-HLS

You MIght Also Read: 

High Performance Face Recognition:

Anti-Surveillance Clothing Thwarts Facial Recognition:

« NCSC Investigate Giant Dixons Data Breach
Are US Federal Cyber Workers Good Enough? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IBackup

IBackup

IBackup is a Web Based Online Backup service provider.

CloudLayar

CloudLayar

CloudLayar is a cloud-based website firewall for protecting your website against online threats.

Redspin

Redspin

Redspin provide penetration testing, security assessments and consulting services.

Communications Security Establishment (CSE)

Communications Security Establishment (CSE)

CSE is Canada's national cryptologic agency, providing the Government of Canada with IT Security and foreign signals intelligence (SIGINT) services.

Entrust

Entrust

Entrust is a global leader in digital security, identities, payments, and data protection.

ANIS

ANIS

ANIS represents the interests of Romanian IT companies and supports the development of the software and services industry.

Appvisory

Appvisory

Appvisory by MediaTest Digital is the leading Mobile Application Management-Software in Europe and enables enterprises to work secure on smartphones and tablets.

Seavus

Seavus

Seavus is a software development and consulting company with a proven track-record in providing successful enterprise-wide business solutions including Managed Security Services.

Cyberport

Cyberport

Cyberport is focused on facilitating the growth of major technology trends such as FinTech and cybersecurity as well as the emerging technologies of AI, big data and blockchain.

INVISUS

INVISUS

INVISUS protects businesses against the latest cyber risks – including business and employee identity theft, data breaches, and cybersecurity compliance.

Toothpic

Toothpic

ToothPic has invented, designed, developed and patented a solution to enable companies to turn every smartphone into a secure key for a user-friendly online authentication.

Center for Information Technology Policy (CITP) - Princeton University

Center for Information Technology Policy (CITP) - Princeton University

The Center for Information Technology Policy at Princeton University is a nexus of expertise in technology, engineering, public policy, and the social sciences.

Armexa

Armexa

Armexa is a leading provider of advanced industrial cybersecurity solutions that protect your critical OT and ICS infrastructure against ever-changing threats.

Moonsense

Moonsense

Moonsense is on a mission to level the playing field in the fight against online fraud.

WillCo Tech

WillCo Tech

WillCo Tech works to enhance national security and force readiness for military and commercial enterprises with a suite of software capabilities surrounding the human element of cybersecurity.

Atlas Systems

Atlas Systems

Atlas Systems helps companies large and small accelerate their digital transformation journeys – expanding their capabilities and delivering tailored solutions including cybersecurity.