SlideShare uma empresa Scribd logo
1 de 20
The global risks to policing from the
fusion of the real world with cyber space.
Michael O’Connell, Vice President and Executive Advisor
NEC Corporation.
3 © NEC Corporation 2017 NEC Confidential
How the cyber world has brought a shift in risk to the real world.
The global challenge:
WEF Global Risk Report 2019
4 © NEC Corporation 2017 NEC Confidential
A new world order.
New challenges:
5 © NEC Corporation 2017 NEC Confidential
Innovation can be channeled to solve future challenges.
Enablers to channel innovation – new structures.
6 © NEC Corporation 2017 NEC Confidential
7 © NEC Corporation 2017 NEC Confidential
8 © NEC Corporation 2017 NEC Confidential
9 © NEC Corporation 2017 NEC Confidential
10 © NEC Corporation 2017 NEC Confidential
11 © NEC Corporation 2017 NEC Confidential
12 © NEC Corporation 2017 NEC Confidential
14 © NEC Corporation 2017 NEC Confidential
Strengthen the Cyber Intelligence Collaboration
JC3
Academia
Police
Industry
(Security)
Industry
(End-users)
Participation to Japan Cybercrime Control Center
(JC3)
NEC Executive VP is the JC3 Representative Director. NEC leads
this effort. (Established November, 2014)
“The Cybersecurity Strategic Headquarters”
JC3 established and Chaired by the Japanese Prime Minister.
Dr. Endo (NECʼs Chairman of the board) is playing an active role
as a member of “the Cybersecurity Strategic Headquarters”.
15 © NEC Corporation 2017 NEC Confidential
Rwanda: Digital Forensic Investigation Center
16 © NEC Corporation 2017 NEC Confidential
History of NEC’s Initiatives in AI
NEC has a technology portfolio and business track record that extends over half a century, including AI technologies
that rank top around the world.
1960
OCR
Fingerprint
Recognition
Face
Recognition
Deep Learning
Heterogeneous
mixture
learning
Predictive Robust
Optimization Framework
Postal addresssorter
Applied in human resource matching,
image analysis
(RAPID Machine Learning)
Applied in demand
forecasting, etc.
2000
2010
Analysis
Prescription
Visualization Ranked 1st
four consecutive times
2009,2010,2013,2017
Autonomous
and Adaptive
Control
Police
Ranked 1st
eight times
2003〜2016
Immigration
control
Iris
Recognition
Ranked 1st
2018
National
ID
* U.S. National Institute of Standards and Technology (NIST)
17 © NEC Corporation 2017 NEC Confidential
Value Creation by Combining Various data and AI Technologies
Real World
Over-
whelming
efficiency
Speed
Accuracy
Automation
Enhanced
Suggestion
To humans
Assist human
decisions
Bird's-eye view
Optimization
Identify human and objects
from data in the real world
Acquire knowledge by
combining various information
Visualization Analysis
Control optimally using
prediction and reasoning
Real World
Digitalization,
Improvement
of data quality
Recognition &
Identification
using
the five senses
Human
Things
Understanding
of meaning &
intent
Contexts
Analysis with
interpretation
High-precision
analysis
Planning &
optimization
Prescription
18 © NEC Corporation 2017 NEC Confidential
Aim is to build Smart and Safer Cities
19 © NEC Corporation 2017 NEC Confidential
Fingerprint
Iris
Ear Acoustic
Palm・Vein
Face
4 Consecutive wins
in NIST*1 Evaluation
(2009,2010,2013,2017)
*1 US Institute of Standards and Technology
5 Consecutive wins
in NIST*1 Evaluation
(2004,2007,2009,2012,2013)
Voiceprint
Rank No.1 in
NIST*1 Evaluation
(2018)
NEC’s Biometrics Recognition Technologies
NIST: National Institute of Standards and Technology
Non-Regulatory agency of the US Department of Commerce
20 © NEC Corporation 2017 NEC Confidential
New investigative practices:
• Cyber world:
• Global cyber surveillance / monitoring network.
• Wider use of AI as data facilitator.
• Improved access to digital forensics.
• Enhanced support from social media providers for monitoring and reporting.
• Physical world:
• Enhanced border security screening systems utilising biometrics.
• Wider use of smart city surveillance solutions.
• Improved public private partnerships.
• Tip-lines and easier reporting mechanisms by victims and
witnesses / family through social media, collated and of use
to law enforcement / agencies for intervention.
21 © NEC Corporation 2017 NEC Confidential
Technology partner to INTERPOL

Mais conteúdo relacionado

Mais procurados

5 g business potential ieee 5g summit_110717_a
5 g business potential ieee 5g summit_110717_a5 g business potential ieee 5g summit_110717_a
5 g business potential ieee 5g summit_110717_aMaria Boura
 
Connected Cars Europe keynote (2017)
Connected Cars Europe keynote (2017)Connected Cars Europe keynote (2017)
Connected Cars Europe keynote (2017)Marc Jadoul
 
CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)Marc Jadoul
 
ETSI IoT keynote (2016)
ETSI IoT keynote (2016)ETSI IoT keynote (2016)
ETSI IoT keynote (2016)Marc Jadoul
 
IoT 2019 overview
IoT 2019 overviewIoT 2019 overview
IoT 2019 overviewengIT
 
Joshua Ness (Verizon 5G Labs): How 5G will drive a hardware revolution (and h...
Joshua Ness (Verizon 5G Labs): How 5G will drive a hardware revolution (and h...Joshua Ness (Verizon 5G Labs): How 5G will drive a hardware revolution (and h...
Joshua Ness (Verizon 5G Labs): How 5G will drive a hardware revolution (and h...AugmentedWorldExpo
 
Future Proof Your Network Today To Support IOT Tomorrow
Future Proof Your Network Today To Support IOT TomorrowFuture Proof Your Network Today To Support IOT Tomorrow
Future Proof Your Network Today To Support IOT TomorrowTyrone Systems
 
Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019Tyrone Systems
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)Md. Nasir Uddin
 
IoT & Smart Cities China Telecom
IoT & Smart Cities China TelecomIoT & Smart Cities China Telecom
IoT & Smart Cities China TelecomAdrian Hall
 
Smart Cities Day 1 Secure Cities
Smart Cities Day 1 Secure CitiesSmart Cities Day 1 Secure Cities
Smart Cities Day 1 Secure Cities4 All of Us
 
Ericsson Technology Review - issue 2, 2017
Ericsson Technology Review - issue 2, 2017Ericsson Technology Review - issue 2, 2017
Ericsson Technology Review - issue 2, 2017Ericsson
 
Iot tunisia forum 2017 internet of things trends_directions and opportunit...
Iot tunisia forum 2017    internet of things trends_directions and opportunit...Iot tunisia forum 2017    internet of things trends_directions and opportunit...
Iot tunisia forum 2017 internet of things trends_directions and opportunit...IoT Tunisia
 
Industrial IoT Market Winter 2018
Industrial IoT Market Winter 2018Industrial IoT Market Winter 2018
Industrial IoT Market Winter 2018Dan Sexton
 
Mobile: the up and downside of risk
Mobile: the up and downside of riskMobile: the up and downside of risk
Mobile: the up and downside of riskMichel de Goede
 
Top areas for building a start up
Top areas for building a start upTop areas for building a start up
Top areas for building a start upOradea Tech Hub
 
La Inteligencia Artificial aplicada en los negocios
La Inteligencia Artificial aplicada en los negocios La Inteligencia Artificial aplicada en los negocios
La Inteligencia Artificial aplicada en los negocios AMETIC
 
Developing Enterprise-Level IoT Solutions by Fariz Saracevic
Developing Enterprise-Level IoT Solutions by Fariz SaracevicDeveloping Enterprise-Level IoT Solutions by Fariz Saracevic
Developing Enterprise-Level IoT Solutions by Fariz SaracevicBosnia Agile
 
Riga Comm (2017)
Riga Comm (2017)Riga Comm (2017)
Riga Comm (2017)Marc Jadoul
 
Presentacion Wim Elfrink IoT World Forum Chicago
Presentacion Wim Elfrink IoT World Forum ChicagoPresentacion Wim Elfrink IoT World Forum Chicago
Presentacion Wim Elfrink IoT World Forum ChicagoFelipe Lamus
 

Mais procurados (20)

5 g business potential ieee 5g summit_110717_a
5 g business potential ieee 5g summit_110717_a5 g business potential ieee 5g summit_110717_a
5 g business potential ieee 5g summit_110717_a
 
Connected Cars Europe keynote (2017)
Connected Cars Europe keynote (2017)Connected Cars Europe keynote (2017)
Connected Cars Europe keynote (2017)
 
CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)
 
ETSI IoT keynote (2016)
ETSI IoT keynote (2016)ETSI IoT keynote (2016)
ETSI IoT keynote (2016)
 
IoT 2019 overview
IoT 2019 overviewIoT 2019 overview
IoT 2019 overview
 
Joshua Ness (Verizon 5G Labs): How 5G will drive a hardware revolution (and h...
Joshua Ness (Verizon 5G Labs): How 5G will drive a hardware revolution (and h...Joshua Ness (Verizon 5G Labs): How 5G will drive a hardware revolution (and h...
Joshua Ness (Verizon 5G Labs): How 5G will drive a hardware revolution (and h...
 
Future Proof Your Network Today To Support IOT Tomorrow
Future Proof Your Network Today To Support IOT TomorrowFuture Proof Your Network Today To Support IOT Tomorrow
Future Proof Your Network Today To Support IOT Tomorrow
 
Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)
 
IoT & Smart Cities China Telecom
IoT & Smart Cities China TelecomIoT & Smart Cities China Telecom
IoT & Smart Cities China Telecom
 
Smart Cities Day 1 Secure Cities
Smart Cities Day 1 Secure CitiesSmart Cities Day 1 Secure Cities
Smart Cities Day 1 Secure Cities
 
Ericsson Technology Review - issue 2, 2017
Ericsson Technology Review - issue 2, 2017Ericsson Technology Review - issue 2, 2017
Ericsson Technology Review - issue 2, 2017
 
Iot tunisia forum 2017 internet of things trends_directions and opportunit...
Iot tunisia forum 2017    internet of things trends_directions and opportunit...Iot tunisia forum 2017    internet of things trends_directions and opportunit...
Iot tunisia forum 2017 internet of things trends_directions and opportunit...
 
Industrial IoT Market Winter 2018
Industrial IoT Market Winter 2018Industrial IoT Market Winter 2018
Industrial IoT Market Winter 2018
 
Mobile: the up and downside of risk
Mobile: the up and downside of riskMobile: the up and downside of risk
Mobile: the up and downside of risk
 
Top areas for building a start up
Top areas for building a start upTop areas for building a start up
Top areas for building a start up
 
La Inteligencia Artificial aplicada en los negocios
La Inteligencia Artificial aplicada en los negocios La Inteligencia Artificial aplicada en los negocios
La Inteligencia Artificial aplicada en los negocios
 
Developing Enterprise-Level IoT Solutions by Fariz Saracevic
Developing Enterprise-Level IoT Solutions by Fariz SaracevicDeveloping Enterprise-Level IoT Solutions by Fariz Saracevic
Developing Enterprise-Level IoT Solutions by Fariz Saracevic
 
Riga Comm (2017)
Riga Comm (2017)Riga Comm (2017)
Riga Comm (2017)
 
Presentacion Wim Elfrink IoT World Forum Chicago
Presentacion Wim Elfrink IoT World Forum ChicagoPresentacion Wim Elfrink IoT World Forum Chicago
Presentacion Wim Elfrink IoT World Forum Chicago
 

Semelhante a NEC Public Safety | The Global Risks to Policing from the Fusion of the Real World with Cyber Space

NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...
NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...
NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...NEC Public Safety
 
NEC Public Safety | New Technologies to Investigate Human Trafficking and Mig...
NEC Public Safety | New Technologies to Investigate Human Trafficking and Mig...NEC Public Safety | New Technologies to Investigate Human Trafficking and Mig...
NEC Public Safety | New Technologies to Investigate Human Trafficking and Mig...NEC Public Safety
 
NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges
NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges
NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges NEC Public Safety
 
SplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk OverviewSplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk OverviewSplunk
 
"Can Simulation Solve the Training Data Problem?," a Presentation from Mindtech
"Can Simulation Solve the Training Data Problem?," a Presentation from Mindtech"Can Simulation Solve the Training Data Problem?," a Presentation from Mindtech
"Can Simulation Solve the Training Data Problem?," a Presentation from MindtechEdge AI and Vision Alliance
 
The Internet of Things Conference at E4
The Internet of Things Conference at E4The Internet of Things Conference at E4
The Internet of Things Conference at E4rAVe [PUBS]
 
Internet of everything presentation
Internet of everything presentationInternet of everything presentation
Internet of everything presentationLori Moody
 
People Monitoring and Mask Detection using Real-time video analyzing
People Monitoring and Mask Detection using Real-time video analyzingPeople Monitoring and Mask Detection using Real-time video analyzing
People Monitoring and Mask Detection using Real-time video analyzingvivatechijri
 
NEC's Digital Identity Platform for Federal Agencies
NEC's Digital Identity Platform for Federal AgenciesNEC's Digital Identity Platform for Federal Agencies
NEC's Digital Identity Platform for Federal AgenciesInteractiveNEC
 
The exciting new world of code & data
The exciting new world of code & dataThe exciting new world of code & data
The exciting new world of code & dataSteven Miller
 
Industry Disruptors: AI, Machine Learning and Drones.
Industry Disruptors: AI, Machine Learning and Drones. Industry Disruptors: AI, Machine Learning and Drones.
Industry Disruptors: AI, Machine Learning and Drones. AnandSRao1962
 
Splunk Financial Services Forum Boston June, 2017
Splunk Financial Services Forum Boston June, 2017Splunk Financial Services Forum Boston June, 2017
Splunk Financial Services Forum Boston June, 2017Splunk
 
A world of connected object Designed to Serve Us
A world of connected object Designed to Serve UsA world of connected object Designed to Serve Us
A world of connected object Designed to Serve UsPhilip Andreae
 
Accelerate IoT Development with KnowThings.io
Accelerate IoT Development with KnowThings.ioAccelerate IoT Development with KnowThings.io
Accelerate IoT Development with KnowThings.ioCA Technologies
 
Sign Language Recognition
Sign Language RecognitionSign Language Recognition
Sign Language RecognitionIRJET Journal
 
Where are the data professionals
Where are the data professionalsWhere are the data professionals
Where are the data professionalsSteven Miller
 
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines -   security keynoteCisco Connect 2018 Philippines -   security keynote
Cisco Connect 2018 Philippines - security keynoteNetworkCollaborators
 
Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017Splunk
 

Semelhante a NEC Public Safety | The Global Risks to Policing from the Fusion of the Real World with Cyber Space (20)

NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...
NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...
NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...
 
NEC Public Safety | New Technologies to Investigate Human Trafficking and Mig...
NEC Public Safety | New Technologies to Investigate Human Trafficking and Mig...NEC Public Safety | New Technologies to Investigate Human Trafficking and Mig...
NEC Public Safety | New Technologies to Investigate Human Trafficking and Mig...
 
NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges
NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges
NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges
 
NEC-IBM_Event_093015
NEC-IBM_Event_093015NEC-IBM_Event_093015
NEC-IBM_Event_093015
 
SplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk OverviewSplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk Overview
 
"Can Simulation Solve the Training Data Problem?," a Presentation from Mindtech
"Can Simulation Solve the Training Data Problem?," a Presentation from Mindtech"Can Simulation Solve the Training Data Problem?," a Presentation from Mindtech
"Can Simulation Solve the Training Data Problem?," a Presentation from Mindtech
 
The Internet of Things Conference at E4
The Internet of Things Conference at E4The Internet of Things Conference at E4
The Internet of Things Conference at E4
 
Internet of everything presentation
Internet of everything presentationInternet of everything presentation
Internet of everything presentation
 
People Monitoring and Mask Detection using Real-time video analyzing
People Monitoring and Mask Detection using Real-time video analyzingPeople Monitoring and Mask Detection using Real-time video analyzing
People Monitoring and Mask Detection using Real-time video analyzing
 
NEC's Digital Identity Platform for Federal Agencies
NEC's Digital Identity Platform for Federal AgenciesNEC's Digital Identity Platform for Federal Agencies
NEC's Digital Identity Platform for Federal Agencies
 
The exciting new world of code & data
The exciting new world of code & dataThe exciting new world of code & data
The exciting new world of code & data
 
Industry Disruptors: AI, Machine Learning and Drones.
Industry Disruptors: AI, Machine Learning and Drones. Industry Disruptors: AI, Machine Learning and Drones.
Industry Disruptors: AI, Machine Learning and Drones.
 
Splunk Financial Services Forum Boston June, 2017
Splunk Financial Services Forum Boston June, 2017Splunk Financial Services Forum Boston June, 2017
Splunk Financial Services Forum Boston June, 2017
 
A world of connected object Designed to Serve Us
A world of connected object Designed to Serve UsA world of connected object Designed to Serve Us
A world of connected object Designed to Serve Us
 
Beyond hype why ai v4
Beyond hype why ai v4Beyond hype why ai v4
Beyond hype why ai v4
 
Accelerate IoT Development with KnowThings.io
Accelerate IoT Development with KnowThings.ioAccelerate IoT Development with KnowThings.io
Accelerate IoT Development with KnowThings.io
 
Sign Language Recognition
Sign Language RecognitionSign Language Recognition
Sign Language Recognition
 
Where are the data professionals
Where are the data professionalsWhere are the data professionals
Where are the data professionals
 
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines -   security keynoteCisco Connect 2018 Philippines -   security keynote
Cisco Connect 2018 Philippines - security keynote
 
Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017
 

Mais de NEC Public Safety

NEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter LeeNEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter LeeNEC Public Safety
 
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee NEC Public Safety
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety
 
NEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming IndustryNEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming IndustryNEC Public Safety
 
NEC Public Safety | Digital Identity for a Secured World
NEC Public Safety | Digital Identity for a Secured WorldNEC Public Safety | Digital Identity for a Secured World
NEC Public Safety | Digital Identity for a Secured WorldNEC Public Safety
 
NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017NEC Public Safety
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety
 
NEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner HandbookNEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner HandbookNEC Public Safety
 

Mais de NEC Public Safety (9)

NEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter LeeNEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
 
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer Cities
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
 
NEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming IndustryNEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming Industry
 
NEC Public Safety | Digital Identity for a Secured World
NEC Public Safety | Digital Identity for a Secured WorldNEC Public Safety | Digital Identity for a Secured World
NEC Public Safety | Digital Identity for a Secured World
 
NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber Security
 
NEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner HandbookNEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner Handbook
 

Último

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

NEC Public Safety | The Global Risks to Policing from the Fusion of the Real World with Cyber Space

  • 1. The global risks to policing from the fusion of the real world with cyber space. Michael O’Connell, Vice President and Executive Advisor NEC Corporation.
  • 2.
  • 3. 3 © NEC Corporation 2017 NEC Confidential How the cyber world has brought a shift in risk to the real world. The global challenge: WEF Global Risk Report 2019
  • 4. 4 © NEC Corporation 2017 NEC Confidential A new world order. New challenges:
  • 5. 5 © NEC Corporation 2017 NEC Confidential Innovation can be channeled to solve future challenges. Enablers to channel innovation – new structures.
  • 6. 6 © NEC Corporation 2017 NEC Confidential
  • 7. 7 © NEC Corporation 2017 NEC Confidential
  • 8. 8 © NEC Corporation 2017 NEC Confidential
  • 9. 9 © NEC Corporation 2017 NEC Confidential
  • 10. 10 © NEC Corporation 2017 NEC Confidential
  • 11. 11 © NEC Corporation 2017 NEC Confidential
  • 12. 12 © NEC Corporation 2017 NEC Confidential
  • 13. 14 © NEC Corporation 2017 NEC Confidential Strengthen the Cyber Intelligence Collaboration JC3 Academia Police Industry (Security) Industry (End-users) Participation to Japan Cybercrime Control Center (JC3) NEC Executive VP is the JC3 Representative Director. NEC leads this effort. (Established November, 2014) “The Cybersecurity Strategic Headquarters” JC3 established and Chaired by the Japanese Prime Minister. Dr. Endo (NECʼs Chairman of the board) is playing an active role as a member of “the Cybersecurity Strategic Headquarters”.
  • 14. 15 © NEC Corporation 2017 NEC Confidential Rwanda: Digital Forensic Investigation Center
  • 15. 16 © NEC Corporation 2017 NEC Confidential History of NEC’s Initiatives in AI NEC has a technology portfolio and business track record that extends over half a century, including AI technologies that rank top around the world. 1960 OCR Fingerprint Recognition Face Recognition Deep Learning Heterogeneous mixture learning Predictive Robust Optimization Framework Postal addresssorter Applied in human resource matching, image analysis (RAPID Machine Learning) Applied in demand forecasting, etc. 2000 2010 Analysis Prescription Visualization Ranked 1st four consecutive times 2009,2010,2013,2017 Autonomous and Adaptive Control Police Ranked 1st eight times 2003〜2016 Immigration control Iris Recognition Ranked 1st 2018 National ID * U.S. National Institute of Standards and Technology (NIST)
  • 16. 17 © NEC Corporation 2017 NEC Confidential Value Creation by Combining Various data and AI Technologies Real World Over- whelming efficiency Speed Accuracy Automation Enhanced Suggestion To humans Assist human decisions Bird's-eye view Optimization Identify human and objects from data in the real world Acquire knowledge by combining various information Visualization Analysis Control optimally using prediction and reasoning Real World Digitalization, Improvement of data quality Recognition & Identification using the five senses Human Things Understanding of meaning & intent Contexts Analysis with interpretation High-precision analysis Planning & optimization Prescription
  • 17. 18 © NEC Corporation 2017 NEC Confidential Aim is to build Smart and Safer Cities
  • 18. 19 © NEC Corporation 2017 NEC Confidential Fingerprint Iris Ear Acoustic Palm・Vein Face 4 Consecutive wins in NIST*1 Evaluation (2009,2010,2013,2017) *1 US Institute of Standards and Technology 5 Consecutive wins in NIST*1 Evaluation (2004,2007,2009,2012,2013) Voiceprint Rank No.1 in NIST*1 Evaluation (2018) NEC’s Biometrics Recognition Technologies NIST: National Institute of Standards and Technology Non-Regulatory agency of the US Department of Commerce
  • 19. 20 © NEC Corporation 2017 NEC Confidential New investigative practices: • Cyber world: • Global cyber surveillance / monitoring network. • Wider use of AI as data facilitator. • Improved access to digital forensics. • Enhanced support from social media providers for monitoring and reporting. • Physical world: • Enhanced border security screening systems utilising biometrics. • Wider use of smart city surveillance solutions. • Improved public private partnerships. • Tip-lines and easier reporting mechanisms by victims and witnesses / family through social media, collated and of use to law enforcement / agencies for intervention.
  • 20. 21 © NEC Corporation 2017 NEC Confidential Technology partner to INTERPOL