SlideShare a Scribd company logo
1 of 22
The global risks to policing from the
fusion of the real world with cyber space.
Michael O’Connell, Vice President and Executive Advisor
NEC Corporation.
3 © NEC Corporation 2017 NEC Confidential
How the cyber world has brought a shift in risk to the real world.
The global challenge:
WEF Global Risk Report 2019
4 © NEC Corporation 2017 NEC Confidential
A new world order.
New challenges:
5 © NEC Corporation 2017 NEC Confidential
Innovation can be channeled to solve future challenges.
Enablers to channel innovation – new structures.
6 © NEC Corporation 2017 NEC Confidential
7 © NEC Corporation 2017 NEC Confidential
8 © NEC Corporation 2017 NEC Confidential
9 © NEC Corporation 2017 NEC Confidential
10 © NEC Corporation 2017 NEC Confidential
11 © NEC Corporation 2017 NEC Confidential
12 © NEC Corporation 2017 NEC Confidential
13 © NEC Corporation 2017 NEC Confidential
NEC Central Research Labs
▌ Network of 9 Labs focused on
Global Research
▌ Employs over 1,000 R&D
Professionals
▌ 5% of Global Revenues
Allocated to Innovation
▌ Actively Partners with Key
Customers on Real World
Problems
North America
Latin America
Europe, Middle East and
Africa
Greater China
Japan
Asia-Pacific
1
3
1
1
1
2
14 © NEC Corporation 2017 NEC Confidential
Strengthen the Cyber Intelligence Collaboration
JC3
Academia
Police
Industry
(Security)
Industry
(End-users)
Participation to Japan Cybercrime Control Center
(JC3)
NEC Executive VP is the JC3 Representative Director. NEC leads
this effort. (Established November, 2014)
“The Cybersecurity Strategic Headquarters”
JC3 established and Chaired by the Japanese Prime Minister.
Dr. Endo (NEC’s Chairman of the board) is playing an active role
as a member of “the Cybersecurity Strategic Headquarters”.
15 © NEC Corporation 2017 NEC Confidential
Rwanda: Digital Forensic Investigation Center
16 © NEC Corporation 2017 NEC Confidential
History of NEC’s Initiatives in AI
NEC has a technology portfolio and business track record that extends over half a century, including AI technologies
that rank top around the world.
1960
OCR
Fingerprint
Recognition
Face
Recognition
Deep Learning
Heterogeneous
mixture
learning
Predictive Robust
Optimization Framework
Postal addresssorter
Applied in human resource matching,
image analysis
(RAPID Machine Learning)
Applied in demand
forecasting, etc.
2000
2010
Analysis
Prescription
Visualization Ranked 1st
four consecutive times
2009,2010,2013,2017
Autonomous
and Adaptive
Control
Police
Ranked 1st
eight times
2003~2016
Immigration
control
Iris
Recognition
Ranked 1st
2018
National
ID
* U.S. National Institute of Standards and Technology (NIST)
17 © NEC Corporation 2017 NEC Confidential
Value Creation by Combining Various data and AI Technologies
Real World
Over-
whelming
efficiency
Speed
Accuracy
Automation
Enhanced
Suggestion
To humans
Assist human
decisions
Bird's-eye view
Optimization
Identify human and objects
from data in the real world
Acquire knowledge by
combining various information
Visualization Analysis
Control optimally using
prediction and reasoning
Real World
Digitalization,
Improvement
of data quality
Recognition &
Identification
using
the five senses
Human
Things
Understanding
of meaning &
intent
Contexts
Analysis with
interpretation
High-precision
analysis
Planning &
optimization
Prescription
18 © NEC Corporation 2017 NEC Confidential
Aim is to build Smart and Safer Cities
19 © NEC Corporation 2017 NEC Confidential
Fingerprint
Iris
Ear Acoustic
Palm・Vein
Face
4 Consecutive wins
in NIST*1 Evaluation
(2009,2010,2013,2017)
*1 US Institute of Standards and Technology
5 Consecutive wins
in NIST*1 Evaluation
(2004,2007,2009,2012,2013)
Voiceprint
Rank No.1 in
NIST*1 Evaluation
(2018)
NEC’s Biometrics Recognition Technologies
NIST: National Institute of Standards and Technology
Non-Regulatory agency of the US Department of Commerce
20 © NEC Corporation 2017 NEC Confidential
New investigative practices:
• Cyber world:
• Global cyber surveillance / monitoring network.
• Wider use of AI as data facilitator.
• Improved access to digital forensics.
• Enhanced support from social media providers for monitoring and reporting.
• Physical world:
• Enhanced border security screening systems utilising biometrics.
• Wider use of smart city surveillance solutions.
• Improved public private partnerships.
• Tip-lines and easier reporting mechanisms by victims and
witnesses / family through social media, collated and of use
to law enforcement / agencies for intervention.
21 © NEC Corporation 2017 NEC Confidential
Technology partner to INTERPOL
Global Risks Policing Cyber-Physical Fusion

More Related Content

Similar to Global Risks Policing Cyber-Physical Fusion

A world of connected object Designed to Serve Us
A world of connected object Designed to Serve UsA world of connected object Designed to Serve Us
A world of connected object Designed to Serve UsPhilip Andreae
 
Equinix - Gartner Symposium/ ITxpo 2017
Equinix - Gartner Symposium/ ITxpo 2017Equinix - Gartner Symposium/ ITxpo 2017
Equinix - Gartner Symposium/ ITxpo 2017Equinix
 
Splunk Financial Services Forum Boston June, 2017
Splunk Financial Services Forum Boston June, 2017Splunk Financial Services Forum Boston June, 2017
Splunk Financial Services Forum Boston June, 2017Splunk
 
ODSC Presentation "Putting Deep Learning to Work" by Alex Ermolaev, Nvidia
ODSC Presentation "Putting Deep Learning to Work" by Alex Ermolaev, NvidiaODSC Presentation "Putting Deep Learning to Work" by Alex Ermolaev, Nvidia
ODSC Presentation "Putting Deep Learning to Work" by Alex Ermolaev, NvidiaAlex Ermolaev
 
NEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter Lee
NEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter LeeNEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter Lee
NEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter LeeNEC Public Safety
 
Industry Disruptors: AI, Machine Learning and Drones.
Industry Disruptors: AI, Machine Learning and Drones. Industry Disruptors: AI, Machine Learning and Drones.
Industry Disruptors: AI, Machine Learning and Drones. AnandSRao1962
 
1. The Importance of Graphs in Government
1. The Importance of Graphs in Government1. The Importance of Graphs in Government
1. The Importance of Graphs in GovernmentNeo4j
 
John Lewis at Gartner IOM 2017
John Lewis at Gartner IOM 2017John Lewis at Gartner IOM 2017
John Lewis at Gartner IOM 2017Splunk
 
Where the data jobs are? A Data PDX talk
Where the data jobs are?  A Data PDX talkWhere the data jobs are?  A Data PDX talk
Where the data jobs are? A Data PDX talkSteven Miller
 
The Internet of Things Conference at E4
The Internet of Things Conference at E4The Internet of Things Conference at E4
The Internet of Things Conference at E4rAVe [PUBS]
 
Where are the data professionals
Where are the data professionalsWhere are the data professionals
Where are the data professionalsSteven Miller
 
Optalysys Optical Processing for HPC
Optalysys Optical Processing for HPCOptalysys Optical Processing for HPC
Optalysys Optical Processing for HPCinside-BigData.com
 
Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017Splunk
 
TDWI 17 Munich - Are enterprises ready for the 4th industrial revolution? - S...
TDWI 17 Munich - Are enterprises ready for the 4th industrial revolution? - S...TDWI 17 Munich - Are enterprises ready for the 4th industrial revolution? - S...
TDWI 17 Munich - Are enterprises ready for the 4th industrial revolution? - S...Santiago Cabrera-Naranjo
 
Phil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewPhil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewVeritas Technologies LLC
 
Building a Cognitive Business – Josh Sutton, SapientRazorfish Data & Artifici...
Building a Cognitive Business – Josh Sutton, SapientRazorfish Data & Artifici...Building a Cognitive Business – Josh Sutton, SapientRazorfish Data & Artifici...
Building a Cognitive Business – Josh Sutton, SapientRazorfish Data & Artifici...Publicis Sapient
 
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AISplunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AISplunk
 

Similar to Global Risks Policing Cyber-Physical Fusion (20)

A world of connected object Designed to Serve Us
A world of connected object Designed to Serve UsA world of connected object Designed to Serve Us
A world of connected object Designed to Serve Us
 
Equinix - Gartner Symposium/ ITxpo 2017
Equinix - Gartner Symposium/ ITxpo 2017Equinix - Gartner Symposium/ ITxpo 2017
Equinix - Gartner Symposium/ ITxpo 2017
 
Splunk Financial Services Forum Boston June, 2017
Splunk Financial Services Forum Boston June, 2017Splunk Financial Services Forum Boston June, 2017
Splunk Financial Services Forum Boston June, 2017
 
ODSC Presentation "Putting Deep Learning to Work" by Alex Ermolaev, Nvidia
ODSC Presentation "Putting Deep Learning to Work" by Alex Ermolaev, NvidiaODSC Presentation "Putting Deep Learning to Work" by Alex Ermolaev, Nvidia
ODSC Presentation "Putting Deep Learning to Work" by Alex Ermolaev, Nvidia
 
NEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter Lee
NEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter LeeNEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter Lee
NEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter Lee
 
Industry Disruptors: AI, Machine Learning and Drones.
Industry Disruptors: AI, Machine Learning and Drones. Industry Disruptors: AI, Machine Learning and Drones.
Industry Disruptors: AI, Machine Learning and Drones.
 
NEC-IBM_Event_093015
NEC-IBM_Event_093015NEC-IBM_Event_093015
NEC-IBM_Event_093015
 
1. The Importance of Graphs in Government
1. The Importance of Graphs in Government1. The Importance of Graphs in Government
1. The Importance of Graphs in Government
 
John Lewis at Gartner IOM 2017
John Lewis at Gartner IOM 2017John Lewis at Gartner IOM 2017
John Lewis at Gartner IOM 2017
 
Where the data jobs are? A Data PDX talk
Where the data jobs are?  A Data PDX talkWhere the data jobs are?  A Data PDX talk
Where the data jobs are? A Data PDX talk
 
The Internet of Things Conference at E4
The Internet of Things Conference at E4The Internet of Things Conference at E4
The Internet of Things Conference at E4
 
Where are the data professionals
Where are the data professionalsWhere are the data professionals
Where are the data professionals
 
Optalysys Optical Processing for HPC
Optalysys Optical Processing for HPCOptalysys Optical Processing for HPC
Optalysys Optical Processing for HPC
 
Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017
 
TDWI 17 Munich - Are enterprises ready for the 4th industrial revolution? - S...
TDWI 17 Munich - Are enterprises ready for the 4th industrial revolution? - S...TDWI 17 Munich - Are enterprises ready for the 4th industrial revolution? - S...
TDWI 17 Munich - Are enterprises ready for the 4th industrial revolution? - S...
 
Phil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewPhil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of view
 
Building a Cognitive Business – Josh Sutton, SapientRazorfish Data & Artifici...
Building a Cognitive Business – Josh Sutton, SapientRazorfish Data & Artifici...Building a Cognitive Business – Josh Sutton, SapientRazorfish Data & Artifici...
Building a Cognitive Business – Josh Sutton, SapientRazorfish Data & Artifici...
 
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AISplunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
 
Internet of things cisco
Internet of things   ciscoInternet of things   cisco
Internet of things cisco
 
Sdi, 2014.04 final
Sdi, 2014.04 finalSdi, 2014.04 final
Sdi, 2014.04 final
 

More from NEC Public Safety

NEC Public Safety | NEC Airport Security Advances with Business Traveller
NEC Public Safety | NEC Airport Security Advances with Business Traveller NEC Public Safety | NEC Airport Security Advances with Business Traveller
NEC Public Safety | NEC Airport Security Advances with Business Traveller NEC Public Safety
 
NEC Public Safety | NEC XON 2020 Vision by Walter Lee
NEC Public Safety | NEC XON 2020 Vision by Walter LeeNEC Public Safety | NEC XON 2020 Vision by Walter Lee
NEC Public Safety | NEC XON 2020 Vision by Walter LeeNEC Public Safety
 
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter LeeNEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter LeeNEC Public Safety
 
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee NEC Public Safety
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety
 
NEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming IndustryNEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming IndustryNEC Public Safety
 
NEC Public Safety | Digital Identity for a Secured World
NEC Public Safety | Digital Identity for a Secured WorldNEC Public Safety | Digital Identity for a Secured World
NEC Public Safety | Digital Identity for a Secured WorldNEC Public Safety
 
NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017NEC Public Safety
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety
 
NEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner HandbookNEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner HandbookNEC Public Safety
 

More from NEC Public Safety (11)

NEC Public Safety | NEC Airport Security Advances with Business Traveller
NEC Public Safety | NEC Airport Security Advances with Business Traveller NEC Public Safety | NEC Airport Security Advances with Business Traveller
NEC Public Safety | NEC Airport Security Advances with Business Traveller
 
NEC Public Safety | NEC XON 2020 Vision by Walter Lee
NEC Public Safety | NEC XON 2020 Vision by Walter LeeNEC Public Safety | NEC XON 2020 Vision by Walter Lee
NEC Public Safety | NEC XON 2020 Vision by Walter Lee
 
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter LeeNEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
 
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer Cities
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
 
NEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming IndustryNEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming Industry
 
NEC Public Safety | Digital Identity for a Secured World
NEC Public Safety | Digital Identity for a Secured WorldNEC Public Safety | Digital Identity for a Secured World
NEC Public Safety | Digital Identity for a Secured World
 
NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber Security
 
NEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner HandbookNEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner Handbook
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Global Risks Policing Cyber-Physical Fusion

  • 1. The global risks to policing from the fusion of the real world with cyber space. Michael O’Connell, Vice President and Executive Advisor NEC Corporation.
  • 2.
  • 3. 3 © NEC Corporation 2017 NEC Confidential How the cyber world has brought a shift in risk to the real world. The global challenge: WEF Global Risk Report 2019
  • 4. 4 © NEC Corporation 2017 NEC Confidential A new world order. New challenges:
  • 5. 5 © NEC Corporation 2017 NEC Confidential Innovation can be channeled to solve future challenges. Enablers to channel innovation – new structures.
  • 6. 6 © NEC Corporation 2017 NEC Confidential
  • 7. 7 © NEC Corporation 2017 NEC Confidential
  • 8. 8 © NEC Corporation 2017 NEC Confidential
  • 9. 9 © NEC Corporation 2017 NEC Confidential
  • 10. 10 © NEC Corporation 2017 NEC Confidential
  • 11. 11 © NEC Corporation 2017 NEC Confidential
  • 12. 12 © NEC Corporation 2017 NEC Confidential
  • 13. 13 © NEC Corporation 2017 NEC Confidential NEC Central Research Labs ▌ Network of 9 Labs focused on Global Research ▌ Employs over 1,000 R&D Professionals ▌ 5% of Global Revenues Allocated to Innovation ▌ Actively Partners with Key Customers on Real World Problems North America Latin America Europe, Middle East and Africa Greater China Japan Asia-Pacific 1 3 1 1 1 2
  • 14. 14 © NEC Corporation 2017 NEC Confidential Strengthen the Cyber Intelligence Collaboration JC3 Academia Police Industry (Security) Industry (End-users) Participation to Japan Cybercrime Control Center (JC3) NEC Executive VP is the JC3 Representative Director. NEC leads this effort. (Established November, 2014) “The Cybersecurity Strategic Headquarters” JC3 established and Chaired by the Japanese Prime Minister. Dr. Endo (NEC’s Chairman of the board) is playing an active role as a member of “the Cybersecurity Strategic Headquarters”.
  • 15. 15 © NEC Corporation 2017 NEC Confidential Rwanda: Digital Forensic Investigation Center
  • 16. 16 © NEC Corporation 2017 NEC Confidential History of NEC’s Initiatives in AI NEC has a technology portfolio and business track record that extends over half a century, including AI technologies that rank top around the world. 1960 OCR Fingerprint Recognition Face Recognition Deep Learning Heterogeneous mixture learning Predictive Robust Optimization Framework Postal addresssorter Applied in human resource matching, image analysis (RAPID Machine Learning) Applied in demand forecasting, etc. 2000 2010 Analysis Prescription Visualization Ranked 1st four consecutive times 2009,2010,2013,2017 Autonomous and Adaptive Control Police Ranked 1st eight times 2003~2016 Immigration control Iris Recognition Ranked 1st 2018 National ID * U.S. National Institute of Standards and Technology (NIST)
  • 17. 17 © NEC Corporation 2017 NEC Confidential Value Creation by Combining Various data and AI Technologies Real World Over- whelming efficiency Speed Accuracy Automation Enhanced Suggestion To humans Assist human decisions Bird's-eye view Optimization Identify human and objects from data in the real world Acquire knowledge by combining various information Visualization Analysis Control optimally using prediction and reasoning Real World Digitalization, Improvement of data quality Recognition & Identification using the five senses Human Things Understanding of meaning & intent Contexts Analysis with interpretation High-precision analysis Planning & optimization Prescription
  • 18. 18 © NEC Corporation 2017 NEC Confidential Aim is to build Smart and Safer Cities
  • 19. 19 © NEC Corporation 2017 NEC Confidential Fingerprint Iris Ear Acoustic Palm・Vein Face 4 Consecutive wins in NIST*1 Evaluation (2009,2010,2013,2017) *1 US Institute of Standards and Technology 5 Consecutive wins in NIST*1 Evaluation (2004,2007,2009,2012,2013) Voiceprint Rank No.1 in NIST*1 Evaluation (2018) NEC’s Biometrics Recognition Technologies NIST: National Institute of Standards and Technology Non-Regulatory agency of the US Department of Commerce
  • 20. 20 © NEC Corporation 2017 NEC Confidential New investigative practices: • Cyber world: • Global cyber surveillance / monitoring network. • Wider use of AI as data facilitator. • Improved access to digital forensics. • Enhanced support from social media providers for monitoring and reporting. • Physical world: • Enhanced border security screening systems utilising biometrics. • Wider use of smart city surveillance solutions. • Improved public private partnerships. • Tip-lines and easier reporting mechanisms by victims and witnesses / family through social media, collated and of use to law enforcement / agencies for intervention.
  • 21. 21 © NEC Corporation 2017 NEC Confidential Technology partner to INTERPOL

Editor's Notes

  1. Distinguished guests, ladies and gentlemen. It is my great honour to be here today to share an insight into the global risks posed to policing from the fusion of the real world with cyber space. This will include a deep dive into a specific crime threat to look at its transition into the cyber world, delivering fresh challenges and increased harms to the real world. We will then look at new capabilities that permit us all an opportunity to innovate and solve not just todays but also tomorrows challenges and mitigate risks to our common security needs.
  2. Having previously been a senior UK police officer and formerly a Director of Operations at INTERPOL I am now please to be with NEC, a strategic partner to INTERPOL and the global policing community, and an active friend and partner to the Federal Police and Government of Brazil, bringing innovation to public safety.
  3. So firstly lets look at the global challenge: In the past those of us from the law enforcement community and to some extent the national security space used to view our threat spectrum through the prism of crime and terror, or war and civil unrest, which was predicated as physical, real world threats. Now though we have seen over the past decade through globalisation, digital transformation, mass migration, the economy and a changing geopolitical order the threat radar is far more complex than it ever was. It is now displaying a significant shift into the cyber world. As recently reported through the World Economic Forum’s Global Risk Register and subject of heated discussions at the UN, the INTERPOL General Assembly in Dubai in November and the gathering of global leaders at Davos, Switzerland, the challenge is somewhat multi-dimensional now, leading us onto an interpretation that we are faced with seismic changes through what has been termed ‘Globalisation version 4.0’. It challenges some of our past assumptions on risk. When we look at recent international surveys on public perceptions of what they regard as primary risks we see some surprises: With terror attacks accounting for a response of only 20%, Violent crime 30%, Yet these used to be the primary occupation of our security strategists, perpetually within our ‘top ten’, but it seems they’re not the primary concern to many of our citizens today: Instead we see their greatest concerns in their ‘top ten’ are; Cyber attacks for the theft of identity and fraud at 82% Cyber attacks leading to disruptions to critical infrastructures and business at 80%. Clearly demonstrating the fear and threat our citizens have from the cyber world. You will also see at large scale migration and natural disasters which brings in a wider context to our physical world. Another interesting observation was a loss in confidence in collective security alliances with a response rate of at 73%. Does this suggest that the formula we are using to protect is not effective enough for our citizens now to have confidence in? Do we need to change? Do we need to redesign our energy and innovation in a different way to bridge the gap between the real and cyber world?
  4. Following on with this theme of the physical and cyber world we are confronted with new challenges: These reprioritised interpretations of risk from our citizens signpost a new concern. The physical related to natural disasters which can lead to destruction of cities, forcing mass migration, which can and often do lead onto a potential significant loss of life, and civil unrest. Followed by the growing fear of how we better protect our physical and cyber borders, including how we prevent a biological attack or natural pandemic. This threat demonstrates the clear bridge between cyber and real world problems, as it has the potential to be physically brought to our shores or the knowledge transferred across the cyber border to permit domestic creation and delivery. Regional threat assessment including Europol’s IOCT 2018 and Trend Micro’s indicate the growing significance of Africa as a source of both cyber enabled and increasingly cyber-dependent crime. This trend continues with West African OCGs being increasingly sophisticated in cybercrime. While ‘traditional’ social engineering scams still epitomise the crimes associated with this region, social engineering combined with technical attacks involving malware are becoming more commonplace. Within Europe the majority of cyber threats continue to emanate from within Europe, either domestically, or from other European countries. The current emphasis on the use of email as an attack vector is clearly demonstrated in some of the trends highlighted by industry. Austria, Germany, Hungary, Italy, Russia, Spain and the UK, had some of the highest global rates of malicious emails containing malware, while Ireland, Norway and Sweden similarly had some of the highest global rates of email containing malicious URLs. Moreover, the Netherlands, Hungary, Portugal and Austria, also suffered from high global rates of phishing emails. In some cases this was exacerbated by some of the world’s highest rates of spam. These attacks also account, at least in part for the fact that a significant proportion of global attacks originating from compromised IoT devices stem from a number of Europe countries. Moreover, some EU countries, such as France and Germany are significant global sources of spam. Law enforcement outlined a wide variety of cyber-attacks emanating from other European countries, although there was strong emphasis on various aspects of payment fraud. In this regard, Bulgaria and Romania were highlighted as having a key role. When we cast the spotlight onto the Americas, particularly the USA, it continue to be both a key originator of global cyber-attacks and a target for cyber-attacks originating both domestically and from overseas. Industry reporting indicates that the USA and to a lesser extent Canada, is a primary target for global ransomware attacks. The USA is also the top focus for attacks by targeted attack groups and mobile malware. The USA has been the world’s second largest host of botnet-forming compromised IoT devices since 2016. Moreover, the APWG identifies both the USA and Canada as top countries for the hosting of phishing sites, with the USA dominating those figures by some margin. Latin America also features heavily in cyber security reporting. Lack of adequate cybercrime legislation has resulted in Brazil being both the number-one target and the leading source of online attacks in Latin America; 54% of cyber-attacks reported in Brazil allegedly originate from within the country. Similar to the USA, Brazil is also a top host of phishing sites, with some reporting putting Brazil as one of the world’s top ten originators of all cyberattacks. The profile of Mexico is becoming increasingly prominent, with Mexico suffering from the largest number of cyberattacks in Latin America after Brazil. Both Brazil and Mexico suffer from malicious URL containing emails, which are coupled with some of the world’s highest rates of spam. The primary threat coming from the Americas as a whole, from a law enforcement perspective, relates to various aspects of payment fraud. Over in the Oceania region it still suffers from cybercrime internally. The major cyber-threats reported by the Australian Cyber Security Center (ASCS) mirror those reported by the EU – ransomware, data stealing malware (including the mobile variety), social engineering, DDoS, supply chain attacks and growing levels of state sponsored activity. Based on industry reporting, cyber-attacks directed towards Asia countries appear to follow a different profile and methodology compared to those commonly encountered in Europe. While emails loaded with malicious attachments are still noted in several south-east Asian countries, the use of malicious URLs to the same effect appears to be very limited. However, higher rates of phishing, particularly again in Southeast Asia, suggests that compromised credentials are still highly valued. China also has one of the world’s highest rates of spam. Asia also appears to be one of the primary regions subjected to targeted cyber-attacks. While the US was top for such attacks, seven Asian countries featured within the top ten. Asia is one of the regions particularly plagued by mobile malware, with several Asian countries featuring in various top ten lists of mobile threats, although that particular threat is concentrated in the US. China is also consistently the home the highest number of botnet-forming IoT devices, by some margin. So we can see it’s a complex threat environment. So how do we ensure we design out ineffective structures that may be enablers to this mutli-faceted threat arena? How can innovation help us solve these future challenges? How can we channel this innovation to derive rapid impact?
  5. In response to this challenge, let me share with you my thoughts on how we can channel innovation to create maximum impact. We transform to innovate: At the heart of any resilient transformation, that permits us a better opportunity to respond, has to be a fresh look at our structures. If the foundations aren’t strong, whatever we build will be at risk of collapse or weak in its response to the threat and risk thrown at it. We at NEC advise on creating a new integrated response, which channels your capability to maximum effect. We define this around three trends that deliver a better security resilience; IOT – security around the internet of things, or internet of threats as it is often referred to. IAC – enhanced inter-agency collaboration. Which has to incorporate industry and academia. This was most recently supported in the comments from the Executive Director of Europol Ms Catherine De Bole who commented in their recent 2018 IOCTA - cyber threat report where she stated; “Only if law enforcement, the private sector and the academic world work together closely can cyber crime be combatted effectively”. And finally, ICP – the integration of cyber and physical security systems and practices. Combining these three elements we can deliver a cultural change to our policy framework, operating practices, and tactical response. Designing out silos, inefficiency and creating a new order to how our citizens can embrace their new economies and communities with confidence, which are safe and resilient by design and protect their digital identity.
  6. Now I would like to take you on a deep dive and look into a specific crime area that clearly demonstrates the challenges from the criminals exploiting the cyber world to enhance their opportunity to generate vast illegal profit and hurt the innocent in the real world.
  7. A prominent area of harm and exploitation remains modern day slavery and human trafficking or people smuggling. It is an age old problem for policing, border security agencies and governments. Here we will look at the current situation and how it demonstrates the challenges faced by investigators from the fusion of the cyber and real world. We will also explore new policing practices that can improve positive outcomes for justice and most importantly the victim’s of these crimes.
  8. The threat from this crime type is well defined especially when we look at the recent joint publication from IOM and its Global Migration Data Analysis Centre (GMDAC) that reports on their assessment of global migration indicators. We can draw a deep learning from the headlines (open discussion on data). Importantly we should also pay attention to the well known underlying causes and effects. Primary drivers to mass or irregular migration remain steady with natural disaster, poverty, economic drivers, crime and terror. What is changing though is the operating environment this all takes place within.
  9. Whilst we can note that the migratory and transportation flows follow those of the global economy they utilise a complex diversity of levers to facilitate this travel. Through both legitimate and illegitimate channels these levers include corrupt officials, counterfeit documents, political impotence, organised crime and terrorism networks. On top of these are the evolving technological capabilities that enable mobility, communication, financial exchange and encryption. Throughout all of this is a common outcome – victimisation of the vulnerable and innocent, and profiteering for the criminal.
  10. Whilst there is good news in that we are seeing an increase in the conviction rates for those who traffic humans, it also probably speaks to the fact that we are seeing an increase in volume of offending. To note though is the growing concern that with each success as ever comes a deeper education for the criminal networks in the techniques and tactics we adopt to deter and detect. This leads to making the work of the investigator more challenging. They need to be smarter, more collaborative with partner agencies and importantly also joining forces with academia and industry to modernise the response.
  11. To demonstrate the increased complexity to the job of the investigator, in the past we used standard tactics to monitor and detect criminal behaviour. Through basic physical surveillance of association and activity in the real world we could identify and detect. This evidence could then be enriched with telephone intercept and financial intelligence. Now though as we can see here with the evolution of the cyber world we have a proliferation of communication channels, most utilising a form of encryption, low cost smart phone communication platforms and wifi access points that reduce the opportunity for physical surveillance and making identification of offenders even more challenging. The use of encrypted devices is prolific amongst Organised Crime Groups involved in People Smuggling/Human Trafficking. The devices are used by criminal groups and migrants for the purpose of avoiding detection by law enforcement and also because they are a less costly method of communication.   The most frequent platforms used by OCGs can be split into three main categories.   1. Advertising/public side of the OCGs, i.e. OCGs advertise to vulnerable groups and possible clients online. OCGs also advertise job opportunities and/or find associates for the ‘lawful’ side of their activities.  2. Secure means for organising and communicating between the members of the OCG or other affiliate OCGs.  3. Use of publicly accessible and available platforms to avoid law enforcement detection and facilitate cross border/maritime travel.   It is usual that some applications and platforms fulfil more than one strand of their MO.   The most commonly used platforms for the first strand include, Facebook, VM, Twitter, Telegram, snapchat and Instagram.   For the second strand the majority of OCG members use: Facebook messenger, Viber – as seen between Greece and Turkey as an example, and WhatsApp – usually if there are connections with the UK, South America or some Northern European countries, IM and Skype. Other applications used as an aid to organise their illegal activities include Skyscanner, Google maps and other GPS location applications and online platforms. All messaging apps offer end to end encryption thus OCGs and migrants do not use standard text, again both to avoid detection and save costs.     In regards to the third strand there are a variety of weather applications used such as, imo(international maritime organisation), Seaconditions, and other live boat positioning platforms. Some OCGs also monitor media using applications like CNN, Euro TV live, BBC, Euronews, national news agencies, GLWiZ and region specific media applications, as well as Twitter.   The use of foreign Sims is also a method employed by Organised Crime Groups in an effort to avoid detection. To date we are seeing little use of the Dark Web by People smuggling OCGs including document providers. There also has been little use of the Dark Web/TOR, and or dedicated encryption devices such as Black Berry Messaging (BBM).   The use of Sat phones are predominantly observed in the North Africa/Southern Greek Islands, or Turkey to Italy maritime people smuggling routes, also the vast expanses of South America, however the use of Sat Phone is less frequent by Organised Immigration Crime Groups in comparison to OCGs involved in International maritime drugs smuggling.   So we now have to embrace even more innovative investigative practices.
  12. There is the necessity to bridge the physical world with the cyber to permit investigators the opportunity to monitor, deter and detect. This cannot be achieved in isolation and requires a enterprise approach utilising government agencies which include law enforcement, academia and industry. The challenges are significant, not just in the volumes of those being trafficked, but establishing the pathways for their mobility, and their new community, marketing and the contact points the traffickers utilise in the real and virtual world. All this generates huge amounts of data that investigators need to understand, assess and then prioritise for response.
  13. To build new capabilities you need a strong foundation of R&D. NEC has developed a network of 9 global research labs that employ over 1,000 research professionals, allocating over $1 Billion or more than 5% of NEC annual revenue to innovation and developing solutions that contribite to society. Of particular note is a wide portfolio of capabilities that aid investigators and the police community to stay ahead of the technology wave that the criminals exploit.
  14. Looking to solutions from new technology and innovation we have to create new mechanisms to advance policing. Firstly lets look at the cyber world. A growing good practice is the establishment of national cyber intelligence centres. These should embrace the 3 dimensional partnership approach between State, Industry and Academia. In Japan NEC is pleased to be at the heart of this development with their Police at their national centre JC3 . It has the direct attention of the head of Government, which is of critical importance, with the Prime Minister chairing meetings. This reinforces the importance to maintain an eye on the cyber world risks in the same manner that you would the physical world. This capability needs to be connected to a wider global expertise that permits a global response as you can see. We have direct links to many of the key global and regional nodes engaged in policing these threats. This model we are now promoting and building out at other global locations to improve scale and reach.
  15. One of the new locations we have supported expansion of this cyber capability is Rwanda, in collaboration with INTERPOL, Rwanda’s national government and police, an funding from the Japanese Overseas Development Administration. Since 2016 we have been working collaboratively to create a regional centre of excellence that can be utilised not just for national cyber defence and investigation but also to project out to other cyber nodes we seek to support in the region. Through these we have a better chance to monitor and detect the threats for the virtual world that impact on the real world like Human Trafficking and other related threats.
  16. From creating the cyber nodes to police the virtual world, we then need to bridge this into the physical world and adopt new detection and surveillance techniques to aid investigators, manage the data volumes and the use of multiple identities. The most recent innovation in this regard is the role that AI and Machine Learning can have . Here you will see the evolution of this capability with NEC. We commenced the journey with “Visualization“, starting from research in technology used to automatically read strings of postal destinations. From here we invented highly-precise Fingerprint Identification and Face Recognition technologies. Now providing Iris and other detectors. Then with “Analysis”, we have been engaged in analytics technologies including Deep Learning and Machine Learning since 2000. And since 2010, we are working on research and development in technologies for “Prescription” and have created self-developed algorithms.
  17. It is through the utilization of AI that we can better fusion multi modal data and surveillance streams to improve our understanding, analysis and permit consolidation for the investigator; and permit them the opportunity to make better and more agile decisions for action to detect and detain. As an example ‘NEC the WISE’ technologies are used to convert real and cyber world data to create improved values. Improving outcomes for the investigator and the victim. Protecting borders, and bringing more offenders to justice.
  18. It is by the fusion of these capabilities that we can start to transform our cities and make them safer. Noting it is the cities that are often the primary destination for all the trafficked victims, to permit them to gain employment or be put to work and exploited to generate the vast illegal profits for the organised crime groups, or become active for terror cells. Also its important to note that forecasters are predicting that two-thirds of the worlds population are expected to be living in cities by 2050. So we need to get this right. To build better resilience to our future threats and channel the innovation, we need to build integrated and smart communities. These multi-sensory environments permit rapid detection, response and intervention to threats, as well as advanced learning to build better protection.
  19. 19
  20. So to draw in key findings and my assessment, it is clear we need to continue on our progress to close the gap between the cyber / virtual world and the physical world. This needs to inform the creation of new investigative practices that have both a global, regional and local impact. It will necessitate a further refinement of the policing culture and practices to change the skill set; talent; education; skills and capability that a new policing team will require to police a new global community. It requires challenging our old methods and the courage to test and refine new practices to get ahead of the threat curve. Not least of which is the critical importance to join better with industry and academia through trusted partnerships, as we can’t do this alone.
  21. Finally, as discussed I take a quick look at what a trusted partner to law enforcement and government may look like to support new public private partnerships? There are other great examples both here and elsewhere, but from an NEC perspective I hope you can understand the energy we invest into providing a credible, trusted partner to this most important work. We deliver high end capability and technology to support policing and national security challenges across the globe and look forward to a brighter future together.
  22. Distinguished guests, ladies and gentlemen thank you for your kind attention. I hope this presentation has been of some value to you in explaining what I perceive is the challenge between the cyber and real world. Importantly, the value that new technologies and policing practices joined with industry and academia can deliver to better assist the investigator in detecting global crime and terror.