Feeds

Keeping Bobbies ahead of the bunch

Police 2.0

Using blade systems to cut costs and sharpen efficiencies

European Police Congress For two days this week, the Congress Centre in downtown Berlin was one of the safest places on earth. The GDR-style building was packed with policemen, army officers, and private and public security experts.

Uniform-wearers from various countries loitered in the lobby, talking about their problems with informers and sharing anecdotes, while chain-smoking men in trenchcoats (honestly) wandered from stall to stall, taking detailed notes. Involuntarily, one felt intimidated by the sheer number of potential protectors.

The European Police Congress is mainly a trade fair, sponsored by T Systems, EADS, and SAP, among others. Police from various countries, including Albania and Sudan, had a look at the latest in security equipment.

Thermal image of man with gunThe overarching theme of this year's gathering of "the international security community" was counter-terrorism - something the normal copper on the street luckily has little experience with. They were more interested in gadgets like a new thermal imager, which allows law enforcers to detect people in the dark or in camouflage.

Locked and loaded

The infrared camera has a digital zoom function, perfect for "long-range night time surveillance", as the manufacturers put it.

Another hot topic was how to secure police weapons against unauthorised use – if, in the future, a criminal steals a policeman's gun, it should be virtually impossible for him to use it.

Gun barrel locking deviceA German producer of digital security systems for firearms has launched a blocking device that is inserted into the barrel and can only be removed with a pin and/or fingerprint authentication. The biometric interface can be worn around the wrist, and transmits the authentication signal via radiowave propagation.

But thermal imaging and guns apart, the law enforcement world has many similarities with the corporate world.

Apparently, the key recent innovations have more to do with the background IT systems, than with the mobile equipment. Using digital radio transmission, police on the street can have direct access to databases. The West Yorkshire police now uses Blackberry handheld computers in a pilot scheme, and alternative devices are becoming more and more common.

Boost IT visibility and business value

Next page: IO, IO, IO

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.