Hard Technology of Crime Prevention Professor Byrne Lecture: October 7 th, 2009.

Slides:



Advertisements
Similar presentations
CLOSED CIRCUIT TELEVISION (CCTV) SURVEILLANCE SYSTEMS
Advertisements

Professor Byrne Lecture: September 23, Y&feature=related.
Jeffrey Butts, Director Research & Evaluation Center John Jay College of Criminal Justice City University of New York November 2014 Evaluating the Effectiveness.
Community Crime Prevention CCTV in Victoria A Guide to Developing CCTV in Victoria Presenter:Simon Walker Title:Senior Policy Officer Date:13 November.
Crime Control or Crime Culture? Closed Circuit Televisions (CCTV)
Neighborhood Watch John E. Williams, CPS Certified Crime Prevention Specialist Beavercreek Police Department.
Are they exceeding their powers and threatening people’s privacy rights?
Development of a Surveillance Society By: Tyler Madden (Comp 1631, Winter 2011)
2 Language of Computer Crime Investigation
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Accident and Emergency Dept. Data Sharing to Reduce Alcohol- Related Violence and Violent Crime.
EMI Systems Limited specializes in CCTV surveillance systems that ranges from stand-alone cameras to fully integrated security control centers and to the.
ASAP Unit Advanced Surveillance And Protection.  Uniquely High Number of Violent Street Gangs  58 Gangs  11,000 Documented Gang Members  Relatively.
Executive Issues Seminar Series 1998 Law Enforcement Management Institute of Texas Sam Houston State University.
CCTV TECHNOLOGY AND PRIVACY CONCERNS Susan F. Brinkley, Ph.D. University of Tampa.
LOSS PREVENTION SOLUTIONS USING VIDEO ANALYTICS reduce shrinkage, protect profits A Bikal Distribution GKB Ltd Company © All Rights Reserved.
Jim Niehaus October 9, Topics No Cost Considerations Systems with 24/7 Monitoring Service Cameras Motion Sensors References & Product Links.
Closed Circuit Television - CCTV. In your jotter put the heading “CCTV”. Write down the full name of CCTV CCTV = Closed Circuit Television. Write this.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
Recommendations for Parents The Massachusetts Aggression Reduction Center Bridgewater State College Copyright 2008 © Elizabeth K. Englander.
New Technology in Prisons and Jails: Impact on Safety, Cost, and Offender Rehabilitation Nov.17 th 2009 Lecture Professor James Byrne.
Face Recognition and implications on society By Zubin Singh ICS 131.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Better than E9-1-1: Possible Enhancements Enabled by the Next Generation Emergency Services Signaling Mary Brown (Cisco)
Facial Recognition Facial recognition software - based on the ability to recognize a face and then measure the various features of the face. Each human.
Big Brother is watching.  1. Would you ever consider letting a TV crew come into your life to document everything? Why or why not?  Big Brother, Kardashians,
Digital Technology Basics Digital Technology Basics includes two lessons:  Lesson 1: The Modern Digital Experience  Lesson 2: Digital Technology & Career.
Kitsap County Sheriff’s Office Neighborhood Watch Program  Four major parts to program  Set up program  Member list / Phone tree  Map of community.
By Paul Capers.  A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves.
Prineville Police Department Volunteers in Policing Program.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
From the following article write: –3 things you found interesting and why. –2 careers you might be interested in and why. –1 career you never.
Jonathan Lewin, Commander Information Services Division Chicago Police Department Philip J. Cline, Superintendent City of Chicago Richard M. Daley, Mayor.
The Social Effect of Information System
Similarities of surveillance tactics in 1984 compared to the 21 st century. By: Insia Raza ENG 4UI Mrs.Galasso.
Exchanging information. Communication services Voice phones SMS (short messaging service) – more commonly known as texting Fax Instant messaging – real.
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
Prineville Police Department Citizens On Patrol City Of Prineville.
Avoiding and Preventing Violence
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
SGT TIM HEPNER KANSAS HIGHWAY PATROL TROOP A/H MOTOR CARRIER INSPECTION.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
PrivacyCam: Tomorrow’s Smart Video Surveillance Technology Presented By - Ankur Chattopadhyay.
China All Seeing Eye. The Beginning Since 2006 over 200,000 cameras installed in a single Chinese city, Shenzhen. Cameras appear in public places sometimes.
 The job of a police officer is to work in a community to ensure the safety of the community and to maintain law and order. I am interested in this career.
Jonathan Lewin, Commander Information Services Division Chicago Police Department Philip J. Cline, Superintendent City of Chicago Richard M. Daley, Mayor.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Illegal Immigration. Stats According to the Center for Immigration Studies –January 2000 there were 7 million illegal aliens in the US –Illegal alien.
Global Solutions For Remote Property Monitoring. Project planning and management Project planning and management Design Installation and Commissioning.
By: Asfa Khan and Huda Mukhtar
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
Hospitality Operations Objective 3.04 Security. Objective Security  State the major responsibility of the Security Department The protection of.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
C H. 13 V IOLENCE. P ERSONAL S AFETY Lesson 1 Pgs
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Newark Cops & CCTV. Intro of Surveillance cameras to Newark 110 new surveillance cameras & a gunshot detection system planned for Newark Sparked by the.
Gun Control Leading Debates in Gun Control Policy.
Personal BehaviorLesson 5, Chapter 21 Avoiding and Preventing Violence.
AVOIDING AND PREVENTING VIOLENCE. Violence in Our Society Violence is any act that causes physical or psychological harm to a person or damage to property.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Flame & Smoke Detection System Flame & Smoke Vision Detection is an intelligent vision-based analytics system which can timely detect suspicious fire or.
Preventing Violence In this lesson, you will Learn About… How violence affects teens. The causes of violence in society. What you can do to avoid becoming.
Advantage of Security Systems.  Today security camera is a much needed thing to protect us and to preserve valuable properties.  Along with the home.
Engineered Security Systems, Inc. Access Control Systems CCTV Systems Asset Protection Systems Fire Alarm Systems Laptop Protection Systems Burglar Alarm.
Executive Issues Seminar Series Executive Issues Seminar Series 1998
The 'Be Safe’ Mobile Phone Theft Toolkit
Viseum UK iVOS FaceRec Viseum UK iVOS FaceRec
Bayo Vista Neighborhood Watch & Emergency Preparation
Presentation transcript:

Hard Technology of Crime Prevention Professor Byrne Lecture: October 7 th, 2009

Y&feature=related

Hard Technology Crime Prevention Applications CCTV Street Lighting Personal Protection devices: guns, tasors, knives, mace, etc. Home protection devices: locks, surveillance,monitoring,private security Neighborhood protection systems: walled neighborhoods

CCTV and Street Lighting CCTV and street lighting strategies often used in conjunction More common in England than US Evidence of Effectiveness is mixed Some Evidence of crime reduction for property crimes such as auto theft No Evidence of crime reduction for violent crime

Next Generation of CCTV CCTV and Facial Recognition Software linked to National ID Data Base CCTV and Behavior Monitoring Software tested at John Hopkins University Future Shock: Beyond Orwell’s 1984 scenario

Future Shock Imagine the scenario: lamp post is triggered by technology to spot you walking strangely begins recording your conversation, scans your face to match your details in the national database, X-rays you to check for weapons shouts "stand still citizen" and scans your brain to check whether you intend to commit a crime sees you're a bit depressed, sections you under mental health act, cops pick you up, hand you in to doctors who lock you up and microchip you.

Personal Protection Devices Extent of Use: 1 in 2 homes have a gun, but we don’t have data on the use of other personal protection devices. Evidence of Effectiveness is debated Gun-related injuries from accidents are a serious problem Tasers are used both to commit crime and prevent crime

Home Protection Devices Home security systems are more popular in urban areas. This week’s murder in Mount Vernon New Hampshire involved the targeting of a home in an isolated, semi-rural area. Case is very similar to the Zantop Murders at Dartmouth a few years ago. Judgement Ridge is an excellent book on this crime

Neighborhood Protection There are a variety of hard technology applications being used today. Private, gated communities are one strategy. Private Security systems monitored by private security firms are another strategy. Evidence of effectiveness?

Newark Cops & CCTV

Intro of Surveillance cameras to Newark 110 new surveillance cameras & a gunshot detection system planned for Newark Sparked by the death of 3 college students in Summer 07 Plan financed with private money raised by Newark Community Foundation, $3.2 million

Progress In 8 months – 44 cameras in a 7 square mile area The area represents the location on 80% of all Newark gun violence in last 3 years

Placement and Monitoring The cameras are on lamp posts, above intersections and on public & private buildings Footage streams real-time to a police communications center

Cntd… Clerks monitor footage and can adjust camera focus and field of vision Footage is stored for 30 days

Does it work? Dr. Byrne says NO London, England says NO Or Does it Simply displace crime?

Newark Results The video surveillance unit has detected 289 criminal incidents for first quarter of 2008 Another 799 incidents were either called in to 911 or officers on patrol

China All Seeing Eye

The Beginning Since 2006 over 200,000 cameras installed in a single Chinese city, Shenzhen. Cameras appear in public places sometimes disguised as lampposts In next 3 years 2 million more CCTVs expected to be installed in Shenzhen

"Since the surveillance cameras came in, we have seen a very dramatic decrease in crime in Shenzhen."

Chinese Surveillance Camera Market The Chinese surveillance camera market saw revenues of $4.1 billion in 2007, up 24% from 2006

Software One Chinese company has created software for CCTVs that has the ability to alert police when inordinate numbers of people begin to gather in one location

The goal The future is that Chinese citizens will be watched on CCTV, listened to on their cell phones, monitored on digital voice recognition, internet access limited via “The Great Firewall”, and movements tracked via national ID card

The Golden Shield The Golden Shield is the Chinese government attempt to maintain power and complete control over its citizens The gov’t has been documented to have limited internet access of foreign news outlets, block cell phone calls and or text messages

Tibetan Monks Tibetan monks have proclaimed that cameras have been introduced, unwillingly, to prayer rooms and monasteries

Facial Recognition New software, that should be out within a year, will “have to be able to match a face in a 10 million database in one second.” This is the next “big thing” this technology use distance between eyes as a primary identifier, because it is a feature that does not change with age