Digital Ocular Recording Device Robert Arriaga Donald Githens Marc Martin.

Slides:



Advertisements
Similar presentations
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
Advertisements

Overview of OTP Records Independent Panel of Experts Briefing Notes Friday 5 October 2007 Ayodeji Fadugba Chief, Information and Evidence Support Section.
International Theft of Trade Secret: A Case Study Presented by: Nenette Day.
Carl Hoecker Inspector General, US Capitol Police Chair, CIGIE Investigations Committee.
Data-Sharing and Governance Consultation ANALYSIS OF RESPONSES.
Electronic Privacy Does it exist?. Issue: Privacy concerns with library and bookseller records continue due to the reauthorization of Section 215. The.
PowerPoint® Slides to Accompany
Business Watch Maywood Police Department Chief Elvia Williams.
Automated Fingerprint Identification System (AFIS) Modernization Project Department Of Emergency Services and Public Protection Division of State Police.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART C FOLLOW-UP MEASURES: REAPING INFORMATION Criminal Investigation: A Method for.
1. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 2 Technology in Action Chapter 1 Why Computers Matter to You: Becoming Computer.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
CS1020 Introduction to Computers
1. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 2 Technology in Action Chapter 1 Why Computers Matter to You: Becoming Computer.
Social and Economic Impacts of IT Professor Matt Thatcher.
Digital Evidence Collection Training for Law Enforcement Developed by the Electronic Crime Partnership Initiative Video Camcorder Start Animation.
Chapter 26 Communication Systems. Objectives After reading the chapter and reviewing the materials presented the students will be able to: Identify common.
Network security policy: best practices
Written by Elizabeth Salyers. Lawyer Police/Detective Criminal Investigator/Special Agents.
Criminal Justice 2011 Chapter 8 Management of Informants and Undercover Operations Criminal Investigation The Art and the Science by Michael D. Lyman Copyright.
1 CRIMINAL LAW (FORENSIC PROCEDURES) AMENDMENT BILL [B ]: ISSUES FOR CONSIDERATION AND COMPARATIVE ANALYSIS 6 October 2009 Sueanne S. Isaac.
The Social Effect of Information System
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
 Fiber optic network in ring topology  Custom software implementing a Time Division Multiplexing (TDM) scheme  Documentation summarizing conclusions.
1 Digital Video Surveillance Systems: An Overview  Michael Dillon Vice President, Business Development Global Municipal and Public Safety Markets.
Low Power Embedded FWIRE System Using Integrate-and-Fire By Nicholas Wulf.
Business Plan Presentation. Mission “To deliver a revolutionary new energy system by producing a unique pump that makes the most efficient use possible.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
VIDEO SURVEILLANCE AND DATA PROTECTION 8th Meeting of the Central and Eastern European Commissioners Euxinograde (Varna), May 2006 Neringa Kaktaviciute.
CJ © 2011 Cengage Learning Chapter 5 Law Enforcement Today.
1 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1 What Is Computer Literacy? To be computer literate, you must: –Understand a computer’s.
Product Documentation Chapter 5. Required Medical Device Documentation  Business proposal  Product specification  Design specification  Software.
By: Mahmood Arabi.  DNA collection is when the police or any other organization create a database with profiles on people (mostly criminals). Profiles.
BRAINGATE NEURAL- INTERFACE SYSTEM BY
Law Enforcement Ideal Job. Law Enforcement 1) FBI Agent 2) Police Officer 3) U.S. Marshal 4) Forensic Scientist 5) State Trooper 6) Customs Agent 7) Secret.
1 NSS DEVELOPERS. Group Members Group Members NSS DEVELOPERS2  Anurag Sharma  Devesh Kumar Gupta  Alok Gangwar  Kuldeepak Panday Project Guide: Mr.
Digital Evidence Collection Training for Law Enforcement Developed by the Electronic Crime Partnership Initiative HDD External 2.5in Start Animation.
Transfer of Future Criminal Investigations Involving Pasadena Police Officer Involved Shootings to Los Angeles County Sheriff’s Department City Council.
3.2 Notes Crime Scene Reconstruction, Forensic Databases.
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
DATA PROTECTION ISSUES PERFORMING VIDEO SURVEILLANCE XIV Case Handling Workshop Athens, November 2006.
Criminal Justice 2011 Class Name, Instructor Name Date, Semester Chapter 1: Why We Write Police Reports.
Report Writing Intro to Law Enforcement ROP Instructor: G Uppal.
Group 1 FBI, CIA, and Homeland Security. Intoduction Original meaning of Encryption is “secrete writing” The purpose: To secure electronic commerce and.
Introduction ProjectRequirements Project Requirements In a previous senior design project, a wireless front-end was added to Iowa State University’s Teradyne.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Criminal investigation and trial Dr Carole McCartney Project Manager and Lecturer in Law, University of Leeds.
New York State Center of Excellence in Bioinformatics & Life Sciences R T U Discovery Seminar /UE 141 MMM – Spring 2008 Solving Crimes using Referent.
IPR Enforcement in the United Kingdom Kenny Wright Danish Patent and Trademark Office.
EU Data Retention Directive Team 5 March 21 st, 2006 Jeff Barger Jin Qiu Hunang Tim Schultz Tim Reiner.
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
Prosecution and investigative authorities in Romania Current status and future reforms Monica Otava Prosecutor Prosecutor’s Office Attached to the High.
The Hacking Suite For Governmental Interception. The pain: the impact of encryption on Law Enforcement and National Security FBI - Statement Before the.
Digital Forensics and Hand Held Devices Robert Trimble COSC
The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.
NETWORK VIDEO SURVEILLANCE. CCTV Closed-Circuit Television (CCTV) is the use of video cameras to transmit signal to a specific place on a designated device.
The Ideal Job By: Jason Mendoza LAW ENFORCEMENTLAW ENFORCEMENT.
The Business Plan.
Surveillance around the world
to Help Meet Interoperability Standards for the
The Business Plan.
North Carolina Law Review Symposium
Ashley Lombardo, Steve Scanlon, Jack Portnoy, Peter Hwang
Targeted surveillance
Personnel Investigations
A New Technology for Video Surveillance Cameron Serles
Creating value for the public sector
Presentation transcript:

Digital Ocular Recording Device Robert Arriaga Donald Githens Marc Martin

Overview Statement of Problem Statement of Problem Proposed Solution Proposed Solution Development of the Product Development of the Product Implementation of the Product Implementation of the Product Financial and Time Considerations of the Product Financial and Time Considerations of the Product How the Technology will Benefit Society How the Technology will Benefit Society Possible Problems with the Product Possible Problems with the Product Conclusion Conclusion

Law Enforcement Agencies are Limited in their Abilities to Collect Hard Evidence. Juries demand a high level of certainty for convictions. Current surveillance technologies increase the risk of exposure to agents.

How Can We Turn Undercover Agents into an Invisible Television Crew? Equip them with a DORD. Enables undetectable, at will recording of eyesight. Data can be used in criminal cases as evidence.

What is a DORD? Digital Ocular Recording Device. Implant that connects to the optic nerves. Digitizes and stores human eyesight. Stored data is accessible with current technology.

What Technologies are Involved in a DORD? Undeveloped Technologies Design an electrode capable of connecting to optic nerves. Design an electrode capable of connecting to optic nerves. Software to digitize electro-chemical signals. Software to digitize electro-chemical signals. Surgical methods for implanting the DORD. Surgical methods for implanting the DORD. Existing Technologies A safely implantable RF device with encryption capabilities. A safely implantable RF device with encryption capabilities. Materials that can be safely implanted into the human body to house the DORD. Materials that can be safely implanted into the human body to house the DORD. Software to compress digitized visual information. Software to compress digitized visual information. Small, long-life batteries. Small, long-life batteries.

What Resources are Needed to Develop the Technology? Five engineering teams will be created electrode development electrode development CPU design CPU design software development software development surgical implant process surgical implant process overall testing. overall testing.

Who Will Use the DORD and How Will it be Used? Every police department Every police department F.B.I. & C.I.A. & N.S.A. F.B.I. & C.I.A. & N.S.A. Military Special Forces Military Special Forces Primarily designed for undercover law enforcement agents. Primarily designed for undercover law enforcement agents. Video evidence will be collected during crimes. Video evidence will be collected during crimes. Evidence will then be presented to juries. Evidence will then be presented to juries.

Time and Financial Concerns The total development of the product is projected to be around 15 years. The total development of the product is projected to be around 15 years. The estimated development costs will be approximately $100 million (U.S.). The estimated development costs will be approximately $100 million (U.S.). Generating patents will offset total cost. Generating patents will offset total cost. There is no better customer than the U.S. government. There is no better customer than the U.S. government. Making enough profit to cover the initial costs. Making enough profit to cover the initial costs. Each implanted DORD will cost the buyer $150,000. Each implanted DORD will cost the buyer $150,000.

Benefits and Possible Problems Protection of the agents. Protection of the agents. Provide juries with more detailed evidence correctly convict criminals. Provide juries with more detailed evidence correctly convict criminals. Opens doors to other applications using the developed technologies. Opens doors to other applications using the developed technologies. Complications with surgery. Complications with surgery. Invasion of privacy. Invasion of privacy. Long-term effects on the body. Long-term effects on the body. Legal issues. Legal issues.

Conclusion Product will benefit society as a whole. Product will benefit society as a whole. Huge potential monetary gain. Huge potential monetary gain. Beneficial externalities. Beneficial externalities.