China All Seeing Eye. The Beginning Since 2006 over 200,000 cameras installed in a single Chinese city, Shenzhen. Cameras appear in public places sometimes.

Slides:



Advertisements
Similar presentations
Social Media and Security: A look at whats happening on campus Bev Erickson Online Community Manager.
Advertisements

Professor Byrne Lecture: September 23, Y&feature=related.
M 3.07 Distribution Channels. Intermediary: “middle man” # of Channels: the more common the item, the more channels involved Distribution intensity: the.
Blue Eye T E C H N O L G Y.
Professor Nigel Linge Computer Networking and Telecommunications Research Group University of Salford.
Development of a Surveillance Society By: Tyler Madden (Comp 1631, Winter 2011)
Privacy Forum: Think Big? Privacy in the Age of Big Data Wellington, New Zealand, 2 May 2012 Smart CCTV and the Evolution of Public Space CCTV Systems.
Tel: Unique Home Security Systems Security Supplies Captures Boards Digital Video Recorders Power Line Communication Wireless Solutions.
LOSS PREVENTION SOLUTIONS USING VIDEO ANALYTICS reduce shrinkage, protect profits A Bikal Distribution GKB Ltd Company © All Rights Reserved.
Improving ATM Security via Facial Recognition CPSC510 James Maxlow November 25 th, 2002.
Biometrics Technology Charlie Ahrens Director, DigitalPersona December 12, 2002.
Hard Technology of Crime Prevention Professor Byrne Lecture: October 7 th, 2009.
Closed Circuit Television - CCTV. In your jotter put the heading “CCTV”. Write down the full name of CCTV CCTV = Closed Circuit Television. Write this.
Bus 111 By: Ben Wolak.  Software Application  Calling  Video Calls  Instant Messaging  Texting  Operated by Microsoft  HQ in Luxembourg  Over.
Face Recognition and implications on society By Zubin Singh ICS 131.
Face Recognition By: Thanh Do Warren Ju. Face Recognition By: Thanh Do Warren Ju.
Investigation of Two Licensed Biometric Products Using Neurotechnology’s VeriLook and VeriFinger software.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Tel: Unique Home Security Systems Security Supplies Captures Boards Digital Video Recorders Power Line Communication Wireless Solutions.
Facial Recognition Facial recognition software - based on the ability to recognize a face and then measure the various features of the face. Each human.
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
Dictionary By Thomas Slack. Automatic number plate recognition Automatic Number Plate Recognition (ANPR) is a surveillance method that uses optical character.
Chapter 26 Communication Systems. Objectives After reading the chapter and reviewing the materials presented the students will be able to: Identify common.
Big Brother is watching.  1. Would you ever consider letting a TV crew come into your life to document everything? Why or why not?  Big Brother, Kardashians,
Contents Radio Advertising, Australia’s Listening – Brand Campaign Overview Radio Advertising – Reaching Australia’s Big Spenders Commercial Radio – A.
The laws Organizations are covered by lots of different laws
Development in Mobile Technologies Mobile Technology is a collective term used to describe the various types of cellular communication technology.
 Mary Jane has no computer; hence no .  She has credit cards, store savings cards, library card, a transit card and a cell phone.
Focus on China Public Security Market 04 专科刑技 3 区邱志坚 04 专科刑技 3 区邱志坚 学号
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Introducing Lottery 3ple Play Introducing Lottery 3ple Play 1.
Methods of communication
Similarities of surveillance tactics in 1984 compared to the 21 st century. By: Insia Raza ENG 4UI Mrs.Galasso.
CCTV with POS Overlay Fully integrated Database search facility S.A.Cash Register (Pty) Ltd.
Exchanging information. Communication services Voice phones SMS (short messaging service) – more commonly known as texting Fax Instant messaging – real.
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
Introductory Communications Objectives  To gain an overview of: Modems and digital telephone lines Analogue to digital conversion and digital to analogue.
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
 Face Detection Face Detection  Eye Detection Eye Detection  Lip-reading Lip-reading  Facial Feature Detection Facial Feature Detection  Gaze Tracking.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CPT 123 Internet Skills Class Notes Audio/Video Communication Session.
By: Mahmood Arabi.  DNA collection is when the police or any other organization create a database with profiles on people (mostly criminals). Profiles.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
AS/A Level ICT Rising year 12 lesson July ICT is a dynamic subject ICT is always evolving. As technology develops, there are new possibilities for.
CONFIDENTIAL PRESENTATION What is Snapface? Facial recognition and matching Web and mobile phone based Revenue generator for third parties.
Community Safety Initiative - CCTV Presentation to Privacy Issues Forum: Privacy is your Business Wellington 27 August 2008 Presented by Laurie Gabites.
 Designed to monitor the movement of people in given area.  Used video cameras to transmit a signal to a specific place on a limited set of monitors.
Biometrics.
Jordan Baxley Kyle Neal Kadell James Justin Copeland.
By Kyle Kogl Standard Advanced Enterprise Be Successful With ( 877)
Surveillance Jeff Saunders Dr. Garrison CSCI 101 Thurs. 12:30.
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
By Abanob Khalil CSC 490.  What is a smart phone?  Top Smart Phones 2015  Features, More features  Comparing between the Iphone Vs Galaxy  Negative.
Youth, Crime and Media MEP Surveillance, CCTV and media.
BETTER SAFE THAN SORRY Unit 6. Which item do you think is the most/least useful? How often do you/your parents use these items? What other pieces of equipment.
Ethical Questions Issues in IT Ethics. What Do You Think? Spammers are just exercising their free speech rights.
1 Thinking Do you have a cell phone? If so, do you prefer to communicate via text or a direct phone call? If not, do you think you would be more.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from.
Engineered Security Systems, Inc. Access Control Systems CCTV Systems Asset Protection Systems Fire Alarm Systems Laptop Protection Systems Burglar Alarm.
Think / Pair / Share What are Human Rights?
iSmart WiFi Light Bulb DVR Camera IP Camera + Lamp
BIG Data 25 Need-to-Know Facts.
Think / Pair / Share What are Human Rights?
Viseum iVOS FaceRec HOW IT WORKS
A Gift of Fire Third edition Sara Baase
Viseum UK iVOS FaceRec Viseum UK iVOS FaceRec
Diana Garcia California State University, Chico EECE 490A
G061 - Network Security.
Facial Recognition Smart Solution
Presentation transcript:

China All Seeing Eye

The Beginning Since 2006 over 200,000 cameras installed in a single Chinese city, Shenzhen. Cameras appear in public places sometimes disguised as lampposts In next 3 years 2 million more CCTVs expected to be installed in Shenzhen

"Since the surveillance cameras came in, we have seen a very dramatic decrease in crime in Shenzhen."

Chinese Surveillance Camera Market The Chinese surveillance camera market saw revenues of $4.1 billion in 2007, up 24% from 2006

Software One Chinese company has created software for CCTVs that has the ability to alert police when inordinate numbers of people begin to gather in one location

The goal The future is that Chinese citizens will be watched on CCTV, listened to on their cell phones, monitored on digital voice recognition, internet access limited via “The Great Firewall”, and movements tracked via national ID card

The Golden Shield The Golden Shield is the Chinese government attempt to maintain power and complete control over its citizens The gov’t has been documented to have limited internet access of foreign news outlets, block cell phone calls and or text messages

Tibetan Monks Tibetan monks have proclaimed that cameras have been introduced, unwillingly, to prayer rooms and monasteries

Facial Recognition New software, that should be out within a year, will “have to be able to match a face in a 10 million database in one second.” This is the next “big thing” this technology use distance between eyes as a primary identifier, because it is a feature that does not change with age