Facial recognition and cameras help catch terrorists

CCTV cameras that can detect criminals and terrorist suspects through facial recognition technology may be used at Euston railway station.

A bold initiative to identify terrorist suspects using surveillance cameras and facial recognition software is being developed by biometrics experts at the National Policing Improvement Agency.

The technology uses two-dimensional and three-dimensional images to achieve greater accuracy, and is due to be trialled at Euston railway station later this year. The trial forms part of a wider clampdown on security at key transport hubs.

A spokesman for the National Policing Improvement Agency said: "The technology is now in its second phase and we are examining its feasibility. This CCTV is sure to be more effective because it will search against databases."

If implemented, the technology would be used with a security service database of terrorist suspects to identify terrorist suspects along with minor offenders.

The images will be cross-referenced against photographs of criminals.

Euston already has a network of digital CCTV cameras that will be able to run facial recognition software.

"CCTV has been hugely successful in catching images of criminals on London Underground and on National Rail" said a spokesman for the British Transport Police.

The 7 July suicide bombers were captured on CCTV as they travelled to London from Luton.

In June, Ali Zine, a prolific pickpocket, was jailed for eight months after BTP officers at Euston recognised him from CCTV images that had been circulated to police stations.

The images were of him stealing a mobile phone at Piccadilly Underground Station on 6 May.

Featured Resources

Virtual desktops and apps for dummies

An easy guide to virtual desktop infrastructure, end-user computing, and more

Download now

The total economic impact of optimising and managing your hybrid multi-cloud

Cost savings and business benefits of accelerating the cloud journey

Download now

A buyer’s guide for cloud-based phone solutions

Finding the right phone system for your modern business

Download now

What’s next for the education sector?

A new learning experience

Download now

Recommended

Cyber attacks against organizations increasing as more staff work from home
cyber security

Cyber attacks against organizations increasing as more staff work from home

17 May 2021
What is phishing?
phishing

What is phishing?

17 May 2021
Cisco to acquire threat intelligence provider Kenna Security
Acquisition

Cisco to acquire threat intelligence provider Kenna Security

14 May 2021
What is the Computer Misuse Act?
Policy & legislation

What is the Computer Misuse Act?

14 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

30 Apr 2021