Facial recognition and cameras help catch terrorists

CCTV cameras that can detect criminals and terrorist suspects through facial recognition technology may be used at Euston railway station.

A bold initiative to identify terrorist suspects using surveillance cameras and facial recognition software is being developed by biometrics experts at the National Policing Improvement Agency.

The technology uses two-dimensional and three-dimensional images to achieve greater accuracy, and is due to be trialled at Euston railway station later this year. The trial forms part of a wider clampdown on security at key transport hubs.

Advertisement - Article continues below

A spokesman for the National Policing Improvement Agency said: "The technology is now in its second phase and we are examining its feasibility. This CCTV is sure to be more effective because it will search against databases."

If implemented, the technology would be used with a security service database of terrorist suspects to identify terrorist suspects along with minor offenders.

The images will be cross-referenced against photographs of criminals.

Euston already has a network of digital CCTV cameras that will be able to run facial recognition software.

"CCTV has been hugely successful in catching images of criminals on London Underground and on National Rail" said a spokesman for the British Transport Police.

The 7 July suicide bombers were captured on CCTV as they travelled to London from Luton.

In June, Ali Zine, a prolific pickpocket, was jailed for eight months after BTP officers at Euston recognised him from CCTV images that had been circulated to police stations.

Advertisement
Advertisement - Article continues below

The images were of him stealing a mobile phone at Piccadilly Underground Station on 6 May.

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Putting a spotlight on cyber security

An examination of the current cyber security landscape

Download now

The economics of infrastructure scalability

Find the most cost-effective and least risky way to scale

Download now

IT operations overload hinders digital transformation

Clearing the path towards a modernised system of agreement

Download now
Advertisement

Recommended

Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Visit/business/policy-legislation/356215/senators-propose-a-bill-aimed-at-ending-warrant-proof-encryption
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular

Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/policy-legislation/data-protection/356344/eu-institutions-warned-against-purchasing-any-further
data protection

EU institutions told to avoid Microsoft software after licence spat

3 Jul 2020
Visit/mobile/mobile-phones/356335/the-man-has-ruined-my-huawei-p40
Mobile Phones

The Man has ruined my Huawei P40

3 Jul 2020