Left of Boom – Defeating the Threat Among Us

It’s no secret the world has become a much more dangerous and complicated place in the 21st century. Terrorism itself has evolved, and so has the way our federal government is combatting and defending against it.

What has become clear is that violent extremist groups like ISIS and Al Qaeda have evolved to become influencers and master manipulators online and abroad. They’re not as focused on becoming an army of covert foot soldiers attempting to penetrate U.S. borders. The result of this is the evolution of the lone wolf attacker, a typically misguided and desperate soul who loses touch with reality and is somehow convinced or brainwashed into inflicting maximum damage through violence. We’ve seen this play out recently in the United Kingdom.

Since 2001, the United States has suffered over 40 lone-wolf terror attacks perpetrated by a diverse array of personality types. Although there is no single, universally accepted definition of a lone-wolf terror attack, academics generally define a lone wolf as a single attacker who plans and commits violent acts alone, outside of any command structure and without material assistance from any group.

The perpetrators of these terrible atrocities may be influenced by extreme political ideologies claiming religious motivations, or they may be disgruntled or mentally ill. In many cases, a combination of these factors are at play. The point is, profiles for these lone-wolf terrorists are consistently challenging to identify, which therefore makes prevention of individual attacks particularly difficult. The threat, needless to say, is even greater with those in positions of trust. Airport or airline employees and contractors with access to military installations with secure credentials are examples of individuals who are sometimes susceptible to these downfalls.

Since 2001, the U.S. has suffered over 40 lone-wolf terror attacks. #homelandsecurity Click To Tweet

Where lone wolves or any violent threats are concerned, the goal is to stay “left of boom.” Popularized in military circles during the months and years after 9/11, the phrase “left of boom” refers to the moments before an explosion or attack – a period when you still have time to prepare and avert a crisis. Right of boom, by contrast, includes the chaotic and deadly moments after the explosion or attack.

Law enforcement, public safety, and military officials associated with the people who perpetrate these terrorist acts. Research suggests early detection through preventative measures like situational awareness, monitoring Internet and social channels, and if needed, psychological screenings and interventions, are the best approaches to thwarting lone wolf attacks.

Individuals who carry out these attacks do follow a similar path from ideological influence to radicalization to violence. This path begins with a grievance that leads to moral outrage and anger projection, which leads to some sort of trigger point or justification for violence. At this point in the process, most people do not act.

Want more information about a Safety and Security solution from NEC?

However, for the few who do act, either alone or in a group, the perpetrators tend to wade into an ideological end-state culminating in a terror attack. The fact that a process exists provides officials with some map to begin gathering information that might lead to prediction and prevention. Our public servants want to get left of boom in order to disrupt the chain of events that could lead to an attack.

At NEC, we’re passionate about the safety and security of all citizens. We are committed to providing solutions that assist our clients in identifying people, patterns, and predictions. For over 40 years, NEC Corporation has provided screening and background check information for purposes of law enforcement and applicant background checks. Our systems have cast the widest nets in identifying these individuals from searching local, state, FBI, DHS, Interpol and other biographic and biometrics databases.

NEC adheres to FBI, National Institute of Standards and Technology (NIST), and other industry standards for data exchange, as demonstrated by our customer install base. These deployments could allow law enforcement agencies to receive immediate notification of fault. Other random and frictionless screening with use of facial recognition may provide clues on relationships, associates and more. Such existing services can be augmented with publicly available biographic data including travel and purchase patterns to form the foundation of a collective dataset that would assist in analysis and identification of suspicious patterns leading to a prediction.

If we can look at an individual’s identity, patterns of life, and associations – among other data points – we can help our clients get closer to predicting and preventing lone-wolf attacks. We pride ourselves on being passionate problem solvers with an eye toward cutting-edge solutions that deliver precise and trusted results. If you’d like to hear more about our solutions and how we are solving the challenge of the threat among us, please contact us today.

People. Patterns. Predictions.
NEC Corporation of America’s Advanced Recognition Systems team is committed to developing and delivering public safety solutions that keep people safe.

NEC Retail Solutions

Want more information about a Safety and Security solution?

Fill out the form, and we’ll have a solutions expert reach out to you.

 

 



NEC SmartScan Propels Livescans Forward at IAI’s International Education Conference

In the world of biometrics and identity management, livescan technology is nothing new. First introduced in the early 1990s, the earliest livescans were used by law enforcement to electronically capture fingerprint and, later in the 2000s, palm print images. The primary uses case was for criminal bookings and for searching against the state and FBI’s criminal fingerprint database.

Fast-forward some 20 years, and, while there have been some advancements in the technology through the years, the software and user interface hasn’t changed all that much. NEC thinks now is the time for a renaissance in livescan technology.

This week at the International Association for Identification’s 101st International Education Conference in Cincinnati, NEC launched the next generation in livescan technology, called NEC SmartScan. You can read the details in our press release, but suffice it to say that SmartScan is designed to significantly enhance what had become an obsolete technology with an outdated user interface.

Why start a renaissance in livescan now?

For starters, rapid rotation of correctional officers leads to a constant need for training and a battle against poor quality finger and palm prints. We now have the ability to significantly enhance the user experience using the Microsoft Windows 10 operating system. This allows us to leverage a more personalized look and ability for swipe, scroll, pinch and zoom and give the system a much more modern look and feel, leading to accelerated training and improved image quality capture.

Secondly, LiveScan reliability and service has been poor. Our remote managed services, coupled with the industry’s most talented and dedicated support personnel available 24×7, leads to higher uptime, better customer satisfaction and guaranteed service level agreement (SLA) performance. The bottom line is keeping this technology online and running smoothly is a major priority in today’s world.

Thirdly, the individual components of livescan have gotten faster, better and more secure. For example, NEC’s own NeoFace facial recognition technology, recognized by the National Institute of Standards and Technology (NIST) as the world’s most accurate, will be used for operator logon and as a means to avoid duplicate data entry. Let’s leverage that in a world-class livescan!

NEC SmartScan

And finally, thanks to the introduction of various state and federal programs, the identity and biometrics industry has a host of new and exciting use cases for livescan technology. It’s not just state and local law enforcement that can use livescan these days. From state public safety departments to TSA Pre® to FBI background checks to the Department of Veteran Affairs enrollment, government agencies and departments are finding new uses for livescan. NEC plans to be there every step of the way.

Want more information about a Safety and Security solution from NEC?
Want more information about a Safety and Security solution from NEC?

IAI International Education Conference

The IAI International Education Conference, held in August each year, offers a 5-day schedule loaded with educational presentations for forensic investigators and experts from across the country. Likewise, the IAI has an impressive exposition with more than 125 booths featuring the latest products and technologies for law enforcement.

This year in Cincinnati, NEC (booth 301) is demonstrating the new SmartScan product both in kiosk and desktop form factors. We’re also holding live demos in our booth’s presentation theater, where we’ll also be giving away T-Shirts and chocolate bars, so if you are there, please come by.

Live NEC SmartScan Demos (IAI Booth 301)
Tuesday, August 9 10:30 a.m.
Tuesday, August 9 1:30 p.m.
Tuesday, August 9 4:00 p.m.
Wednesday, August 10 10:30 a.m.
Wednesday, August 10 1:30 p.m.

NEC is always excited to be a part of this conference. As in previous years, we are a Diamond sponsor and the lead sponsor for the Opening Ceremony, breakfast and keynote. This year, we’re very lucky to have as our keynote speaker the Justice Network’s Dayle Hinman, host of “Body of Evidence: From the Case Files of Dayle Hinman.”

Additionally, yours truly (John Dowden) will participate in an expert panel at 8 a.m. Thursday, August 11, titled “Expanding the IAI to Focus on Digital Evidence.” I’m proud to be part of this panel and a technology company helping to shape the future of digital evidence collection.

Feel free to follow @NEC and @The_IAI on Twitter during the show, or you can also check out the hashtag #IAI2016.

 

SmartScan Safety and Security Solutions

Want more information about a Safety and Security solution?

Fill out the form, and we’ll have a solutions expert reach out to you.