Connected: The Mobile Police Station

Police departments the world over are keeping an eye out for any new technology that might aid them in doing their job in a more efficient, safe, and faster way. 

From cameras on the officers’ uniforms, meant to keep track of officers’ conduct towards citizens, to better communication system and control centers designed to provide the fastest response possible. Now a new technological solution enters the service of the police force in Spain.

Meet the Connected Police Car – a vehicle equipped with a technology that converts patrol cars into real mobile police stations. This solution was developed by the Spanish company Ficosa in collaboration with Telefónica and was recently presented at the International Security, Safety and Fire Exhibition 2016.

The patrol car has a center console which is equipped with a rugged laptop with a 10-inch touchscreen which can endure adverse conditions such as rain, extreme heat, etc. In addition, the 3G and 4G Telefónica connection allows the device to send and receive, in real time, images and videos, from the car to the police station, and vice versa. It also has an automatic license plate reader (ALPR) by which the agents can detect whether vehicles around have been stolen or are on the lists of suspects.

This smart vehicle also integrates three video surveillance cameras located at the front, in the interior and at the rear of the car. These cameras are able to record any activity that happens on its viewing angle and allow agents to generate an alert if an abnormal situation is detected, facilitating the future searching of the recorded video.  According to Defense World, Ficosa has also included an integrated antennas system with fractal technology that enhances connectivity in the vehicle.

“The Connected Police Car is an important step in enabling policemen to carry out different procedures without having to be at the police station, as well as offering them new tools to facilitate their work with the aim of improving the citizen security,” says Ficosa CEO, Xavier Pujol.

The Connected Police Car project, which is in its pilot phase, has already seven cars currently circulating in the provinces of Madrid, Zaragoza and Valencia. After this trial period, it is expected to be implemented in 150 to 200 patrol cars throughout Spain.

I_HLS: http://bit.ly/1U47hs2

« MI5's Uncontrolled Bulk Data Collection
Spying With Nano Robots Disguised As Insects »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Venable

Venable

Venable is an American Lawyer 100 law firm with nine offices across the USA, Practice areas include Cybersecurity.

StationX

StationX

StationX is a leading provider of cyber security training, consultancy and services.

Cymulate

Cymulate

Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time.

MadSec Security

MadSec Security

MadSec Security is a leading consulting company whose expertise are information and cyber security.

SAASPASS

SAASPASS

SAASPASS is a full-stack identity and access management solution, a single product which allows you to manage all your digital and physical access needs securely and conveniently.

Modux

Modux

Modux focus on a number of core competencies across cyber security including; cyber intelligence & analytics, penetration testing and training.

California Cybersecurity Institute (CCI) - Cal poly

California Cybersecurity Institute (CCI) - Cal poly

The CCI provides a hands-on research and learning environment to explore new cyber technologies and train and test tactics alongside law enforcement and cyberforensics experts.

Archivo

Archivo

Archivo is a value added reseller focused on Disaster Recovery as a Service (DRaaS), backup, hyper-convergence, hybrid storage and Cyber security.

CyFIR

CyFIR

CyFIR is a network investigation and Incident Response tool for performing live computer investigations across any size enterprise.

Hunton Andrews Kurth

Hunton Andrews Kurth

Hunton Andrews Kurth LLP serves clients across a broad range of complex transactional, litigation and regulatory matters. Practice areas include Privacy and Cybersecurity.

RealTyme

RealTyme

RealTyme is a secure communication and collaboration platform with privacy and human experience at its core.

Obrela Security Industries

Obrela Security Industries

Obrela provides security analytics and risk management services to identify, analyze, predict and prevent highly sophisticated security threats in real time.

CCX Technologies

CCX Technologies

CCX Technologies design and develop a wide range of cybersecurity and testing solutions for the aviation, and military and government markets.

Interactive

Interactive

Interactive are a leading Australian IT service provider with services in Cloud, Cyber Security, Data Centres, Business Continuity, Hardware Maintenance, Digital Workplace, and Networks.

Forward Networks

Forward Networks

Forward Networks - transforming networks to be more reliable, agile, and secure.

Nova Microsystems

Nova Microsystems

Nova's mission is to revolutionize cybersecurity through continuous data analysis and dynamic AI-driven encryption.