Police Innovative Reporting Technology

The latest version of a documentation and report system for law enforcement professionals was unveiled recently.

Dragon Law Enforcement by Nuance Communications is a professional productivity solution designed specifically for law enforcement professionals.

The system brings highly customised dictation and documentation capabilities to police officers, sergeants, detectives, and other command and support staff, at the station and while on patrol.

Accurate, timely and detailed documentation is extremely important to law enforcement and criminal justice proceedings, typically required within hours of an incident.

However, this time-consuming documentation process often impacts timely report filing, limits officer visibility in the community, and, more importantly, can compromise situational awareness when officers are “heads down” reporting or looking up license plate information.

With advanced speech recognition and robust voice command capabilities, law enforcement professionals can create detailed and accurate documentation of incidents.

This is all in real-time by voice, speed data entry into records management systems (RMS), and keep their eyes on their surroundings by minimising the use of the mobile data terminal (MDT) keyboard while stationary in patrol cars.

The development has been updated to include a next-generation speech engine leveraging Nuance Deep Learning technology, so it delivers high-recognition accuracy with the ability to learn and adapt to a variety of accents and environments; making it ideal for large workgroups and a variety of settings.

Its customised language model has also been updated to support common words and phrases used by law enforcement such as car and truck makes and models.

The vocabulary can also be additionally expanded to include custom or localised words and phrases specific to a department’s needs, such as particular names or terminology they use with a high degree of frequency.

Dragon Law Enforcement’s powerful license plate lookup mode also enables officers to automatically switch from dictation to conducting common lookup tasks where they can use the NATO phonetic alphabet.

I-HLS:

You Might Also Read

Visualisation Tech Helps Police Process Complex Data:

Police Connectivity: In-Car Video & Body Cameras:

 

 

 

« Major Defence Company Adopts Blockchain
EU Nations Expand Their Cyber Defences »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IPCopper

IPCopper

IPCopper specializes in network packet capture appliances for cybersecurity, cybersurveillance and network monitoring, and encrypted data storage.

Bufferzone Security

Bufferzone Security

BUFFERZONE® Safe Workspace® is a security suite based on Protection By Containment™, creating isolated virtual environments for safely accessing risky content.

United Nations Office on Drugs & Crime (UNODC)

United Nations Office on Drugs & Crime (UNODC)

UNODC promotes long-term and sustainable capacity building in the fight against cybercrime through supporting national structures and action.

IoTsploit

IoTsploit

IoTsploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IoT vulnerabilities.

BIND 4.0

BIND 4.0

Bind 4.0 is an acceleration program geared toward tech startups with solutions applied to Advanced Manufacturing, Smart Energy, Health Tech or Food Tech fields.

PreEmptive Solutions

PreEmptive Solutions

PreEmptive Protection hit the sweet spot between cost, convenience and functionality by helping you protect and secure your apps in a smarter way.

Bitbone

Bitbone

Bitbone develop IT infrastructure and IT security solutions that create long-term value.

Guardian Digital

Guardian Digital

Guardian Digital makes email safe for business. Threat-ready business email protection. Fully supported.

Etisalat and (e&)

Etisalat and (e&)

Etisalat Group is one of the world’s leading telecom groups in emerging markets.

Mission Critical Partners (MCP)

Mission Critical Partners (MCP)

Mission Critical Partners is committed to delivering innovative solutions that help our clients enhance and evolve their critical-communications systems and operations.

Closed Door Security

Closed Door Security

Closed Door Security is the only cybersecurity team in the north of Scotland offering everything from IASME Certification to CREST-Accredited penetration testing.

Cyphershield

Cyphershield

Cypershield is a Security and Smart Contract audit company providing professional smart contract auditing services for varied Crypto projects.

SecZone

SecZone

SecZone is a Chinese enterprise with a mission to "Make It Secure." We are dedicated to driving software security innovation globally.

DACTA Global

DACTA Global

DACTA was established with the aim of simplifying the perception of complexity surrounding digital security challenges and solutions.

Proton

Proton

Proton provides free encrypted email, calendar, drive, password manager, and VPN services. Building a better Internet.

Atlas Systems

Atlas Systems

Atlas Systems helps companies large and small accelerate their digital transformation journeys – expanding their capabilities and delivering tailored solutions including cybersecurity.