Today, one of the main objectives of government and other state institutions is to provide security for its people. With the expansion of the EU and the creation of porous borders along with, large   increases over the last decade in the ease of global travel: resulting in an expanded free movement of people and goods. Technology has also had a dramatic impact allow information to be exchanged rapidly, particularly amongst criminal and terrorist groups. Cyber security has also become an increasing threat to both National and Business Infrastructure. This has significantly increased the level challenge for government both in National Defence, Civil Defence, Intelligence and Justice Systems. The Spread of Asymmetric Threats and Terror Groups means many national Governments are overwhelmed by the scale and diversity of Threats to their National Security. ICS from 1983 onwards has developed and evolved the National Security Information System (NSIS) to meet the changing threats of the day. The ICS NSIS initially focused on civil government agencies: Police, Justice, and Border Controls. The main objective being to fully integrate information sources in order to provide immediate access to up to date information across all Civil Agencies. This has now expanded to Intelligence and Military Agencies as well. In order to provide a complete Security Information Mesh that is both secure, complete and cyber-attack proof. The system uses the latest information and input devices to capture information quickly and then make it available to all national Agencies.  Complete Integration is the Key in providing a Safe Countries and Safe Cities

 

CCIS

ICS’s mission is to provide Command and Control Software for the automation of all National Security and Civil Security Records, Resources and Operations.

The most important requirement for any real time command and control system is the ability to offer a commander the information to make a rapid assessment of the dynamic situation. The quality and speed of the information allows the user to make decisions more quickly and shortens the response time to the changing tactical situation.

CCIS is the solution which facilitates the provision of security services to people at large, and the control of specific situations with both individuals and terrorist and criminal groups. We also make Access Points Safer by allowing fast entry and verification at Borders, entering secure building. The most important element being the complete integration of all national Information Systems in order to ensure rapid deployment and secure Incident Control. Diverse data integration and wide area geo-spatial coverage provided by the ICS NSIS are a key to successful solutions in a variety of command and control applications.

 

ABCS

(Automatic Border Control System) provides automation and tracking mechanisms for all activities related to traffic across a territory’s borders. ABCS allows Police, Customs and Security Personnel to account for anyone arriving in, or departing from any defined territory.

Such a solution indirectly involves the function of political control. Recent trends and innovations, including the implications of globalization, militarization, and immigration, gives rise to the need of thorough control systems in UK and worldwide. Developments in surveillance technology, including the emergence of new forms of local, national and international communications interceptions networks requires fast and efficient border monitoring system.

ABCS is designed to streamline critical immigration functions by synchronizing information between all border points, all airports, all seaports and any other checkpoints that may be necessary to maintain order and civil liberty within the state where the system is incorporated.

ABCS takes into account its multi-functionality and its role in yielding an extension of scope, efficiency and growth of policing power. It identifies the continuum of control by monitoring the travellers’ activities.

ABCS is multilingual and can also utilize Biometric information for increased security. ABCS updates relevant records of travellers around borders ‘in real time’ so that the system provides up-to-date information for users such as Immigration Check-Point officers.

AFIS

ICS works closely with our renowned technology partners around security applications. ICS constructs solutions that are evolved around identification systems.

The latter is usually categorized into three main areas: what an individual possesses (e.g. bank smartcard), what an individual knows (e.g. PIN number), and what an individual has as part of themselves which is unique to that individual, such as a biometric characteristic (e.g. fingerprints).

Only one of these characteristics cannot be replicated, and that is biometric information. ICS regards biometric technology as a highly reliable and cost effective solution to be implemented in many different scenarios and industry systems requiring verification or identification of an individual.

A biometric attribute is unique and is impossible to change or copy. Therefore, when considering a biometric solution the type of biometric must be carefully assessed to ensure user acceptance of the system. When dealing with the public it has been proven that retina and facial scanning is not acceptable to most individuals and the latter often involves high fixed costs, however finger or hand scanning received a positive response.

Our solution, which involves fingerprint identification, has uses in passports, identity cards, driving licenses, computer security and access control systems, as well as forensic and CID applications. AFIS (Automatic Fingerprint Information System) uses technology now employed by police, governments and commercial markets around the globe.

Biometric systems can be broadly categorized into two areas:

Verification

Verification involves ascertaining and verifying that an individual is who they purport to be. In an AFIS system this involves several steps:

  • The individual’s biometric data, in this case a fingerprint or Iris scan must be registered on the system – this is a one off process.
  • The biometric data must be stored on a fast retrieval medium.
  • The biometric must be read, to verify the individual.
  • The biometric must be matched against the stored image of the relevant biometric, and verified that a positive match has been made.
  • The transaction can then proceed.

In the case of verification the scanned biometric need only be matched against one stored image to ascertain validity of the individual.

Identification

Identification can be described as identifying an individual against millions of other unique individuals. This form of systems is predominantly used in a Law Enforcement environment to identify an unknown individual.

To identify a unique unknown individual is a considerably lengthier process than verifying an individual. The reasons for this are:

An unknown individual is as it implies unknown therefore a biometric characteristic of that individual may well exist however because the individual is unknown his/her biometric characteristic must be checked against every individual biometric image stored on a biometric system. This may take only several seconds should the scanned image match one of the first images stored on the database; however it may well take several hours if the whole database has to be scanned.

A typical example of biometric identification is the system in use by the American FBI; this system has in excess of 30 million images stored on it. Search time can therefore be lengthy; however in this case speed of identification is not necessarily a critical factor.

Verification versus Identification

Verification is used in scenarios where fast matching of a known individual to a single known biometric image is required. Typically this is required in a Banking environment where transaction time is mission critical and reliability of the match is vital.

Identification is used in scenario’s where the speed of matching an unknown

Individual to a known biometric image is not critical. Typically this is used in Law Enforcement applications.