Information - Services. CIO Bundeskriminalamt Germany

Size: px
Start display at page:

Download "Information - Services. CIO Bundeskriminalamt Germany"

Transcription

1 Information - Services Dr Gunther Guzielski Dr. Gunther Guzielski CIO Bundeskriminalamt Germany

2 Nomadic Usage of telecommunication A phone call between a German accused and a UK-call partner results in two requests for assistance in official matters and a rather complex case European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 2

3 Information analysis Surveillance of an accused with known phone number Phone partner in UK investigation of his phone number relates to a VoIP provider and usage of a temporary IP-address IP-address area is used by a Norwegian mobile phone provider Investigation in Norway shows that this IP-address was temporary used by an Internet t connection within an UMTS connection This UMTS connection was established for a Norwegian cell phone numer, via roaming in Germany in a given broadcaster cell-id European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 3

4 Modelling the Identity of a Person Human identity oath witness/ institution identification action birth certificate memory/document /database identity card/ passport/ drivers license Fingerprint-/ Image-/ iris-/dna-db DN A fingerprin t plastic card teeth biometric mark handwriting voice body, face, birthmark European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 4 iri s

5 Information Analysis complete Event Role Product Location Institution Surveillance of an accused with known phone number Phone partner in UK investigation of his phone number relates to a VoIP provider and usage of a temporary IP-address IP-address area is used by a Norwegian mobile phone provider Investigation in Norway shows that this IP-address was temporary used by an Internet t connection within an UMTS connection This UMTS connection was established for a Norwegian cell phone numer, via roaming in Germany in a given broadcaster cell-id European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 5

6 Modelling the Business Process Akteur-3 <<Richter>> Antrag 5 Akteur-2 <<Telekommunikations-anbieter>> Aufforderung Akteur-2 <<Staatsanwalt>> Verkehrsdaten zukünftig Ausleitung Beschluss Anregung Beschluss Kopie TKÜ-System 13 Bearbeitung Antrag AIF O/S Akteur-1 <<Ermittler>> Akteur-4 <<Telekommunikations-anbieter>> 9 Schaltung Beschluss Kopie Auskunft AIF Akteur-3 <<TKÜ-Service>> European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 6

7 Modelling the Case European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 7

8 Modelling the Data conceptional business data model includes events to take time dimension into account Taxonomies for independent d entities i Person, Institution, Object and Thing Ontology with dependent entities like Ownership, Product, Role, Presence, Place and Location European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 8

9 Data Model Person Person-Institution, Role hosts Institution mit Relationship Person-Object, Presence in is involved in Unit belongs to participates in Person-Thing, Ownership by is used at Event happens at Institution-Object, Location is happens with at zu Link is Institution-Sache, Produkt contains Thing belongs to Thing-Object, Place in in Object contains is part of Part Element European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 9

10 Knowledge documented in Models Akteur-3 <<Richter>> Antrag oath birth certificate identity card/ passport/ drivers license witness/ institution memory/docu ment/databas e Fingerprint-/ Image-/ iris-/dna-db D N A finger print Human identity identification action plastic card teeth biometric mark i r i s handwriting voice body, face, birthmark Akteur-2 <<Telekommunikations-anbieter>> Beschluss Kopie 9 12 Verkehrsdaten zukünftig TKÜ-System 10 O/S Schaltung Ausleitung Bearbeitung Aufforderung Beschluss 14 Beschluss Kopie Akteur-1 <<Ermittler>> Anregung Akteur-2 <<Staatsanwalt>> t Antrag AIF Akteur-4 <<Telekommunikations-anbieter>> 2 Auskunft AIF Person Akteur-3 <<TKÜ-Service>> Person-Institution, Role hosts Institution mit Relationship Person-Object, Presence in participates in is involved in Unit belongs to Person-Thing, Ownership by is used at Event happens at Institution-Object, Location is happens with at zu Link is Institution-Sache, Produkt contains Thing belongs to Part in Thing-Object, Place Object in contains Element European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 10 is part of

11 From Models to Services See Next presentation! European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 11

12 Questions? European Police Congress, Berlin Dr. Gunther Guzielsi, CIO BKA 12

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals and protect people, information, buildings, countries

More information

Inviting New Players to the Multimedia M-Commerce Arena

Inviting New Players to the Multimedia M-Commerce Arena Inviting New Players to the Multimedia M-Commerce Arena An approach to enhance the current M-Commerce business model with regard to emerging DVB-T networks Oslo, 2004-09-17 Stefan Figge T-Mobile Chair

More information

Weber Human Services Identity Theft Prevention Policy

Weber Human Services Identity Theft Prevention Policy Weber Human Services Identity Theft Prevention Policy Purpose: Weber Human Services (WHS) is committed to protecting the privacy of the Protected Health Information ( PHI ) of our clients and the Personal

More information

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-3250.0 FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-3250.0 FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-3250.0 FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES 1. PROCEDURE SUMMARY STATMENT The purpose of this procedure

More information

UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy

UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy RESPONSIBLE OFFICIAL : Executive Vice Chancellor/Provost RESPONSIBLE OFFICIAL : Business & Financial Services EFFECTIVE

More information

Appalachian State University Identity Theft Prevention Program Procedures

Appalachian State University Identity Theft Prevention Program Procedures Appalachian State University Identity Theft Prevention Program Procedures Program Overview I. PURPOSE The purpose of the Program is to: Identify, detect and respond to Red Flags; Prevent and mitigate Identity

More information

Section 1028 - Fraud and related activity in connection with identification documents and information

Section 1028 - Fraud and related activity in connection with identification documents and information TITLE 18 > PART I > CHAPTER 47 > Sec. 1028. IDENTITY THEFT Section 1028 - Fraud and related activity in connection with identification documents and information (a) (4) (5) (6) Whoever, in a circumstance

More information

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt

More information

Identity Theft Prevention Program

Identity Theft Prevention Program The University of North Carolina at Chapel Hill Identity Theft Prevention Program The Board of Trustees of The University of North Carolina at Chapel Hill (the University ) adopts this Identity Theft Prevention

More information

Lake Havasu City. Identity Theft Prevention Program

Lake Havasu City. Identity Theft Prevention Program Lake Havasu City Identity Theft Prevention Program Effective beginning May 1, 2009 I. PROGRAM ADOPTION Lake Havasu City (City) developed this Identity Theft Prevention Program (Program) pursuant to the

More information

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM Concordia Board of Regents May 2009 A Resolution Adopting the Identity Theft Prevention Program WHEREAS, The Federal Trade Commission, under Part 681 of Title 16 in the

More information

Statewatch Briefing ID Cards in the EU: Current state of play

Statewatch Briefing ID Cards in the EU: Current state of play Statewatch Briefing ID Cards in the EU: Current state of play Introduction In March 2010, the Council Presidency sent out a questionnaire to EU Member States and countries that are members of the socalled

More information

Criminal Law Consolidation (Identity Theft) Amendment Act 2003

Criminal Law Consolidation (Identity Theft) Amendment Act 2003 No 60 of 2003 assented to 11.12.2003 South Australia Criminal Law Consolidation (Identity Theft) Amendment Act 2003 An Act to amend the Criminal Law Consolidation Act 1935 and to make a related amendment

More information

Personal National Identification System National Population Registry Mexico

Personal National Identification System National Population Registry Mexico Personal National Identification System National Population Registry Mexico January 21st, 2010 1 Operational Diagram Identity Card 1. Birth Certificate 2. Enrollment process 3. Secure Channel 4. Data Bases

More information

CUSTOMER VERIFICATION FREQUENTLY ASKED QUESTIONS Version 2.4

CUSTOMER VERIFICATION FREQUENTLY ASKED QUESTIONS Version 2.4 1. What is Customer Verification CUSTOMER VERIFICATION FREQUENTLY ASKED QUESTIONS Version 2.4 Customer Verification is a process whereby customers of CIPRO will be verified by an outside service provider

More information

Citizen s Charter (Services of the Embassy)

Citizen s Charter (Services of the Embassy) Citizen s Charter (Services of the Embassy) S. No. Services Documents Required Fees Mode of Payment 1. Visa Duly filled in Visa Application Cash or One passport size photograph deposit in Passport with

More information

APPLICATION FOR ENLISTMENT IN THE JAMAICA POLICE SERVICE (JCF, ISCF, DC)

APPLICATION FOR ENLISTMENT IN THE JAMAICA POLICE SERVICE (JCF, ISCF, DC) APPLICATION FOR ENLISTMENT IN THE JAMAICA POLICE SERVICE (JCF, ISCF, DC) Passport size Photograph The JCF Recruitment Policy aims to recruit suitable and qualified individuals to become a part of the Organization.

More information

Virginia Commonwealth University Information Security Standard

Virginia Commonwealth University Information Security Standard Virginia Commonwealth University Information Security Standard Title: Scope: Data Classification Standard This document provides the classification requirements for all data generated, processed, stored,

More information

RHODE ISLAND IDENTITY THEFT RANKING BY STATE: Rank 34, 56.0 Complaints Per 100,000 Population, 592 Complaints (2007) Updated January 5, 2009

RHODE ISLAND IDENTITY THEFT RANKING BY STATE: Rank 34, 56.0 Complaints Per 100,000 Population, 592 Complaints (2007) Updated January 5, 2009 RHODE ISLAND IDENTITY THEFT RANKING BY STATE: Rank 34, 56.0 Complaints Per 100,000 Population, 592 Complaints (2007) Updated January 5, 2009 Current Laws: A person commits the crime of identity fraud if

More information

COUNTY OF SONOMA AND SONOMA COUNTY COMMUNITY DEVELOPMENT COMMISSION IDENTITY THEFT PREVENTION PROGRAM

COUNTY OF SONOMA AND SONOMA COUNTY COMMUNITY DEVELOPMENT COMMISSION IDENTITY THEFT PREVENTION PROGRAM COUNTY OF SONOMA AND SONOMA COUNTY COMMUNITY DEVELOPMENT COMMISSION IDENTITY THEFT PREVENTION PROGRAM In Accordance with the Fair and Accurate Credit Transactions Act of 2003 And 16 CFR 681.1 and 16 CFR

More information

Discover Germany s Electronic Passport

Discover Germany s Electronic Passport Discover Germany s Electronic Passport Starting 1 Nov. 2007 E-Passport 2nd Generation www.epass.de 1 Introducing Germany s e-passport If you want to know why there are electronic passports and how to recognize

More information

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM In compliance with Part 681 of Title 16 of the Code of Federal Regulations implementing Sections 114 of the Fair and Accurate Credit Transactions Act of 2003 ("FACTA"),

More information

How to Provide Seamless Services in Fragmented NGA Networks The Open Access Concept of VATM

How to Provide Seamless Services in Fragmented NGA Networks The Open Access Concept of VATM How to Provide Seamless Services in Fragmented NGA Networks The Open Access Concept of VATM Verband der Anbieter von Telekommunikations- und Mehrwertdiensten e. V. 2 The VATM is the largest competitive

More information

Biometric Template Protection & Usage

Biometric Template Protection & Usage Protection & Usage September 23, 2002 Colin Soutar, CTO Bioscrypt Inc. Consortium Conference (BC2002) Company Overview Definition of Terms User Identifier Protection Conclusions 2 Mytec Technologies Inc.

More information

Judicial Council of Georgia

Judicial Council of Georgia Form 1 Judicial Council of Georgia CERTIFIED PROCESS SERVER APPLICATION 1. Name (Last Name) (First Name) (Middle Initial) 2. Address City State ZIP 3. Work Telephone ( ) 4. Alternate Telephone ( ) 5. of

More information

Regulations concerning measures to combat money laundering and the financing of terrorism, etc.

Regulations concerning measures to combat money laundering and the financing of terrorism, etc. Regulations concerning measures to combat money laundering and the financing of terrorism, etc. Translation as of April 2009. This translation is for information purposes only. Legal authenticity remains

More information

Overview of the U.S.-Mexico High Level Consultative Commission Cross-Border Communications Long-Term Solution. June 2007

Overview of the U.S.-Mexico High Level Consultative Commission Cross-Border Communications Long-Term Solution. June 2007 Overview of the U.S.-Mexico High Level Consultative Commission Cross-Border Communications Long-Term Solution June 2007 Background U.S.-Mexico High Level Consultative Commission on Telecommunications (HLCC)

More information

FAQs Electronic residence permit

FAQs Electronic residence permit FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit

More information

Developing a Federal Vision for Identity Management

Developing a Federal Vision for Identity Management Developing a Federal Vision for Identity Management Duane Blackburn Office of Science and Technology Policy Executive Office of the President January 16, 2009 Height DNA Biometric Name Date of Birth SSN

More information

An OSGi based HMI for networked vehicles. Telefónica I+D Miguel García Longarón

An OSGi based HMI for networked vehicles. Telefónica I+D Miguel García Longarón June 10-11, 2008 Berlin, Germany An OSGi based HMI for networked vehicles Telefónica I+D Miguel García Longarón Networked Vehicle 2 Networked Vehicle! Tomorrow, the vehicles will be networked! Using Always

More information

N Stage Authentication with Biometric Devices. Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute

N Stage Authentication with Biometric Devices. Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002 N Stage Authentication Outline Background on Authentication General Network

More information

Police Education. Dept. of. Police and Security Management. Prof. Dr. Wolfgang Kühnel wolfgang.kuehnel(at)hwr-berlin.de

Police Education. Dept. of. Police and Security Management. Prof. Dr. Wolfgang Kühnel wolfgang.kuehnel(at)hwr-berlin.de Police Education Dept. of. Police and Security Management Prof. Dr. Wolfgang Kühnel wolfgang.kuehnel(at)hwr-berlin.de 1 Police Education in Germany Tasks of German Police Agencies The Bachelor and Master

More information

French Justice Portal. Authentication methods and technologies. Page n 1

French Justice Portal. Authentication methods and technologies. Page n 1 French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication

More information

Guidance on biometric technologies in schools. Becta guidance on biometric technologies in schools

Guidance on biometric technologies in schools. Becta guidance on biometric technologies in schools Guidance on biometric technologies in schools Becta guidance on biometric technologies in schools Version 1, July 2007 http://www.becta.org.uk page 1 of 10 Contents 1 Introduction what this guidance is

More information

Florida Agricultural & Mechanical University Board of Trustees Policy

Florida Agricultural & Mechanical University Board of Trustees Policy Florida Agricultural & Mechanical University Board of Trustees Policy Board of Trustees Policy Number: Date of Adoption/Revision: September 13, 2007/ April 9, 2009 Subject Authority Applicability Telecommunications

More information

CHAPTER 149 FORMERLY SENATE SUBSTITUTE NO. 1 FOR SENATE BILL NO. 79

CHAPTER 149 FORMERLY SENATE SUBSTITUTE NO. 1 FOR SENATE BILL NO. 79 CHAPTER 149 FORMERLY SENATE SUBSTITUTE NO. 1 FOR SENATE BILL NO. 79 AN ACT TO AMEND TITLE 14 OF THE DELAWARE CODE RELATING TO EDUCATIONAL DATA GOVERNANCE. BE IT ENACTED BY THE GENERAL ASSEMBLY OF THE STATE

More information

VMobile White Label Program

VMobile White Label Program VMobile White Label Program BlackBerryVoIP Solution Table of Contents VMobile: Who we are Why mobile VoIP? Vmobile WLP: What is it? Vmobile WLP: Who can benefit? Vmobile WLP: Which problem it solves? VMobile:

More information

UCLA Policy 313: Prevention of Identity Theft

UCLA Policy 313: Prevention of Identity Theft UCLA Policy 313: Prevention of Identity Theft Issuing Officer: Executive Vice Chancellor and Provost Responsible Dept: Corporate Financial Services Effective Date: July 29, 2009 Supersedes: New I. REFERENCES

More information

Assignment 1 Biometric authentication

Assignment 1 Biometric authentication Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4

More information

Crimes Amendment (Fraud and Forgery) Bill 2009

Crimes Amendment (Fraud and Forgery) Bill 2009 New South Wales Crimes Amendment (Fraud and Forgery) Bill 2009 Contents Page 1 Name of Act 2 2 Commencement 2 Schedule 1 Principal amendments to Crimes Act 1900 No 40 3 Schedule 2 Consequential and other

More information

Security of Identity Management. Professor Brian Collins

Security of Identity Management. Professor Brian Collins Security of Identity Management Professor Brian Collins Headline issues Purpose of ID management and ID security Practical process and technology issues Enrolment processes Identity verification Limitations

More information

Assignment Discovery Online Curriculum. Lesson title: Forensic Detectives: Who Did It? Grade level: 6-8. Subject Area: Forensic Science, Chemistry

Assignment Discovery Online Curriculum. Lesson title: Forensic Detectives: Who Did It? Grade level: 6-8. Subject Area: Forensic Science, Chemistry Assignment Discovery Online Curriculum Lesson title: Forensic Detectives: Who Did It? Grade level: 6-8 Subject Area: Forensic Science, Chemistry Duration: Two or three class periods Objectives: Students

More information

Moving Beyond Passwords: Consumer Attitudes on Online Authentication A Study of US, UK and German Consumers

Moving Beyond Passwords: Consumer Attitudes on Online Authentication A Study of US, UK and German Consumers Moving Beyond Passwords: Consumer Attitudes on Online Authentication A Study of US, UK and German Consumers Sponsored by Nok Nok Labs, Inc. Independently conducted by Ponemon Institute LLC Publication

More information

Lawful Interception in German VoIP Networks

Lawful Interception in German VoIP Networks Lawful Interception in German VoIP Networks 22C3, Berlin Hendrik Scholz hscholz@raisdorf.net http://www.wormulon.net/ Agenda What is Lawful Interception (LI)? Terms, Laws Lawful Interception in PSTN networks

More information

EDEN PRAIRIE POLICE DEPARTMENT PROCEDURE PACKET. (Revised January 2016) Reporting Check & Financial Transaction Card Fraud

EDEN PRAIRIE POLICE DEPARTMENT PROCEDURE PACKET. (Revised January 2016) Reporting Check & Financial Transaction Card Fraud EDEN PRAIRIE POLICE DEPARTMENT PROCEDURE PACKET (Revised January 2016) Reporting Check & Financial Transaction Card Fraud Check Acceptance Procedure N.S.F. Checks and Account Closed Checks Proper Identification:

More information

PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT

PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT Office of Employee Benefits Administrative Manual PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT 150 EFFECTIVE DATE: AUGUST 1, 2009 REVISION DATE: PURPOSE: Ensure that the Office of Employee Benefits

More information

UNCLASS BASTION-LEATHERNECK (BL) JOINT BADGING POLICY - TERMS AND DEFINITIONS. SER TERM DEFINITION 1 Joint Badging Office (JBO)

UNCLASS BASTION-LEATHERNECK (BL) JOINT BADGING POLICY - TERMS AND DEFINITIONS. SER TERM DEFINITION 1 Joint Badging Office (JBO) BASTION-LEATHERNECK (BL) JOINT BADGING POLICY - TERMS AND DEFINITIONS SER TERM DEFINITION 1 Joint Badging Office (JBO) The JBO is responsible for badging and accountability of all contractors and DoD personnel,

More information

An affidavit is a document containing a statement that the deponent swears to be true to the best of their knowledge.

An affidavit is a document containing a statement that the deponent swears to be true to the best of their knowledge. Affidavit An affidavit is a document containing a statement that the deponent swears to be true to the best of their knowledge. The commissioner then signs as confirmation that the oath or affirmation

More information

Evidence of Identity: Breeder Documents and Beyond Barry J. Kefauver International national Standards ds Organization ation Why Care? A false passport in the hands of a terrorist is as dangerous as a bomb

More information

The treatment of Voice over Internet Protocol (VoIP) under the EU Regulatory Framework

The treatment of Voice over Internet Protocol (VoIP) under the EU Regulatory Framework Comments on the Commission Consultation Document on The treatment of Voice over Internet Protocol (VoIP) under the EU Regulatory Framework submitted by the Austrian Regulatory Authority for Broadcasting

More information

San Antonio Police Department FORGERY DETAIL 315 S. Santa Rosa SAN ANTONIO, TX 78207 (210)-207-7451 OFFICE (210)-207-4070 FAX

San Antonio Police Department FORGERY DETAIL 315 S. Santa Rosa SAN ANTONIO, TX 78207 (210)-207-7451 OFFICE (210)-207-4070 FAX San Antonio Police Department FORGERY DETAIL 315 S. Santa Rosa SAN ANTONIO, TX 78207 (210)-207-7451 OFFICE (210)-207-4070 FAX Identity Theft Packet SAPD case # Assigned Detective: The San Antonio Police

More information

Checklist for Jamaican citizens applying for Schengen visa - Required documents

Checklist for Jamaican citizens applying for Schengen visa - Required documents Checklist for Jamaican citizens applying for Schengen visa - Required documents Name: Date of birth: Citizenship: When meeting in person at the visa office at the time of your appointment, apart from the

More information

MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO

MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION A Goode Intelligence white paper sponsored by AGNITiO First Edition September 2014 Goode Intelligence All Rights Reserved Sponsored

More information

A Case Study: Vodacom Group and Redknee

A Case Study: Vodacom Group and Redknee A Case Study: Vodacom Group and Redknee Driving Growth in the Roaming Market and Improving the Customer Experience Summary > How Redknee enabled Vodacom to address the increasing market competition and

More information

MOBILE TECHNOLOGIES AND DISTANCE EDUCATION

MOBILE TECHNOLOGIES AND DISTANCE EDUCATION MOBILE TECHNOLOGIES AND DISTANCE EDUCATION Rostislav Fojtik, Hashim Habiballa Abstract: Rapid advancement of information and communication technologies enables to produce more mobile devices. Most of distance

More information

Facts about the new identity card

Facts about the new identity card Facts about the new identity card Contents The new identity card At a glance... 4 In detail... 6 Photographs... 8 New ID card, new possibilities...10 Special functions... 11 The online function...12 Reader

More information

Accreditation information on Pope Benedict XVI s visit to Germany

Accreditation information on Pope Benedict XVI s visit to Germany 08.08.2011 112 PRESS RELEASES OF THE GERMAN BISHOPS CONFERENCE Accreditation information on Pope Benedict XVI s visit to Germany Pope Benedict XVI will pay a visit to Germany from 22 until 25 September

More information

GLOBAL SECURITY ASIA 2007

GLOBAL SECURITY ASIA 2007 GLOBAL SECURITY ASIA 2007 Technology Seminar/Workshop Advanced Surveillance & Forensic Audio/Video Show Dates: Tue 27 th Thu 29 th March 2007 Venue: Hall 2, Singapore Expo. www.singapore-expo.com.sg www.globalsecasia.com

More information

engin Business Plans Updated 14 th October 2010

engin Business Plans Updated 14 th October 2010 s VoIP s Single Line Phone s Starter 20 50.00 $50.00 Included Calls N/A 100 local or national calls 450 local or national calls 27c per 20c per Engin to Voice Box may be required. Minimum 512 kpbs broadband

More information

UK Emergency Calls ESW 14 April 2011. British Telecommunications plc

UK Emergency Calls ESW 14 April 2011. British Telecommunications plc UK Emergency Calls ESW 14 April 2011 UK Emergency Service UK Population 61.4 million citizens [England(84%), Northern Ireland (3%), Scotland(8%) and Wales (5%)] UK Area - 22.6 million hectares UK 112 organisation

More information

Nomophobia Rules! Connect: ID Terry Hartmann VP Industry Applications 23 March 2014

Nomophobia Rules! Connect: ID Terry Hartmann VP Industry Applications 23 March 2014 Nomophobia Rules! Connect: ID Terry Hartmann VP Industry Applications 23 March 2014 The fastest selling gadget in history 2 billion people have smartphones with internet and touchscreen 4 billion by 2020

More information

PRIVATE CLOUD SECURITY CHALLENGES, AFFORDABILITY AND ANSWER TO A RELIABLE AND MODERNIZED MULTI-BIOMETRICS IDENTIFICATION SOLUTIONS

PRIVATE CLOUD SECURITY CHALLENGES, AFFORDABILITY AND ANSWER TO A RELIABLE AND MODERNIZED MULTI-BIOMETRICS IDENTIFICATION SOLUTIONS PRIVATE CLOUD SECURITY CHALLENGES, AFFORDABILITY AND ANSWER TO A RELIABLE AND MODERNIZED MULTI-BIOMETRICS IDENTIFICATION SOLUTIONS Identification technology has progressed from just being fingerprint matching

More information

DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010

DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010 DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010 Pan Canadian Identity Management & Authentication Framework Page 1 1 Introduction This document is intended to describe the forming

More information

SOUTH AFRICAN POLICE SERVICE

SOUTH AFRICAN POLICE SERVICE SAPS 0 SOUTH AFRICAN POLICE SERVICE APPLICATION FOR MULTIPLE IMPORT OR EXPORT PERMIT/ PERMANENT IMPORT OR EXPORT PERMIT/TEMPORARY IMPORT OR EXPORT PERMIT/IN-TRANSIT PERMIT FOR PERSONAL USE (Individuals

More information

ENTERPRISE VOICE SERVICE TERMS. Enterprise Voice Service Terms

ENTERPRISE VOICE SERVICE TERMS. Enterprise Voice Service Terms Enterprise Voice Service Terms Contents 1. How these Service Terms work... 3 2. Our Obligations... 3 3. Your Obligations... 3 4. Emergency Calls... 4 5. Service Constraints... 4 6. Number Porting... 5

More information

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly

More information

Introduction to VOIP Telephony

Introduction to VOIP Telephony 1 April 2011 Introduction to VOIP Telephony What is VoIP VoIP refers to a way to carry phone calls over an IP data network, whether on the Internet or your own internal network. A primary attraction of

More information

PROTECTION ORDER APPLICATION FORM

PROTECTION ORDER APPLICATION FORM PROTECTION ORDER APPLICATION FORM This document has been translated with a view to facilitating the understanding of its contents, but it may only be completed in Spanish. PROTECTION ORDER APPLICATION

More information

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management

More information

Identity Protection and You. Customer Update

Identity Protection and You. Customer Update Identity Protection and You Customer Update 1 The Problem: ID Theft In the time it takes to read this first sentence there will be four (4) new victims of identity theft in the United States. As many as

More information

DISTRICT OF COLUMBIA CELLULAR AND LANDLINE TELEPHONE USAGE POLICY

DISTRICT OF COLUMBIA CELLULAR AND LANDLINE TELEPHONE USAGE POLICY 11/29/2012 PURPOSE DISTRICT OF COLUMBIA CELLULAR AND LANDLINE TELEPHONE USAGE POLICY This policy is intended to minimize the District of Columbia Government s costs for landline and cell phone equipment

More information

Crimes Amendment (Fraud, Identity and Forgery Offences) Act 2009 No 99

Crimes Amendment (Fraud, Identity and Forgery Offences) Act 2009 No 99 New South Wales Crimes Amendment (Fraud, Identity and Forgery Offences) Act 2009 No 99 Contents Page 1 Name of Act 2 2 Commencement 2 Schedule 1 Principal amendments to Crimes Act 1900 No 40 3 Schedule

More information

Ohio Statewide Search Instructions

Ohio Statewide Search Instructions Ohio Statewide Search Instructions Summary The state of Ohio requires fingerprints to be obtained in order to submit a statewide criminal background check for processing. There are two sets of instructions

More information

RealScan-S. Fingerprint Scanner RealScan-S

RealScan-S. Fingerprint Scanner RealScan-S Fingerprint Scanner RealScan-S Outline A fingerprint scanner used by the police or prosecution for collecting a suspect s rolled fingerprints or acquiring a person s flat fingerprints for identification.

More information

Disruptive events in telecom market. Challenges and possible response. Proposed approach by NEC Corporation Ziua Telecomunicatiilor

Disruptive events in telecom market. Challenges and possible response. Proposed approach by NEC Corporation Ziua Telecomunicatiilor Disruptive events in telecom market Challenges and possible response Proposed approach by NEC Corporation Ziua Telecomunicatiilor Bucharest, May, 20 th, 2014 NEC Confidential MARKET CONTEXT Page 2 NEC

More information

Data Security. Updated April, 2006. CCIM Institute 430 N. Michigan Avenue Chicago, IL 60611 (312) 321-4460

Data Security. Updated April, 2006. CCIM Institute 430 N. Michigan Avenue Chicago, IL 60611 (312) 321-4460 Data Security Updated April, 2006 CCIM Institute 430 N. Michigan Avenue Chicago, IL 60611 (312) 321-4460 Background As technology has evolved and become vital for businesses, a growing number of public

More information

2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population.

2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population. 1. What is the current status of the project? INDECT started the 3rd year of work. Almost 3 years are ahead of the project. All project tasks are realized according to the schedule. Current status of the

More information

providing the full spectrum of your investigative needs

providing the full spectrum of your investigative needs providing the full spectrum of your investigative needs Morris Chase International provides a professional and sensibly priced service across the full spectrum of your investigative requirements, both

More information

FT networks, services and IS evolution perspectives towards convergence Patrice COLLET France Télécom Network, Carrier and IT Division

FT networks, services and IS evolution perspectives towards convergence Patrice COLLET France Télécom Network, Carrier and IT Division FT networks, services and IS evolution perspectives towards convergence Patrice COLLET France Télécom Network, Carrier and IT Division Networks, Carriers and IT France Télécom T vision Networks, Carriers

More information

Electronic machine-readable travel documents (emrtds) The importance of digital certificates

Electronic machine-readable travel documents (emrtds) The importance of digital certificates Electronic machine-readable travel documents (emrtds) The importance of digital certificates Superior security Electronic machine-readable travel documents (emrtds) are well-known for their good security.

More information

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge

More information

VMobile Enterprise Program

VMobile Enterprise Program VMobile Enterprise Program BlackBerryVoIP Solution Table of Contents VMobile: Who we are Why mobile VoIP? At a glance VMobile: BB App Overview VMobile: BB App Features VMobile: Compatibility VMobile: How

More information

De-duplication The Complexity in the Unique ID context

De-duplication The Complexity in the Unique ID context De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance

More information

LEGISLATIVE BILL 348

LEGISLATIVE BILL 348 LEGISLATIVE BILL 348 Approved by the Governor May 13, Introduced by Krist, 10. A BILL FOR AN ACT relating to financial institutions; to amend section 8-101, Reissue Revised Statutes of Nebraska, and sections

More information

Applying for a Passport

Applying for a Passport Please do not forget to make an appointment! Payment with credit cards (Visa, MasterCard) is accepted. Cheques cannot be used to pay the Embassy's fees. Applying for a Passport Find information about 1.

More information

High Speed and Voice over I.P September 1, 2005

High Speed and Voice over I.P September 1, 2005 If your property is setup with high-speed Internet access, you can incur big savings on your outgoing calls by using Voice over I.P. services to replace your local telephone and/or long distance service.

More information

Veda: Fraud Focus Group Forum

Veda: Fraud Focus Group Forum Veda: Fraud Focus Group Forum Identity Crime Trends, Risks and Solutions Dr Russell G Smith Principal Criminologist Outline Identity crime concepts The scope of identity crime Identity crime taxonomies

More information

Convergence of Mobile Communications and Broadcasting: A long term perspective

Convergence of Mobile Communications and Broadcasting: A long term perspective Convergence of Mobile Communications and Broadcasting: A long term perspective J. Elsner, N. Grove, D. Burgkhardt, F. Jondral, A. Picot INFRADAY 2009, Berlin, 10.10.2009 Communications Engineering Lab

More information

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally

More information

Information for our international students who would like to start working in Germany. Interview with Holger Esen, bsu Bremen

Information for our international students who would like to start working in Germany. Interview with Holger Esen, bsu Bremen Information for our international students who would like to start working in Germany Interview with Holger Esen, bsu Bremen The bsu is unique on a nationwide scale: It is a joint institute of University

More information

White Label Mobile AG, Liechtenstein

White Label Mobile AG, Liechtenstein How it Works Activate your SIM card! Registration Together with your SIM card you have got the link for activation. Kindly enter this in order to register yourself as a user and to http://pilot-call.com/?q=en/activate

More information

BFC Product Evaluation and Selection Process DoD Biometrics Fusion Center. Executive Officer

BFC Product Evaluation and Selection Process DoD Biometrics Fusion Center. Executive Officer BFC Product Evaluation and Selection Process DoD Biometrics Fusion Center Executive Officer 1 Purpose of Briefing To present the selection and acquisition process for biometric devices at the BFC. 2 Briefing

More information

MOBILE PHONE POLICY. Policy. Effective: 1 July2015

MOBILE PHONE POLICY. Policy. Effective: 1 July2015 MOBILE PHONE POLICY Policy Effective: 1 July2015 To be reviewed: January 2018 To help the public service spend wisely TABLE OF CONTENTS Introduction...1 Scope of the Policy...1 Responsibility for Implementation

More information

We Must Comply with International Requirements! Introducing Biometric ID Cards in France

We Must Comply with International Requirements! Introducing Biometric ID Cards in France We Must Comply with International Requirements! Introducing Biometric ID Cards in France Meryem Marzouki CNRS - LIP6/PolyTIC / IRIS Meryem.Marzouki@iris.sgdg.org www.iris.sgdg.org Terrorizing Privacy?

More information

Use and Change of Names

Use and Change of Names Use and Change of Names 16 August 2016 Issued by International and Immigration Policy Group Home Office Contents Introduction... 3 Policy Rationale... 3 What is the requirement of the policy?... 3 What

More information

Protection of Freedoms Bill

Protection of Freedoms Bill EXPLANATORY NOTES Explanatory notes to the Bill, prepared by the Home Office, are published separately as Bill 146 EN. EUROPEAN CONVENTION ON HUMAN RIGHTS Secretary Theresa May has made the following statement

More information

Hitachi to Expand Finger Vein Authentication System Business on a Global Basis

Hitachi to Expand Finger Vein Authentication System Business on a Global Basis FOR IMMEDIATE RELEASE Hitachi to Expand Finger Vein Authentication System Business on a Global Basis Establishes Organizations to Promote Business in North America, Europe, China and Asia, Aspires for

More information

Citizen s perceptions on digital identity

Citizen s perceptions on digital identity Citizen s perceptions on digital identity Dr Elpida Prasopoulou & University of Essex Citizens perspectives on digital identity Why do we refuse ID-cards...but love our customer loyalty programs? Why are

More information