Out of sheer necessity, sports security has been evolving rapidly since the Boston Marathon bombing, and most sports security professionals refer to that particular event as a turning point. Metal detectors have become commonplace in major league stadiums, new security policies have been formed, and even tailgating was banned at this year’s Super Bowl.
Researchers at the University of North Carolina – Wilmington are helping law enforcement groups find real-world uses for facial recognition technology. One specific example is “MIDO” or “Multiple Image Dataset Organizer,” which researchers believe could have helped law enforcement compile that mass amount of information and images that flooded in after the Boston Marathon bombings. After the data is compiled, facial recognition technology could takes effect.
The lessons learned following the Boston Marathon bombings were many, but one lesson that was learned rather quickly was that Twitter was going to become the go-to platform for gathering timely and accurate information from city, state and federal officials regarding the rapidly unfolding events of that week.
On April 15, 2013, two pressure cooker bombs exploded at the finish line of the Boston Marathon, killing three and injuring more than 260 others.
February 1, 2014
On April 15, 2013, two pressure cooker bombs exploded at the finish line of the Boston Marathon, killing three and injuring more than 260 others. The attack, and the subsequent manhunt for the bombers, brought to light several issues inherent to event planning: a temporary location, a temporary staff, and the need to protect masses of spectators and participants.
Facial biometric recognition works well on clear images with a good view of the face, but much additional data is often discarded due to the fact that the face, or the full face, is not clearly visible. The discarded data contains “soft” biometrics, such as height, gait and other features, such as ears.
Seventy-five percent of Americans agreed with the statement “occasional acts of terrorism in the U.S. will be part of life in the future,” according to an April survey conducted after the Boston Marathon bombing.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!