Zimbabwe's police nail criminal syndicate with facial recognition

August 2024 Editor's Choice, Access Control & Identity Management, News & Events, AI & Data Analytics

NEC XON has shared that its NeoFace Watch facial recognition system was successfully used by the Zimbabwe Republic Police (ZRP) to identify and apprehend a Chinese syndicate attempting to enter the country using fraudulent travel documents.

The operation began when the ZRP received intelligence regarding Chinese nationals attempting to enter Zimbabwe using counterfeit travel documents. Leveraging NEC's NeoFace Watch system, ZRP's facial recognition team identified Lin Xinwei from a Qatar Airways manifesto. The Chinese national has been under surveillance since July 2023, when she attempted to board a flight to Qatar using a fake Japanese passport. Despite her attempts to evade detection, NeoFace Watch enabled law enforcement to verify her identity, and identify her documents as fraudulent.

Further collaboration between the ZRP, Qatar Airways, and the United Kingdom and Northern Ireland passport office authorities revealed that Lin Xinwei and four accomplices possessed fake Chinese passports and United Kingdom residence permits. Meticulous analysis based on intelligence provided by NeoFace Watch revealed sufficient evidence of criminal activities to warrant their arrest and charges under Zimbabwe’s Immigration Act. The successful apprehension of the syndicate highlights the importance of international collaboration in addressing transnational crime.

An NEC XON spokesperson noted, "The case exemplifies the groundbreaking capabilities of facial recognition technology in combating transnational crime. NeoFace Watch empowers law enforcement agencies to identify and apprehend suspects swiftly and accurately by seamlessly integrating with existing government systems and databases."

Statistics on the prevalence of fake passports globally underscore the significance of initiatives like NeoFace Watch in safeguarding national security. Passports comprise nearly 45% of all counterfeit documents – an increase of 6% on the 2021 figure. The potential risks posed by illegal entry, terrorism, human trafficking, and financial crimes necessitate proactive measures to combat such threats.

"The collaboration between NEC XON and the Zimbabwe Republic Police highlights the transformative impact of advanced facial recognition technology in law enforcement efforts. The successful apprehension of the syndicate underscores the effectiveness of the NeoFace Watch system in enhancing security and protecting national borders."

Real-time recognition

Facial Recognition systems can seamlessly interface with various government systems, including Immigration Visa applications, Civilian and Criminal ABIS, and Custom Management systems. NeoFace Watch gives law enforcement officials real-time access to CCTV footage at international airports and border posts, enabling swift identification of known perpetrators as passengers disembark from aeroplanes and proceed to immigration control areas.

At immigration counters, webcam and passport scanners facilitate rapid verification, matching the individual's passport photo with a live image within seconds. The live picture undergoes verification against multiple databases, including the immigration visa application database, ensuring the authenticity of both passport and visa application. Powered by NEC's unique algorithm, searches against a 12-million-person database take less than three seconds, with 99.8% accuracy. This solution offers unparalleled speed and precision in verifying individuals' identities, compared to traditional visual identification methods.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...
Credential theft surges in South Africa
NEC XON Information Security
NEC XON issues a critical cybersecurity warning about the dual threat of massive credential theft and AI-powered cyberattacks sweeping across the region, with an increasing number of incidents and evolving threat tactics.

Read more...
The global generative AI market surpassed $130 billion in 2024
News & Events AI & Data Analytics
According to a new research report from the IoT analyst firm, Berg Insight, the Generative AI (GenAI) market grew substantially in 2024, experiencing triple-digit growth rates in all three major segments: GenAI hardware, foundation models, and development platforms.

Read more...
Questing for the quantum AI advantage
Infrastructure AI & Data Analytics
The clock is ticking down to the realisation of quantum AI and the sought-after ‘quantum advantage’. In many boardrooms, however, quantum remains mysterious; full of promise, but not fully understood.

Read more...
South African fire standards in a nutshell
Fire & Safety Editor's Choice Training & Education
The importance of compliant fire detection systems and proper fire protection cannot be overstated, especially for businesses. Statistics reveal that 44% of businesses fail to reopen after a fire.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.