highway video cameras

Illinois Law Creates Camera Program To Investigate Expressway Shootings in Chicago

Following a rise in expressway violence, law enforcement will add about 35 cameras to look into shootings that are notoriously difficult to solve.

A new Illinois law named in honor of a woman fatally shot on an expressway will give Chicago-area law enforcement officers the authority to create a camera program to investigate expressway shootings.

Illinois Gov. J.B. Pritzker signed the Tamara Clayton Expressway Camera Act into law on July 12 after it received unanimous support in both chambers of the state legislature. Now, the state police force, department of transportation and toll highway authority will come together to work out the details of the program, The Chicago Tribune reported.

Although the Illinois state police have tried to combat expressway violence in recent years, they have made only 12 arrests in connection with 179 reported expressway shootings in the Chicago area, according to the Tribune.

Thaddeus Jones, a state representative who led the movement to pass the law, said in April that the program would cover 35 cameras in Cook County for a cost of about $500,000 and would only be used to investigate expressway shootings and not “petty offenses."

The transportation department already operates around 275 cameras in the area for “traffic management purposes,” spokesman Guy Tridgell told the newspaper. But those cameras do not record footage due to funding constraints and the system’s capabilities, instead sending a live feed to the department’s communications center for traffic monitoring.

Gun violence activist Andrew Holmes told the Tribune that he and other proponents of the law want future expressway cameras to have the capability of recording high-definition footage and identify license plates.

“We have to update the quality and the technology to help [police] and save lives and let [offenders] know that your Big Brother is always watching,” Holmes said.

State senator Jacqueline Collins of Chicago, who sponsored the bill, said more cameras on the expressway will help combat shootings.

“I think the culprits believe there’s no way to trace who is committing the crime and they see [expressway shootings] as a way of avoiding the penalties of the gun violence,” Collins told the paper. “We have to have ears and eyes throughout the city, the state, in reference to those individuals…who want to perpetuate violence on our citizens.”

Clayton’s sister, Alma Hill, said she was pleased that the legislation was approved and signed into law so quickly, according to the Tribune. Clayton’s killing, which took place on Feb. 4 while she was driving to work, remains unsolved.

“I just want to identify the people who are wreaking havoc on the expressways, and I want them to understand... that [police] see them and they are going to have some accountability,” Hill said.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3