Ask The Expert

This month's expert explains the uses of GPS technology in law enforcement and private enterprise

A salesman counts on the unit mounted on his car's dashboard to help him get from one sales call to the next. Out in the wilderness, a lost camper pulls a handheld unit from his backpack to help guide him back to the hiking trail. When her 16-year-old son is late coming home, a worried mother goes to a Web site on her computer to find out where her son and family car are at that moment.

Each of these people is relying on Global Positioning System (GPS) technology. More than two dozen, earth-orbiting GPS satellites broadcast radio signals to GPS receivers to pinpoint the location of a person, vehicle or other object virtually anywhere on the globe day or night. The technology was first used in the 1970s by the military. It became commercially available in the 1990s. In addition to becoming more affordable, the technology has become much more accurate, now capable of plotting the location of a receiver within one centimeter.

ISSUE: With major reductions in both the size of the equipment and the price, what are the uses in security and law enforcement that GPS technology facilitates?

SOLUTION: In Wisconsin, a new law requires lifetime GPS tracking for some child sex offenders. Offenders who assault a child under 12, threaten force or use violence while molesting a child will be affected. A state fiscal analyst estimates that monitoring would cost about $1.2 million for 285 offenders in the first year.

In California, parole officers are using handheld GPS units to see that sex offenders are not living or working within a 1/2 mile of a K-12 school, as prescribed by law. Previously, the officers would drive the streets and measure the distances between schools and a sex offender's home and place of employment.

Security directors for city and school district transportation systems now equip each bus with GPS technology to make it easy to locate a vehicle in an emergency situation. GPS also serves as a valuable management tool by reporting on drivers who take their buses outside of their defined routes or speed.

Businesses across the country are turning to GPS to help protect and recover valuable portable assets. Assets, such as vehicles, heavy equipment, marine assets and cargo, are routinely outfitted with GPS hardware so that the equipment can be easily tracked via an Internet-based service.

ISSUE: You mentioned cargo as an asset that's being equipped with GPS hardware. How is tracking technology playing a larger role in cargo security?

SOLUTION: Once loaded and sealed, cargo containers are equipped with GPS hardware. Then as the containers move across the ocean on a container ship, each one can be monitored to see that they are not moved. When the containers reach the destination port, they can still be tracked as they make their way to their final stop via rail or truck.

By placing the GPS units within the cargo, it makes it more difficult to locate and disable the equipment. Should there be an incident -- a terrorist attack or the theft of a truck -- the cargo owners and/or law enforcement officials have a much better chance of quickly locating the vehicle and taking appropriate actions.

From a systems integrator's point of view, GPS shows the most potential as a management tool. By adding GPS equipment to company vehicles, an integrator can quickly locate his fleet. That way, when a service call is recorded, the closest technician can be dispatched to reduce response times.

Also, it helps end the practice of some technicians to use company vehicles for personal errands. That can cut down on fuel costs and positively affect the bottom line.

This month's question from a reader asks:

ISSUE: We are adding three smaller buildings on the perimeter of a 10-acre, campus-like facility. I want to make sure we have appropriate access control in place, as these facilities will store valuable equipment. The site's topography makes running cable expensive. Would a wireless access control system be a good choice? What are the downsides of such a system, and what are its distance limitations?

SOLUTION: There are basically three types of technology available for your consideration in implementing access control to detached buildings in a campus environment. The assumption is made that you will not have network connectivity to the buildings being discussed.

The first is the one you mention -- wireless access control. This technology will interface with most leading access control manufacturer panels, which will allow you to continue using one system. It communicates from door to panel using 900 MHz spread spectrum technology. Typical, in-building wireless distances are about 200 feet, but with changes in antennas, up to 4,000 feet can be obtained outdoors -- line of site. This technology has proven very reliable.

A second choice would be a managed, hosted access control system that uses the cellular wireless network for communication. The system can be operated, administered and managed via the Web from any computer or device connected to the Internet. Coverage is via multiple national carriers. This technology has been in place for the last four or five years, and also has been very reliable wherever cellular coverage is available.

The third choice would be a new approach to remote building access control from CoreStreet. The CoreStreet answer is to use the access credentials as the "network." Instead of using network cables to carry messages back to the computer, CoreStreet uses the capabilities of smart credentials (such as smart cards or RFID fobs) to carry access history from standalone access points to online access points that do connect to the computer. Online access points are located strategically throughout a facility, so that communication is accomplished by the normal traffic patterns of individuals. This is very exciting technology that is making its way into our industry.

This article originally appeared in the September 2006 issue of Security Products, pg. 146.

Featured

  • Report Shows Cybercriminals Continue Pivot to Stealthier Tactics

    IBM recently released the 2025 X-Force Threat Intelligence Index highlighting that cybercriminals continued to pivot to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined. IBM X-Force observed an 84% increase in emails delivering infostealers in 2024 compared to the prior year, a method threat actors relied heavily on to scale identity attacks. Read Now

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.