Ask The Expert

This month's expert explains the uses of GPS technology in law enforcement and private enterprise

A salesman counts on the unit mounted on his car's dashboard to help him get from one sales call to the next. Out in the wilderness, a lost camper pulls a handheld unit from his backpack to help guide him back to the hiking trail. When her 16-year-old son is late coming home, a worried mother goes to a Web site on her computer to find out where her son and family car are at that moment.

Each of these people is relying on Global Positioning System (GPS) technology. More than two dozen, earth-orbiting GPS satellites broadcast radio signals to GPS receivers to pinpoint the location of a person, vehicle or other object virtually anywhere on the globe day or night. The technology was first used in the 1970s by the military. It became commercially available in the 1990s. In addition to becoming more affordable, the technology has become much more accurate, now capable of plotting the location of a receiver within one centimeter.

ISSUE: With major reductions in both the size of the equipment and the price, what are the uses in security and law enforcement that GPS technology facilitates?

SOLUTION: In Wisconsin, a new law requires lifetime GPS tracking for some child sex offenders. Offenders who assault a child under 12, threaten force or use violence while molesting a child will be affected. A state fiscal analyst estimates that monitoring would cost about $1.2 million for 285 offenders in the first year.

In California, parole officers are using handheld GPS units to see that sex offenders are not living or working within a 1/2 mile of a K-12 school, as prescribed by law. Previously, the officers would drive the streets and measure the distances between schools and a sex offender's home and place of employment.

Security directors for city and school district transportation systems now equip each bus with GPS technology to make it easy to locate a vehicle in an emergency situation. GPS also serves as a valuable management tool by reporting on drivers who take their buses outside of their defined routes or speed.

Businesses across the country are turning to GPS to help protect and recover valuable portable assets. Assets, such as vehicles, heavy equipment, marine assets and cargo, are routinely outfitted with GPS hardware so that the equipment can be easily tracked via an Internet-based service.

ISSUE: You mentioned cargo as an asset that's being equipped with GPS hardware. How is tracking technology playing a larger role in cargo security?

SOLUTION: Once loaded and sealed, cargo containers are equipped with GPS hardware. Then as the containers move across the ocean on a container ship, each one can be monitored to see that they are not moved. When the containers reach the destination port, they can still be tracked as they make their way to their final stop via rail or truck.

By placing the GPS units within the cargo, it makes it more difficult to locate and disable the equipment. Should there be an incident -- a terrorist attack or the theft of a truck -- the cargo owners and/or law enforcement officials have a much better chance of quickly locating the vehicle and taking appropriate actions.

From a systems integrator's point of view, GPS shows the most potential as a management tool. By adding GPS equipment to company vehicles, an integrator can quickly locate his fleet. That way, when a service call is recorded, the closest technician can be dispatched to reduce response times.

Also, it helps end the practice of some technicians to use company vehicles for personal errands. That can cut down on fuel costs and positively affect the bottom line.

This month's question from a reader asks:

ISSUE: We are adding three smaller buildings on the perimeter of a 10-acre, campus-like facility. I want to make sure we have appropriate access control in place, as these facilities will store valuable equipment. The site's topography makes running cable expensive. Would a wireless access control system be a good choice? What are the downsides of such a system, and what are its distance limitations?

SOLUTION: There are basically three types of technology available for your consideration in implementing access control to detached buildings in a campus environment. The assumption is made that you will not have network connectivity to the buildings being discussed.

The first is the one you mention -- wireless access control. This technology will interface with most leading access control manufacturer panels, which will allow you to continue using one system. It communicates from door to panel using 900 MHz spread spectrum technology. Typical, in-building wireless distances are about 200 feet, but with changes in antennas, up to 4,000 feet can be obtained outdoors -- line of site. This technology has proven very reliable.

A second choice would be a managed, hosted access control system that uses the cellular wireless network for communication. The system can be operated, administered and managed via the Web from any computer or device connected to the Internet. Coverage is via multiple national carriers. This technology has been in place for the last four or five years, and also has been very reliable wherever cellular coverage is available.

The third choice would be a new approach to remote building access control from CoreStreet. The CoreStreet answer is to use the access credentials as the "network." Instead of using network cables to carry messages back to the computer, CoreStreet uses the capabilities of smart credentials (such as smart cards or RFID fobs) to carry access history from standalone access points to online access points that do connect to the computer. Online access points are located strategically throughout a facility, so that communication is accomplished by the normal traffic patterns of individuals. This is very exciting technology that is making its way into our industry.

This article originally appeared in the September 2006 issue of Security Products, pg. 146.

Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.