Over the Top

Technology detects and deters terrorists through preemptive search

GOVERNMENT and law enforcement agencies are developing tactics and techniques to prevent, protect against and respond to terrorist attacks on local and national levels.

One of the most noticeable tactics is the preemptive search. The preemptive search is intended to detect and deter terrorist attacks, as well as criminal acts involving illegal contraband, concealed weapons or other harmful agents.

Under elevated threat levels, the number and complexity of necessary searches has increased. Law enforcement and other security agencies have had to find new tools and develop new search techniques in order to keep pace with resource demands. Modern technology, in large part, has made it possible for law enforcement and security personnel to respond to new search and security sweep scenarios at entry points, on roads and rails, at airports and at many other locations.

In simpler times, the unaided eye of a security agent or officer was all that was needed to assess and deter threat. Many of the threats in vehicles are hidden from view and can only be indicated to the inspector by signs of vehicle tampering. In the past, low-tech tools, including rolling mirrors with flashlights, were employed to aide in a search. These devices allowed inspectors to see areas that are hard to access, such as underneath a vehicle. The problem with these tools is that reflected images from mirrors seldom have the proper lighting conditions, magnification factor or form factor required, which increases the probability of missing a subtle, suspicious visual detail.

Right for the Job
The search and sweep equipment now used by many security organizations sees better than the human eye and does other tasks that make the process more accurate, faster and safer.

New equipment, such as a portable video system, enables personnel to conduct a greater number of searches more thoroughly. Systems that feature a modular design are of maximum benefit and are described as tool sets. These typically contain an array of interchangeable video inspection components that can be configured into different search tools. Each search tool is optimized to perform a search task in a specific condition or environment. The Zistos WA-VSWD14 vehicle search system falls into that category. The system contains all of the necessary video tools to search a passenger or commercial vehicle in one transported case.

Typically, these systems consist of two main components. The first component is a body-worn video display monitor used by the inspector. The second component can be a specialty video camera, such as high-reaching telescoping pole camera, rolling under to look into void spaces in and around the vehicle. With hands free to operate the camera, the inspector monitors the image displayed on the screen. Non-video, optical devices such as fiberscopes can be included when gas tank inspections are required.

Each section of the vehicle presents a different type of inspection challenge. No single tool can serve every purpose, so some of these video systems are modular in design and can be transformed into several tools by configuring the components in different ways. This way, one portable kit adapts for many different inspection uses, similar to the way a vacuum cleaner may be altered with different types of hoses, rods and cleaning heads for different jobs.

The different attachments in the portable video systems allow the inspector to see into spaces that may be impractical or impossible to examine with the naked eye. New video technology makes cargo compartments, undercarriage, roof and every part of the truck easy to inspect for even the most subtle signs of vehicle tampering or concealment.

Step by Step
The vehicle search process may take place as part of a random selection—if a vehicle fits a particular profile, such as a tanker or rental truck traveling into a secure area; or if it arouses suspicion in some other way. It is unlikely that signs of criminal intent would be overt or easily observable at a glance. It is more probable that efforts will have been made to conceal evidence of unlawful or terrorist activities.

Searchers identify various zones or sections of a vehicle (vehicle top, cabin and cargo areas, and under-vehicle) and proceed to thoroughly search each for contraband, IEDs or signs of tampering.

The search of a suspect vehicle begins with a preliminary walk around the vehicle to look for any visible signs of threat beyond that which may have flagged attention in the first place. Next, a zone-by-zone detailed search is performed using a portable video system.

The inspector uses a self-illuminating camera mounted onto a pole to scan small spaces, such as the area around the engine and firewall. This same camera can be used to search the driver/passenger areas, underneath seats, behind the dashboard, the wheel wells, bumper voids and in any storage compartments.

To transform the video system into an under-vehicle inspection tool, the user simply changes the configuration of the unit. A self-illuminating camera is typically mounted to an under-vehicle inspection trolley on wheels. The trolley’s pole is linked to the video display unit. The system easily rolls underneath the vehicle’s undercarriage and provides a high-resolution image of hard-to-access areas in daytime or at night.

The inspector now can scan the entire vehicle underbody in search of abnormal items or signs of tampering. As before, proper illumination, image magnification and the ability to finely control the camera’s position really make visual image searching of critical areas much more effective than methods used in the past.

The next zone to be searched is the cargo area. Transported goods on commercial vehicles can be used as a shield to hide contraband, explosives or unauthorized/illegal passengers. The cargo area must be examined for anything suspicious. It’s not possible to inspect beyond the outermost layer of cargo without unloading the truck’s contents or crawling the load. By switching the trolley camera to a long telescoping pole camera, the inaccessible corners of the cargo area can be examined for anything suspicious.

Finally, a search of the vehicle top is required to complete the search. The tops of vehicles generally do not offer inconspicuous hiding places; however, height itself becomes an obstacle to inspection that perpetrators can use to their advantage. A thorough vehicle search includes the roof surface, where contraband, IEDs and even people can be concealed.

The versatility of this gear, which easily converts from one tool to another is key to its usefulness to personnel on site or out in the field. With this type of equipment, inspectors remain standing throughout the search and do not have to crawl under the vehicle. It also allows inspectors to keep an eye on the environment and take preemptive action in the event of an aggressive act by a driver or another vehicle veering into the inspection lane.

One other very important feature of the portable video system is that the image captured and displayed on the inspector’s chest-mounted display unit also can be shared with someone 10 feet away, 100 yards away or halfway around the world via the Internet.

Dollars Make Sense
Counterterrorism and security budgets have increased since 2001, but the demands for security have escalated at a faster rate. Financial considerations have driven the development and use of better equipment and more efficient techniques. The cost of even sophisticated high-performance portable video equipment is relatively low. When the cost-to-benefit ratio of adaptable, multi-use tools is analyzed, they prove their worth with increased number of searches that are more accurate, more efficient, safer and in compliance with homeland security objectives.

As criminals and terrorists continue to become more sophisticated, so too must the tools and methods used to detect and deter them. Cost-effective, portable video systems demonstrate how technology can help defend us in times of elevated threat levels by keeping us one step ahead.

Featured

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.