Deadly Response - Early detection and remote response might have de-escalated police incident at Texas car dealership

Deadly Response

Early detection and remote response might have de-escalated police incident at Texas car dealership

Recently, a police officer shot and killed a man who smashed his car into the Classic Buick GMC auto dealership in Arlington, Texas.

Car dealerships present a complex security challenge because they stock high-end models for the public to see, placing high-value assets out in the open where theft and damage can occur. For security professionals, one thing is clear from this tragedy— security cameras and monitoring might detect, but can’t prevent a crime from taking place.

Auto dealership owners must strike the right balance between serving customers and operational costs associated with protecting their assets, property and business. On-site security guards may seem like an effective option, but the added costs of paying salaries, benefits and providing the necessary equipment to effectively respond can add up quickly. Furthermore, human error, constant monitoring and personnel risk add to the cost of this approach.

In the case of the Arlington dealership, they relied on surveillance cameras monitored remotely by a security company. It appears the trigger for the security monitoring was not at the perimeter, so when the suspect drove his car through the showroom glass window, no doubt setting off motion detectors, it was too late. Significant damage and a crime had already occurred—with a tragic outcome.

Car dealerships need a solution for perimeter protection to provide early and reliable detection at the edge of a property with innovative intrusion detection technology. Using few security cameras and advanced video content analytics (VCA) running on a Remotely Managed Multi-service Gateway (RMG) will accurately detect and alarm for perimeter intrusion threats with great reliability to allow for preventative action. This type of detection solution is a true electronic first responder; with audio talk-down from a remote location many threats can be eliminated before they escalate. In extreme circumstances, like that at the car dealership, these solutions can also assist police and first responders with real-time visual situational intelligence.

Protecting car dealerships is complex as the system has to be immune to false alarms associated with swaying vegetation, flags, clouds, animals, insects and more. Car dealerships should look for intrusion solutions that deliver the highest rate of detection combined with the lowest rate of false alarms.

In addition to a perimeter protection, car dealerships should consider video analytics to detect unauthorized loitering in a protected zone. In the case of Arlington, prior to the intrusion alarm, the security monitoring company could have received a loitering alarm as the suspect approached or entered certain areas of the car lot and building.

Early detection isn’t enough. Once the intruder has been detected by intrusion detection technology, reliable transmission of the alarm and visual verification is imperative to establish the threat, evaluate the situation and deliver the appropriate response.

The first responders in this incident were dispatched to a developing situation where they relied on the information verbally given to them by the security company. They didn’t know if the suspect was armed or had accomplices, and did not have any remote visual verification capability that could assist with an effective response. A tragic loss of life was the result.

A leading security company and central monitoring station that protects many car dealerships throughout the United States uses a system that provides early detection, visual verification and remote response. This type of system enables operators to act as soon as a potential threat is detected. Each operator can support multiple dealerships, because they don’t need to constantly view surveillance cameras waiting for a threat event to occur.

They use alarms that direct them to the appropriate site and camera viewing the scene. The operators can visually verify the threat and remotely warn off the intruder with audio talk-back. Potential intruders can be notified in real- time that they are being watched and that the police have been informed and are en route. In the majority of cases, the intruders leave the premises upon hearing the audio warning—preventing the crime from ever taking place. In the case of the car dealership tragedy, the security company could have de-escalated the threat and avoided the altercation between the suspect and police.

Another aspect to consider is the benefit of remote monitoring and situational awareness. Car dealerships should look for providers that have applications for smartphones and tablets to monitor and manage a site from anywhere in the world. These tools could have been additional “eyes” into the situation developing at the car dealership, providing first responders better situational awareness prior to taking action.

A perimeter protection prevention solution, with loitering detection and smartphone applications, has proven to be more effective than standard CCTV system, even with on-site security guards. It is an innovative, reliable and cost-effective solution for protecting car dealerships and preventing theft and vandalism. This prevention solution delivers the highest detection capabilities with the lowest false alarm rate while offering the lowest cost per monitored channel, and 24/7 reliable remote monitoring.

This article originally appeared in the December 2015 issue of Security Today.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.