Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

News & Notes

February 1, 2005
Vehicles equipped with sensors, security video and intelligence gathering gear in Operation Iraqi Freedom may prove a precursor of vehicle patrols in the U.S. private and public sectors.

Sensors, Cameras Add to Combat Vehicles

Advances in Operation Iraqi Freedom, especially specific to sensor, video and computer technologies built into armored vehicles, will soon trickle down to states-side military, law enforcement and private security patrols.

For example, Project Manager Soldier Weapons of Picatinny, N.J., is improving the U.S Army’s Common Remotely Operated Weapon Stations or CROWS. The system mounts on top of a HMMWV, enabling a gunner to perform missions from the safety of the inside of the armor-plated vehicle. CROWS was developed in conjunction with Recon Optical, Barrington, Ill. The system integrates the MK19 Grenade Machine Gun, M2 Machine Gun, M240B Medium Machine Gun and the M249 Squad Automatic Weapon. A soldier can view targets independent of gun elevation for MK19 super elevation and non-threatening surveillance mode. The vehicle’s sensor suite includes a daytime video camera, second-generation FLIR and laser rangefinder for day and night mission requirement.

“Soldiers have been providing valuable operational performance and systems feedback to the project office,” LTC Kevin P. Stoddard, product manager for Crew Served Weapons tells Security magazine. “In a recent route reconnaissance mission, MPs using CROWS went out ahead of the convoy to gather intelligence and gain a vantage point. After reconnaissance of the route, they moved to an over watch position. Situated on a hill, the MP team leveraged CROWS’ high-powered sensor suites to identify a terrorist preparing to attack the convoy and instantly acquired a ballistic solution to engage him.”

Networked in-line baggage screening is more effective and less costly.

Advanced Networking for Baggage Screening

L-3 Communications Security and Detection Systems, a subsidiary of Woburn, Mass.-based L-3 Communications, is deploying its networked explosives detection system for the eXaminer 3DXR 6000 at airports nationwide and internationally. Following the completion of a successful evaluation at Orange County California’s John Wayne Airport and further evaluation of a limited deployment by L-3 at Boston’s Logan International Airport, the U.S. Transportation Security Administration has funded the installation of the advanced networking capability at six major airports: Boston’s Logan International Airport, Pennsylvania’s Harrisburg International Airport, Las Vegas’ McCarran International Airport, Baltimore’s Washington International Airport, Southwest Florida’s International Airport and Tampa International Airport.

“Networking in-line baggage screening systems lowers operating costs by eliminating the need to have a dedicated operator for each eXaminer,” said Allen Barber, senior vice president and general manager of L-3 Security and Detection Systems. “With this, the TSA and airports can more efficiently allocate screener resources during peak and non-peak hours, and minimize the time it takes to search suspect bags.”

PowerKey’s Pick Up Trucks

International Electronics, Inc. of Canton, Mass., tells Security magazine that Iron Ore Company of Canada will use the PowerKey 2600 system to control and monitor access to Ford pick up trucks used at its iron ore mining site and processing plants in Labrador City, Newfoundland. The PowerKey 2600 provides entry-level vehicle management for mobile assets requiring individual PIN control such as material handling equipment, pickup trucks, golf cart fleets, people carriers and airport tarmac tugs.

Says Henry Hillier of the Iron Ore, “The technology will give us a remote audit trail analysis of who is driving our vehicles, providing an increased level of control over access and operation and, more importantly, to provide an additional level of protection for our people, assets, and resources.”

OSE Announces New Board Officers

Upon attracting many of the leading organizations in the security industry to join, the Piscataway, N.J.-based Open Security Exchange (OSE) announced new board members and newly elected officers. The cross-industry consortium is dedicated to delivering best practices guidelines in security management and vendor-neutral interoperability specifications for integrating physical and cyber security systems.

Last September, the exchange introduced changes to its working procedures that facilitated having organizations of any size join and play an active role in the definition of standards for the security industry. Due to the expansion of the size of the management board, the OSE also created officer positions to help with the daily management of the organization.

For 2005, the OSE Management Board includes:

Computer Associates

CoreStreet

Fargo Electronics

Gemplus

General Electric Infrastructure, Security

HID Corp.

Sony Electronics

Tyco Software House

General Members for 2005 additionally include Deister Electronics, Siemens Building Technologies and VistaScape Security Systems.

Officers elected are:

Gary Klinefelter, Fargo Electronics, Chair

Laurie Aaron, Tyco Software House, Vice-Chair

Eric Maurice, Computer Associates, Executive Director

James Clark, General Electric, Director of Marketing & Communications

David Ludin, Gemplus, Secretary

Steve Hunt of Forrester Research and Sandra Jones of Sandra Jones & Company have agreed to continue their roles as industry advisors. Their security industry knowledge has helped the OSE expand its membership and set its strategy.

“Any organization committed to developing interoperable solutions and helping customers meet ever-rising security challenges should join with us,” said Klinefelter.

Casino Fined for Security’s Roving Eyes

Caesar’s Atlantic City Hotel Casino was fined $80,000 late last year after New Jersey state gambling regulators learned that some of the casino’s security officers had been using surveillance equipment to record images of female guests and employees in compromised modesty.

The offenders reportedly “recorded footage of selected parts of the anatomy of several females,” authorities said in a statement.

Authorities were tipped off by a casino surveillance supervisor, as well as by grievances from two female employees allegedly fired for complaining about the use of security cameras.

Laptop Theft Puts 100,000 Names at Risk

Just months ago, Delta Blood Bank, Stockton, Calif., notified over 100,000 donors that a recent theft of a laptop computer from the blood bank could have put their identities at risk of being stolen. Taken from a blood drive in the nearby town of Tracy, the Compaq laptop, which contained the donors’ names, dates of birth, Social Security numbers and other key information, has since been recovered, but the company warned that names might still be in jeopardy. Forensics experts are currently – as of press time – working to determine if the database was accessed.

“The suggested precautions in the letter still stand,” said Arthur Morrison, marketing director for the blood bank. “Donors should still put a fraud check on their credit report, which they can do for free.”

The University of California at Los Angeles experienced a similar theft last June that put 145,000 blood donor names at risk. Wells Fargo had a information for thousands of student loan and mortgage customers stolen for such purposes last November. The state of California passed a law in 2003 requiring organizations to notify state residents if their personal information could be compromised.

A number of states have passed similar laws in recent years, and many security experts have encouraged companies that collect large databases of personal information, including blood banks and financial institutions, to employ physical and digital security devices.

Crews Must Pass ID Checks, Too

While commercial airline passengers already have their names checked against government watch lists since Sept. 11, a bill recently passed by Congress and signed by President Bush will also require the crew to pass similarly rigorous security checks.

Part of the groundbreaking legislation that overhauled the 15 federal spy and law enforcement agencies and created the cabinet position of Director of National Intelligence, the new law will mean hundreds of thousands of additional names will have to be checked against two government lists – one of suspected terrorists and another for those under suspicion for something else.

Under the USA Patriot Act, cruise and airline passengers, but not crews, are already checked within 15 minutes of the ship or plane’s departure. The law will go into effect in June.

Sen. Bill Nelson, D-Fla., who sponsored the cruise ship provision, said as many as 5,000 passengers and 1,500 crew members travel on each ship. “What you have is a floating city of thousands of people,” said Nelson. “You cannot be too cautious.”

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • News & Notes: Business News

    See More
  • News & Notes

    See More
  • News & Notes

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing