Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Wanted: More Effective Tech

By Bill Zalud
September 8, 2003
A unique application at Ronald Reagan National Airport serving Washington, D.C., that blends traditional door access controls and unique three-dimensional security video with a low-profile mantrap shows how government and business are seeking more effective technology. In this instance, the system eliminates tailgating and piggybacking while not noticeably affecting throughput of workers.

Billions of dollars from public and private sources are now going into the development of more effective security equipment.

For example, the Department of Homeland Security’s 2003 budget is about $37.5 billion, while the 2004 budget comes at close to $36.2 billion.

On the private investment side, former New York City Mayor Rudolph Giuliani, who founded the Giuliani Partners consulting firm, just partnered with Bear Stearns Merchant Banking to launch a $300 million fund to invest in security businesses. In a similar move, Maryland’s Chesapeake Innovation Center, a business incubator in Annapolis, says it will focus exclusively on nurturing companies that specialize in homeland security.

All those dollars and business assistance are chasing developers who take the basic building blocks of security to solve specific protection problems and more effective systems.

Upgraded Access Approach

A case in point is the upgraded technology at Reagan National, where, in certain areas, a tailgate detection alarm recording system (T-DAR) from Newton Security Inc. of Seattle, fights the two most common forms of unauthorized access in restricted areas, tailgating and piggybacking.

The tailgating/piggybacking solution installed at Reagan National utilizes vestibules, a kind of low-tech mantrap, equipped with a T-DAR system. These vestibules are constructed with glass walls and a second door assembly around an existing access controlled door.

The T-DAR system acts as a traffic cop, ensuring that both doors are not opened at the same time and that only one authorized person is in the vestibule when access is granted. Once the access control reader, located on the inside of the vestibule, has been activated, the T-DAR system locks the public-side glass door electronically.

In less than one second, the system analyzes the vestibule for the presence of only one person, making the transaction transparent to the end user and having virtually no impact on throughput.

The system is able to interface with virtually any access control system and allows for ease of installation in most applications. Configuration and setup are performed using an intuitive user interface that also provides statistical data collection capability for transactions and events. Some of the variations of product currently available are occupancy counting, tailgate detection and tailgate prevention. Additionally, this configuration meets the local and national requirements for life safety and emergency egress.

“This application is an example of the way modern high-technology solutions can dramatically improve homeland security,” says John Bramblet, president and CEO of Newton Security. “T-DAR not only provides alarm conditions when an unauthorized person attempts to enter a controlled area, but also captures valuable visual documentation that can be accessed and acted upon immediately. It can also detect a second person in the area of the protected doorway and it prevents even authorized personnel from opening a controlled access doorway if there is another person in the protected area.”

The machine-vision technology combines stereo cameras with software to enable a computer to “see” its surroundings and then act appropriately. The system is available through the firm’s integration partners: Honeywell; Johnson Controls Inc.; Siemens Building Technologies Inc.; and ADT Security Services.

In another example of technology redesigned for more effectiveness, the Chicago Police Department is deploying the Videolarm, Decatur, Ga., DeputyDome system as part of “Operation Disruption,” a new crime deterrent initiative in the city’s most crime-prone communities.

The backbone of this new program is Videolarm’s bullet-resistant DeputyDome, which will be mounted on light poles and other structures throughout the city. Officers will be able to manipulate surveillance equipment from remote locations through the use of a portable wireless terminal equipped with a monitor and Videolarm’s VLC485 controller. With the controller, the user can pan 360 degrees and zoom in on specific types of public criminal activity.

Bullet-resistance

“We selected Videolarm’s DeputyDome for the project because of its unique bullet-resistant feature and for the ease of integration with the wireless transmission and other components of the project,” says Bruce Montgomery, president of Disclosure Video Systems, the integrator on the project. “The surveillance system is easy to integrate into the department’s overall solution and allowed us a great deal of flexibility along the way.”

The DeputyDome is integrated into a portable 16 x 16 x 24 “pod”which is trademarked with the Chicago police checkerboard insignia and features blue flashing lights on top of the housing to increase the unit’s visibility.

“The most unique aspect of this entire installation is the level of customization that was achieved with this system,” comments Mike Worden, national accounts manager for Videolarm. The installation and concept involved a joint effort between Videolarm, ADI Systems Group, Disclosure Video Systems, RMS and the Chicago Police Department. “Videolarm worked closely with the entire team to redesign the DeputyDome to fit the exact needs and specifications for the installation.”

The DeputyDome is used in numerous applications around the world, including other urban installations, such as the Lander Street Apartments complex in Newburgh, New York, where the DeputyDome was installed to help the Newburgh police provide around-the-clock surveillance in a low-income neighborhood, and the Murfreesboro Housing Authority in Tennessee.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • blockchain-enews

    Why the global cannabis industry needs blockchain for more effective quality control

    See More
  • New Newswire Feature Image 3/8/2012

    Study: Chicago Police Cameras More Effective When Clustered

    See More
  • Generic Image for ID Management

    Study Says Conversations Are More Effective for Airport Security

    See More

Related Products

See More Products
  • effective.jpg

    Effective Physical Security, 5th Edition

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!