Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

News & Notes

November 1, 2005

LAPD Deploys Aerial Surveillance Camera

Riggs and Murtaugh can expect a little more help from their friends in the sky next time they’re busting crime in L.A. Cineflex LLC has announced that the Air Support Division of the Los Angeles Police Department has deployed its V14 HiDEF aerial imaging system for the unit’s airborne law enforcement missions. Designed to supply high-quality detailed imaging necessary to support all aspects of their homeland security missions, the camera is able to conduct surveillance missions from much higher altitudes and greater standoff distances than previously possible.

The system can be equipped with an encrypted, digital microwave downlink system that allows ground personnel to view HD images in real-time. Delivered to either a mobile or fixed command center, the solution incorporates automated, GPS-guided antenna tracking to provide virtually uninterrupted live HD feeds with ranges over 100 miles from a helicopter and even further on fixed wing aircraft, UAVs and lighter than air ships that offer higher standoff altitudes.

OSE Talks Convergence at ASIS

The Open Security Exchange (OSE) continued to lead the security industry to new opportunities and market expansion by providing critical perspectives, recommendations, and solutions related to the convergence of physical security with IT at last September’s ASIS International Annual Conference, held in Orlando, Fla.

The conference prominently showcased the theme of convergence of physical security with IT, with more than 40 companies featuring solutions specially tailored for such a union. Meanwhile, members of the OSE and the OSE Convergence Council shared the insights and findings of the exhange throughout the weeklong event.

OSE member companies CoreStreet, GE Infrastructure, Fargo, HID and Software House/Tyco were among those featuring convergence solutions, best practices and strategic partners in their respective exhibit hall booths. Included was information about the federal government’s requirements for smart cards and single, smart IDs for physical and logical access. Also showcased was a variety of technologies to bridge the gap between physical security and logical access control and identity management.

“The OSE compliments the convergence activities of ASIS by translating our best practices into recommendations to the manufacturers,” said ASIS President-Elect Jeff Spivey.

Immediately following retired Gen. Colin Powell’s keynote address on Tuesday, Sept. 13, OSE board advisor, Steve Hunt, president of 4A Intl., presented a seminar entitled, “The Soft Side of Convergence is Hardest of All.” The seminar explained how to overcome inhibitors to success of projects requiring the cooperation of physical security with IT.

Perrysburg Schools Improve Parent Communication

Perrysburg Schools, which serves more than 4,600 students in Perrysburg, Ohio, has selected Minneapolis-based Honeywell’s Instant Alert for Schools to improve parent communication and emergency responsiveness. The Toledo-area district plans to integrate the system into its comprehensive safety plan, giving administrators a reliable and effective way to reach parents with a consistent, clear message.

The Web-based notification service will replace phone trees and enable the district to deliver both emergency and routine messages to parents and guardians within minutes via phone, cell phone, pager, e-mail and PDA. The system is used at more than 250 schools nationwide.

Rainbow on the Road in the Netherlands

Lenses from Rainbow CCTV are being installed by Tyco Integrated Systems (TIS) throughout the Dutch highway network, in an effort to help use special emergency travel lanes to relieve traffic congestion during peak hours. The 10- to100-mm motorized zoom units are being mounted on purpose-built poles, gantries and bridges at highway junctions in areas including Arnhem, Amsterdam, Utrecht, Rotterdam and The Hague.

The lenses are part of pan & tilt assemblies and operate from IP67 housings created by TIS. The units are being used with Bosch LTC0620 cameras while the telemetry controller is Tyco’s own bi-directional TIB interface board.

The company’s client is Rijkswaterstaat, a Dutch national authority with wide ranging responsibilities for infrastructure and civil engineering.

“In common with many highway networks the system in the Netherlands is overcrowded and the highway authority has decided to use the emergency lane as an additional driving lane during rush hours,” said Anton Depenbrock, a project manager with TIS. “The Rainbow lenses are part of comprehensive installations which are used to observe the status of emergency lanes.”

Beantown Cops Honored for Work with Hotel Chain

Two veteran Boston Police detectives were honored at an awards ceremony held Sept. 20, at Boston’s historic Langham Hotel. The International Lodging Safety and Security Association (ILSSA), based in the city, recognized Detective William Dickinson and Detective Margaret Murphy of the Boston Police Department’s Intelligence Unit.

Detectives Dickinson and Murphy were praised for working closely with each of the security directors at the numerous hotels in Boston, and diligently strengthening the public-private partnership between the local police and lodging industry.

“Boston is one of a handful of cities in the United States that can boast a strong working relationship between its hotels and its police department,” said Michael J. Soper, who heads up ILSSA Intel, the association's intelligence-sharing net.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • News & Notes: Business News

    See More
  • News & Notes

    See More
  • News & Notes

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing