Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Keep in ‘Secure’ Touch

November 1, 2005
Security directors and their officers can use next generation cellular phone equipment with global positioning to better protect special events. Here the phone is specially mounted for hands-free viewing by a security officer in a vehicle. Right, global positioning systems now are integrating into cellular telephones. The communications devices can display street information and provide location during the protection assignment at corporate special events.
High-profile events – such as the Presidential Inauguration, political conventions, the G-8 Summit, the State of the Union address or even the Super Bowl – require coordination between a number of government agencies, law enforcement and other groups to ensure the safety of all participants. Such a requirement is just as important with the lower-profile special events covered by security departments serving corporate, commercial and government agencies.

The key to maintaining a high level of security is fail-safe interoperable communications primarily comprised of voice services, such as wireless phones that are equipped with walkie-talkie capabilities.

But today’s mobile communications devices – whether wireless phones or BlackBerry handhelds – could provide these high-security, multi-agency operations with much more than just interoperable voice services. They are able to integrate GPS technology and support data applications that could give commanders better control over their resources and allow them to make well-informed deployment decisions. Advanced data solutions also can assist with tracking the location of individuals or specific subsets of individuals at a particular agency, authenticating credentials for admittance to events or monitoring shift changes, managing equipment inventory, and accessing numerous databases instantaneously from the field.

Communicating among separate groups

Consider the multi-agency coordination required during an event like the Presidential Inauguration. Representatives from a variety of agencies – federal, state, and local – worked from a central, multi-agency communications center (MACC) in the suburbs of Washington, D.C. About 100 commanders from the various agencies gathered at the center, where they coordinated the efforts of their staff and communicated with each other to maintain security during the ceremony and along the parade route. To get information from the event site in D.C., commanders in the MACC relied on field agents to contact them over the phone or via walkie-talkies.

All of that incoming information could be very difficult to manage, since a single agency may have hundreds of agents in the field. Plus, from the command center, it is often difficult to know exactly where specific individuals are located at any given time, or to know where specific resources – such as fire trucks or ambulances – are located if a quick response is needed.

These concerns could be mitigated if officers in the field were using wireless phones or BlackBerry handhelds that are capable of providing GPS location and advanced data services. For example, the wireless devices could be tied to mapping software, allowing commanders to consult a giant screen in the MACC that visually identifies the location of each agency’s personnel by color-coded dots. Red dots could indicate fire personnel; blue dots police officers, and so on. Then, if there was an incident in which a certain response team was needed, commanders could instantly identify who was closest in order to minimize response times.

GPS also could be used to locate an individual from one of the agencies. Say there’s an agent who is accompanying a visiting dignitary, but because of unique circumstances, is unable to answer his radio or wireless phone. Using GPS signals from that agent’s phone and the mapping software, his position can be located and another agent – using his GPS phone to mark the agent’s coordinates – can be deployed to find him in the crowd.

Look for wireless communications devices that are capable of providing GPS location and advanced data services. Equipped with these tools, security can mitigate interoperability problems when special events call for personnel from diverse security and law enforcement groups.

Protecting the perimeter

Another way GPS could be used is to assist in ensuring the security of a perimeter or entrance where access is restricted. For example, an officer responsible for maintaining the security of an area would carry a GPS-enabled cell phone or BlackBerry handheld. The GPS would provide a history of the officer’s location, providing his or her commander with an assurance that the area of responsibility is appropriately secured.

GPS also could be a valuable, timesaving tool in the event of a tragic incident where agencies must coordinate to collect evidence over a large geographical area. Take for example, the 2003 disaster in which the Space Shuttle Columbia disintegrated prior to landing and debris was scattered across Texas and Louisiana. In that case, the FBI, Federal Emergency Management Agency, the Federal Aviation Administration, military forces from Fort Hood, and state and local police authorities worked together to recover the thousands of pieces of the shuttle wreckage.

If every individual involved in the recovery effort had a wireless phone or BlackBerry equipped with GPS, the latitudinal and longitudinal coordinates of each piece of debris discovered could have been marked instantly and fed into a database that investigators then would use to determine the cause of the accident.

Wireless phones and BlackBerry handhelds also have other data capabilities that have been widely accepted in the commercial world, but could be easily deployed for public safety purposes.

For instance, barcode readers and Bluetooth-enabled barcode scanners that attach to wireless phones and Blackberry handhelds respectively could give law enforcement agencies scanning capabilities to monitor entry to secure areas. For example, at the G-8 Summit at Sea Island, Ga., only certain individuals were allowed onto the island. The agencies in charge of security could have employed a barcode reader to scan the credentials of those entering the island. And, once the credentials were scanned, the phone could receive a photo from a database to confirm that the person in possession of that badge has the right to enter. The database also could retain the information that the individual already has entered, in case the person’s location or entry status comes into question.

Role of barcodes

Barcode scanning also could be used to help commanders monitor shifts. In this scenario, all officers would be required to scan their credentials at the start of their shift, and then scan again if they take a break or leave for the day. This information would be captured in a database that would allow commanders to know how many officers are on duty at a given time and adjust schedules accordingly if necessary.

Agencies could use barcode scanning to track equipment, such as fleet vehicles necessary for the event. For a large, one-time event, agencies need to bring many pieces of equipment with them. Barcode scanners could be used to record when the equipment left the warehouse, when it was loaded on and off a truck or airplane, and when it was logged on the event site.

Java-enabled wireless phones and BlackBerry handhelds could be utilized for access to internal address books and directories for convenient communications. Moreover, preset menus could be created, so if an individual officer on patrol needed a break or someone to deliver foul-weather gear, he could send that message with the push of a button, rather than tying up the radio voice channels.

The devices could also enable officers to wirelessly access investigative files or do database queries in the National Crime Information Center and other key databases from the field. And, because the devices have excellent graphics capabilities, agencies could retrieve photos of suspected criminals or receive this information as part of an all points bulletin in what would amount to an electronic “Wanted” poster.

While these enhanced data services that incorporate GPS and mapping software, or wireless barcode readers, may seem like they would be too complicated, expensive or time-consuming to deploy for one-time events, that is not the case.

Some wireless providers have been offering phones with GPS capabilities for several years, and as the industry has moved toward compliance with E911 regulations, all wireless phones manufactured since September 2004 incorporate GPS. Even BlackBerry handhelds, which are typically used for accessing e-mail, are now equipped with GPS.

With the addition of temporary cell sites and mobile satellite cellular trucks at these events, agencies can have redundant communications infrastructure and increase network capacity.

The combination of traditional voice and walkie-talkie functions with advanced data applications is critical.

Pictured: Babs Carryer of RemComm shows how radio can be used to transmit health status of a victim to ambulances, emergency operations centers and other medical professionals. There was a “Twisted Rail” disaster drill this past summer in Westmoreland County, Pa.

Sidebar: Emergency Talk Without Power

What happens at special events or during crisis situation when commercial power goes down? Pittsburgh-based RemComm knows how to handle such situations. A technology company specializing in radio-based emergency communications and data transfer, it recently used a newly developed system to aid Hurricane Katrina recovery and relief efforts. RemComm was contracted by Centropy, Inc., a not-for-profit corporation that provides emergency communications systems in the event of disasters. The system enables security and emergency personnel to send/receive time-sensitive data by combining simple radios with laptop computers and interfacing equipment.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • credit card security

    Only 1 in 4 global organizations keep cardholder payment data secure 

    See More
  • Secure to the Touch: Ease Access while Improving Security

    See More
  • marriott

    ICO fines Marriott International for failing to keep customers’ personal data secure

    See More

Related Products

See More Products
  • Physical-Layer-Security.gif

    Physical Layer Security in Wireless Communications

  • Hospitality-Security.gif

    Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing