Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

News & Notes

June 1, 2005

Two- and Four-foot ID Advances

Legislation and technology blended earlier this spring to provide better identification for Americans and, ironically, their dogs.

Last month, the U.S. Senate in 100-0 vote approved the federal Real ID Act, which aims at standardizing and strengthening the security of state driver’s licenses. Previously, the U.S. House had voted approval. The Act, expected to be signed into law by President George Bush, may have a ripple effect on higher level security built into other types of identification cards and badges in the private sector.

In an unrelated move, vendors providing pet supplies started a push for a universal scanning device to read chips implanted in dogs, cats and other animals. Not surprisingly, the Real ID Act has garnered the most critical response.

There are two important aspects of Real ID. First, through state agencies, people requesting a driver’s license will one day have to provide several types of documentation while state agencies must verify the documents. Second, the Act will strongly encourage states to produce standardized, more tamper-resistant licenses that would include machine-readable, encoded data including a digital photo and probably a biometrics identifier.

Many states see Real ID as a mandate imposed by the federal government without accompanying funding.

The dog world is a gentler place.

For a number of years, owners have injected microchips in their household pets as well as high-ticket animals ranging from buffalo to race horses. The rice-sized device implanted in pets provides a permanent form of identification. According to a recent survey conducted by a U.S. distributor of microchips, nearly 90% of respondents were unaware that the United States is one of the only countries worldwide that does not have a universal scanner that can read all microchips. The U.S. push is now on for a universal scanner.

L.A. "Legend" Gets MESHed

A downtown Los Angeles heritage building called Pacific Electric Lofts, a legendary southern California high-rise, is installing a MESH access control and security system from Viscount Systems Inc., Burnaby, British Columbia. Dealer Certified Phone Solutions Sales Company will install access control for 300 apartment units. A main outside wall-mounted unit with vandal-resistant touch color screen will be installed as well as a built-in color camera to record photo ID of all inbound guests with time and date on a DVR recorder. A cable TV private channel interface to Main MESH panel will provide a live view of guest calling apartment, key fob readers will allow for 13 common doors for the pool, garden, business offices and a gym. A guard display unit will be monitored for security control, and a mini server installed for integration to security video.

For the Kids

ADT Security Services (Boca Raton, Fla.), the Miami Police Department and pro tennis recently joined forces to provide a group of kids from the 100 Black Men of South Florida a day full of tennis skills and safety tips during the NASDAQ-100 Open, one of the most prestigious titles in professional tennis. ADT has been a host sponsor of the tournament and exclusive electronic security partner since 2002. Pictured from left to right: Ann Linstrom, Director Communi-cations for ADT Security Services, Inc.; Arlene Williams, Miami Police Department; McGruff the Crime Dog; Lori McNeil, tennis pro; Rueben Stokes, executive director of Diversity for ADT.

Locking Out Theft in the Dorm

Lackawanna College, Scranton, Pa., recently brought in an anti-theft product for use by its students. The devices from The Steel Trust Co., Dunmore, Pa., and constructed of 18-gauge cold rolled steel tamper-proof security enclosures, were installed in dormitories. The enclosures are bolted into a closet in the dorm room to allow students to lock their belongings inside.

“I think they’re going to be a great benefit,” said Gail Scaramuzzo, chief administrative officer for the college. “We wanted a space that’s secure and safe for these kids. Now they can put their stuff away and go about their business.”

Hospital Mends MD Parking Woes

Barcode technology now plays a key hands-free role in controlling doctor access to a hospital’s parking facility.

As part of a planned physical expansion, the directors of the Wilson N. Jones Hospital in Sherman, Texas, addressed a parking issue by designating a gated parking area for the doctors. Ideally, the operational system would operate hands-free, to eliminate the necessity for hand-held clickers or cards, since these could prove costly to replace if damaged, lost, or stolen. The system should feature stamped time and date to track entry, be of a discreet design and offer easy installation and maintenance.

Nearly 400 miles away, Luther Bearden, a security dealer and owner of Bearden Construction in Batesville, Ark., faced this challenge following a call from WNJ’s project’s architect. Upon analysis, the key elements he considered were reliability under any condition, cost-effectiveness, user-friendly operation and easy maintenance. He suggested a low-cost barcode reader (Barcode Automation, Winter Springs, Fla.) with retro-reflective barcode decals. The system had already proven highly reliable for him. He was sure it would improve the operational efficiency at the physician’s lot.

Since installation, Lisa Widner, security supervisor at WNJ reports the BA-200 operates flawlessly. Because the lot also services the emergency room doctors, it remains quite active working 24 hours a day, seven days a week. “It works fine considering all the cars entering and exiting all the time,” Widner said. “It keeps the doctors’ lot private and it is low maintenance.”

Bearden said the barcode labels proved to be cost-effective since hospitals replace them frequently because of high personnel turnover. Also, once attached the decals could not be lost, stolen, or loaned. Furthermore, the unique design does not allow the device to read photocopies.

Tulsa International Secures Concourse Exits

Tulsa International Airport (TIA) has selected new technology (ExitSentry, Cernium, St. Louis) to monitor airport concourse areas. The intelligent video monitoring technology prevents, detects and records exit lane intrusions by preventing individuals and objects from entering undetected into a concourse area through an exit lane in an effort to avoid security. The installation at TIA is one component of a recently completed overall update to the concourse, which includes a new centralized security processing center designed to improve safety, efficiency and passenger flow.

Through a system of video surveillance cameras, behavior-recognition software, audio and visual alerts, and digital recording devices, the intelligent video monitors for individuals and objects moving in the wrong direction through an exit area. If the system detects this activity, it triggers a warning, and if the intrusion continues further into the exit area, it activates a higher priority alarm mode.

IFPO and SPS to Honor Security Officer of the Year

The International Foundation for Protection Officers (IFPO) has a new program to honor these often-overlooked members of the protection industry. In conjunction with the Security Professionals Site (SPS) and Security Magazine, the IFPO is establishing an annual Security Officer of the Year award, the first winner to be announced on Nov. 15th, 2005. Nominees do not have to be members of the Foundation or SPS. Candidates for the award cannot be currently commissioned law enforcement officers because their deserving service is recognized in other forums.

Guidelines and forms: contact IFPO at (239) 430-0533 or on the Web at www.ifpo.org or SPS at www.securityprofessionalssite.com.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Person holding cellphone

Millions of Android, iPhone Users Could Be Sending Data to China

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • News & Notes: Business News

    See More
  • News & Notes

    See More
  • News & Notes

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!