Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Homeland Security: Texas Border Watch to Go IP Video

July 1, 2006
The Bush Administration continues to react to the immigration debate as a homeland security issue. President Bush, far left, and Homeland Security Secretary Michael Chertoff recently administered the oath of office to new Customs and Border Protection Commissioner W. Ralph Basham, far right, during a ceremony at the Border Patrol Academy, Artesia, N.M. Photo by Chuck Csavosy


Gov. Rick Perry’s throwing down the gauntlet, that is the IP camera, to fill what he calls gaps in border security from what the U.S. Department of Homeland Security’s delivering. The state will create a virtual border watch program “by leveraging advanced video technology and the power of the World Wide Web, and…make our border stronger and our nation safer,” Perry said.

With voluntary participation of private landowners, Texas will use $5 million to begin placing hundreds of surveillance cameras with night vision capability along criminal hotspots and common routes used to enter this country. Perry said the cameras will cover vast stretches of farm and ranchland located directly on the border where criminal activity is known to occur, and not the neighborhoods where families will continue to enjoy their privacy.

“Landowners will be able to monitor and defend their property from those who might endanger their families. We will make the video feed available to state, local and federal law enforcement agencies so they can respond swiftly and appropriately,” Perry said. “And we will post this video on the Internet – in real-time – so that concerned Americans can help protect our nation through online neighborhood watch programs.”

There’s just so much territory the U.S. Border Patrol can cover. So Texas Gov. Perry will place Webcams on private lands and provide real-time monitoring on the Internet to everyone.

MOST WORRIED ABOUT TERROR, AVIAN FLU

According to a new poll released today, 80% of American voters believe a calamitous terrorist attack could happen in their lifetime while 74% believe that a devastating flu pandemic could occur in the same period.

The nationwide poll (with a margin of error of +/- 3.5%), for NBC News Productions and SCI FI Channel, also found that 37% of American voters believe the nation is unprepared for a major terrorist attack, while 40% feel the country is unprepared for a pandemic outbreak. Check out this month’s News & Analysis for a lead article on avian flu.

Smart Card Alliance Challenges DHS

Contactless smart card technology best meets the objectives set forth by the Department of Homeland Security (DHS) for high throughput and the protection of individual privacy at the nation’s border crossings for its People Access Security Service (PASS) card program. PASS cards would be required by 2008 for all U.S. citizens who cross the northern and southern borders of the United States without passports. The Smart Card Alliance wants DHS to use secure contactless chip technology vs. RFID. Go to www.smartcardalliance.org for a copy of the alliance’s white paper.

Parcel inspection systems are sizing down, getting smarter and more accurate.

What About the Parcels?

There’s been plenty of talk about the need to track and search cargo containers, but more large enterprises now seek ways to detect security threats and contraband in parcels, baggage and mail. More organizations now physically separate the handling of incoming mail and sorting from corporate headquarters, allowing for better inspection by hand and by emerging detection technologies.

An example is Gemini from Billerica, Mass.-based American Science and Engineering.

From Yellow to Orange to Red

What are an enterprise and the chief security officer to do when Homeland Security elevates its advisories?

One solution is, there’s TAZ (Threat-level Adaptive Zoning). In perimeters of up to 50 continuous miles in length, it allows Future Fibre Technologies (Mountain View, Calif.) fence-mounted fiber optic “early warning” sensor to quickly tighten security along the entire perimeter in response to the Department of Homeland Security Advisory System. As an example, in advisory condition yellow, the individual alarm zone length may be a traditional 300 feet. In orange, it adapts to150 feet and in condition red each zone becomes 75 feet for a more detailed assessment. Besides the zone length, the feature automatically adjusts parameters related to alarm detection sensitivity. As Homeland Security raises the threat level, zones shorten and sensitivity increases at the click of a mouse.

Links

  • Smart Card Alliance
  • Smart Card Alliance
  • Smart Card Alliance
  • Smart Card Alliance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Copenhagen “Games” Go IP Security Video

    See More
  • Border Patrol

    Texas to Get Additional Funding for Border Security

    See More
  • New Newswire Feature Image 3/8/2012

    Houston's Costly Homeland Security Videos Go Viral

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing