Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Homeland Security: Texas Border Watch to Go IP Video

July 1, 2006
The Bush Administration continues to react to the immigration debate as a homeland security issue. President Bush, far left, and Homeland Security Secretary Michael Chertoff recently administered the oath of office to new Customs and Border Protection Commissioner W. Ralph Basham, far right, during a ceremony at the Border Patrol Academy, Artesia, N.M. Photo by Chuck Csavosy


Gov. Rick Perry’s throwing down the gauntlet, that is the IP camera, to fill what he calls gaps in border security from what the U.S. Department of Homeland Security’s delivering. The state will create a virtual border watch program “by leveraging advanced video technology and the power of the World Wide Web, and…make our border stronger and our nation safer,” Perry said.

With voluntary participation of private landowners, Texas will use $5 million to begin placing hundreds of surveillance cameras with night vision capability along criminal hotspots and common routes used to enter this country. Perry said the cameras will cover vast stretches of farm and ranchland located directly on the border where criminal activity is known to occur, and not the neighborhoods where families will continue to enjoy their privacy.

“Landowners will be able to monitor and defend their property from those who might endanger their families. We will make the video feed available to state, local and federal law enforcement agencies so they can respond swiftly and appropriately,” Perry said. “And we will post this video on the Internet – in real-time – so that concerned Americans can help protect our nation through online neighborhood watch programs.”

There’s just so much territory the U.S. Border Patrol can cover. So Texas Gov. Perry will place Webcams on private lands and provide real-time monitoring on the Internet to everyone.

MOST WORRIED ABOUT TERROR, AVIAN FLU

According to a new poll released today, 80% of American voters believe a calamitous terrorist attack could happen in their lifetime while 74% believe that a devastating flu pandemic could occur in the same period.

The nationwide poll (with a margin of error of +/- 3.5%), for NBC News Productions and SCI FI Channel, also found that 37% of American voters believe the nation is unprepared for a major terrorist attack, while 40% feel the country is unprepared for a pandemic outbreak. Check out this month’s News & Analysis for a lead article on avian flu.

Smart Card Alliance Challenges DHS

Contactless smart card technology best meets the objectives set forth by the Department of Homeland Security (DHS) for high throughput and the protection of individual privacy at the nation’s border crossings for its People Access Security Service (PASS) card program. PASS cards would be required by 2008 for all U.S. citizens who cross the northern and southern borders of the United States without passports. The Smart Card Alliance wants DHS to use secure contactless chip technology vs. RFID. Go to www.smartcardalliance.org for a copy of the alliance’s white paper.

Parcel inspection systems are sizing down, getting smarter and more accurate.

What About the Parcels?

There’s been plenty of talk about the need to track and search cargo containers, but more large enterprises now seek ways to detect security threats and contraband in parcels, baggage and mail. More organizations now physically separate the handling of incoming mail and sorting from corporate headquarters, allowing for better inspection by hand and by emerging detection technologies.

An example is Gemini from Billerica, Mass.-based American Science and Engineering.

From Yellow to Orange to Red

What are an enterprise and the chief security officer to do when Homeland Security elevates its advisories?

One solution is, there’s TAZ (Threat-level Adaptive Zoning). In perimeters of up to 50 continuous miles in length, it allows Future Fibre Technologies (Mountain View, Calif.) fence-mounted fiber optic “early warning” sensor to quickly tighten security along the entire perimeter in response to the Department of Homeland Security Advisory System. As an example, in advisory condition yellow, the individual alarm zone length may be a traditional 300 feet. In orange, it adapts to150 feet and in condition red each zone becomes 75 feet for a more detailed assessment. Besides the zone length, the feature automatically adjusts parameters related to alarm detection sensitivity. As Homeland Security raises the threat level, zones shorten and sensitivity increases at the click of a mouse.

Links

  • Smart Card Alliance
  • Smart Card Alliance
  • Smart Card Alliance
  • Smart Card Alliance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Copenhagen “Games” Go IP Security Video

    See More
  • Border Patrol

    Texas to Get Additional Funding for Border Security

    See More
  • Houston's Costly Homeland Security Videos Go Viral

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • The Complete Guide to Physical Security

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing