Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Tracking Critical Assets

By Diane Ritchey
February 1, 2010


Minutes after an armed bank robbery in suburban Chicago last month, the three suspects were caught at one of their homes. How did the police track them down so quickly?

It’s a relatively new feature in bank security and it could take asset tracking to a whole new level: credit card size GPS devices hidden in stolen cash, which in this case, led police quickly to the suspects. According to a Chicago Tribune report, it is the first time the technology, similar to what is used in cell phones and other devices, had been deployed to solve a bank robbery in the Chicago area.

Here’s how it works: a magnetic switch between the GPS modem and antenna is activated when the device is removed from the bank. A notification is sent to authorities, letting them know that the tracking device was activated. Alerts are sent through email, instant messaging and SMS. A radio frequency beacon then helps to determine the location of the device.


More Focused Spending

Beyond cash in a bank, use of asset tracking solutions has potential to grow this year, says an ABI Research report on the subject. The “Annual RFID End User Survey Top Line Results” report says that nearly half (49 percent) of respondents currently using, deploying, evaluating, or piloting RFID expect their budgets to increase this year.

As in past years, the majority of respondents rated “business process improvement” as the number one driver for their adoption of RFID. The second-most important driver was the need to reduce non-labor costs.

ROI timeframe is also a critical consideration for most companies considering RFID deployment, and comparing the ROI assumptions reported in 2009 with those from 2008, the survey found that more companies – 48 percent as opposed to 37 percent in 2008 – expect their investment to be recouped within 12 months.

In addition, says ABI, while in some areas RFID still faces challenges, in others, it is thriving. ABI identified three of the most promising hot-spots as the retail apparel segment, asset management, and active RFID (in a number of verticals).

Specifically, adoption of item-level RFID in the fashion apparel market is graduating from pilot testing to full-scale deployment. While installations at Marks and Spencer in the United Kingdom, American Apparel in the U.S., and Charles Vögele in Switzerland remain the largest contributors to market growth, other companies are now in various stages of implementation.

Active RFID-based solutions, including real-time location systems (RTLS), is expected to experience solid growth in a number of areas, such as healthcare, manufacturing, aerospace and defense, transportation, and commercial services, in support of asset tagging, people tracking and more.
Beyond GPS, other asset management solutions can be as rudimentary as a basic Excel spreadsheet or as expensive as a sophisticated enterprise-wide software solution that in some cases can cost hundreds of thousands or even millions of dollars on the high end. The best solution should be one that offers:

1. Efficiency – Maximizes the life of each asset by extending its uses and life.
2. Scalability – Flexible enough to meet the current business needs but powerful enough to easily grow over time.
3. Accountability – Accounting for the location and availability of each piece of equipment is another important step in the management of your equipment.
4. Biggest bang for your buck – If you can get all the above at a price that is manageable, then the ROI should be very favorable. According to inventory management firm Xceliware, this makes the decision to invest in an enterprise level solution much easier to make.


Layered Security System Tracks Assets

When the work day is over, most employees want to pack up their things and go home. Instead, employees working at distribution centers for Best Buy Canada faced a 20 minute wait in line for loss prevention screening before they could leave each day. They gave up keys and personal cell phones, walked through a metal detector and were then subjected to physical pat-downs.

Metal detectors do not detect non-ferrous objects (i.e., CDs, DVDs, plastics and some small electronics) and random pat-downs can be ineffective. Some employees were missing scheduled transportation or other appointments because of the lengthy shift change. Employee morale suffered and the current screening/security processes were proving to be unsuccessful.

Effective employee screening is important. According to the 2008 National Retail Security Survey Final Report, 42.7 percent of inventory shrinkage stems from employee theft. A retailer operating multiple distribution centers worldwide and handling thousands of high-value electronic and high-technology items daily has a lot to lose, even if its percent of shrinkage is relatively low.

Brendan Alexander, director of loss prevention, tells Security that the retailer was using a layered physical security program based on crime prevention through environmental design principles along with conventional metal detectors, hand-wand units and camera systems. Weighing his options, he says “We could increase the number of metal detectors and guards in our facilities to speed up the exiting of our employees. But this would have increased our operating expenses.”

Instead, he implemented a concealed object detection and people screening system from Brijot that was placed so that employees exiting the distribution center passed through a metal detector and were then imaged by the system as they left the building. The implementation also included security protocol whereby employees are imaged in real-time at two distances, roughly four feet and nine feet from the system. This allowed operators to not only view the whole body and detect objects three inches by five inches or larger, but to also bring the subjects closer to the system and view smaller objects that could be hidden about the body.

Alexander says that the new system has helped to keep shrinkage low, and increase security without adding new staff or affecting employee morale. “Today, the same employees who used to wait 20 minutes at each shift now only wait about 7 minutes. We’re also no longer compromising anyone’s dignity or privacy.”


The Shimane Asahi Rehabilitation Program Center in Japan uses a Wi-Fi RFID solution to improve prison management by streamlining the way it tracks prisoner, officer and staff movement throughout the facility.

Tracking Prisoners

Inmates are undoubtedly the most important asset that a prison system has. Shimane Asahi Rehabilitation Program Center is the newest and largest prison developed by Japan’s Private Finance Initiative and is managed under the Japanese government’s Correction Bureau, Ministry of Justice. The facility encompasses 325,000 square meters, with almost 100,000 square meters of floor space.

The facility was looking for a new way to track the prisoners. Yuichiro Morita, Correction Bureau of Ministry of Justice, Japan, says that “In order to maintain security in a correctional facility, prisons rely heavily on guard labor for activities such as counting the inmates. Regular counting occurs every morning and evening, but if one (or more) inmates are unaccounted for, the prison needs to conduct emergency counts. These counts are time consuming and tedious. We needed a system to automatically detect who is missing.”

The correctional facility uses a Wi-Fi RFID solution from AeroScout to improve prison management by streamlining the way it tracks prisoner, officer and staff movement throughout the facility. The system has been in operation since October 2008 and will ultimately include 3,000 Wi-Fi tags when at full capacity this year.

Now, prison officers can monitor the location of each inmate and compare it with their planned schedule of movements and activities for the day. Automatic alerts are sent if any discrepancies occur between scheduled and actual locations. For example, officers can easily identify if prisoners are in the wrong area of the prison or are moving too close to a forbidden zone.

In addition, the solution is for indoor and outdoor tracking, which allows officers to monitor inmate movement across the entire grounds within one system. As such, prisoners are able to move from one place to another without escort by prison guards, cultivating a better culture among inmates. This not only reduces the time officers spend tracking individual prisoners, but also lessens the feeling of animosity inmates may feel.

Morita also notes that the new system has reduced staff-to-inmate ratio to half of what conventional prisons’ ratios are, and that this has had a large impact on labor and operational efficiency. There are other soft benefits as well, he says, such as improved relations between prisoners and inmates and less stressful environments and activities.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Trouble Times Three: Theft, Assets and Your Company’s Brand

    See More
  • Cut the Cord

    Tracking Employees On-the-Go with Smartphone Apps

    See More
  • Tracking and Compliance at a Seaside Port

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!