Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The Other Edge of Tracking People

By Bill Zalud
May 1, 2012

For cell phone users, and that includes most everyone these days, there are myriad choices in plans beyond the hundreds of phones themselves. Anytime minutes. Off-peak minutes. Domestic roaming charges. International roaming charges. Minutes overage fees. Text messaging plans. Data plans. Limits and slowdowns on data plans.

For a growing number of local law enforcement agencies, they too have plans and choices to consider.

Cellular telephone carriers, who now have unique law enforcement liaison teams, can charge police departments from a few hundred dollars for locating one phone to more than $2,200 for a full-scale wiretap of a suspect, a recent New York Timesreport shows. And some law enforcement agencies are purchasing their own tracking gear in an effort to cut out the carriers.

Such activity is happening in places like Ogden, Utah and Grand Rapids, Michigan, as compared to the FBI, Secret Service and Homeland Security.

It’s a growing business as well as a crime fighting tool.

Tracking and locating services and technology, no doubt, have a place in some enterprise security programs.

 

Technology Ahead of the Rules

But, it seems, the genie is out of the tech bottle for tracking and locating people and vehicles when it comes to cellular phone and global positioning as well as a combination of both. In addition to local police, private investigators, dads concerned about a daughter’s date, someone caught in a testy divorce, a newspaper reporter or just a nerd tired of playing with a basement computer all have grabbed hold of surveillance equipment.

Some cell carriers now routinely market a catalog of surveillance fees to police departments to determine a suspect’s location, trace phone calls and texts or provide other services, according to the New York Timesreport. Some departments log dozens of traces a month for both emergencies and routine investigations. Some GPS devices now are micro-miniature and micro-priced at less than $150.

But it does seem that a police bandwagon for cell phone tracking; growth of cheap GPS aimed at consumers; red light cameras and their blowback, all combined with an election year spur to mistrust government – local, state and federal, could bring back that Big Brother thing. Ironically and thankfully, Americans see security video in public and private places differently; polls show they are reassured about their security and safety when they see video cameras.

Still, you can’t really blame the police for their growing embrace of technology.

Budgets are squeezed. Police officers are being laid off. Cities need to see crime prevention results and more money in their coffers from red light camera revenue, for example.

But there are bumps along the tech road.

In January, the U.S. Supreme Court unanimously restricted police use of a GPS device to track alleged criminal suspects in a rare test of how privacy rights will be protected in the digital age. The court rejected the government’s view that long-term surveillance of a suspect by GPS tracking without a warrant is no different than traditional forms of monitoring. But its decision was not totally clear, leaving open the overarching question of how government can use the information generated by modern technology for surveillance purposes.

That decision reversed the conviction of suspected D.C. drug kingpin Antoine Jones and was seen as a landmark ruling in applying the Fourth Amendment’s protection against unreasonable searches and seizures as compared to advances in surveillance technology, Washington lawyer Andrew Pincus stated in a brief on Jones’s behalf.

The court, without dissent, ruled that prosecutors violated Jones’s rights when they attached a GPS device to his Jeep and monitored his movements for 28 days. In one of the Washington region’s most celebrated drug trials, the nightclub owner was convicted and sentenced to life in prison.

When it comes to cellular phone tracking by police and the revenue-involved carriers, the borders are still to be decided.

And what does all this have to do with enterprise security?

Well, businesses have a longer leash than law enforcement and some government agencies. Employees and visitors on private property have an expectation of security as compared to privacy. But what is happening in the public sector, and the reaction by the public and the courts, can impact what private security can do, too.

KEYWORDS: cellular communications GPS law enforcement security smartphones surveillance technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cybersecurity Intrusion Detection

    Battle at the edge: How the convergence of 5G and IoT are opening a new front for threat actors

    See More
  • security guard freepik

    The fine line of security’s role as a deterrent: How people process and technology influence response

    See More
  • Pushes the Edge of Design while Offering High Security

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing