Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The Other Edge of Tracking People

By Bill Zalud
Map
Private security and public law enforcement can track people and vehicles by global positioning. But, a recent Supreme Court ruling decided that the police must get a warrant first.
Smartphone
Cellular telephone carriers and local law enforcement agencies have established business plans for the tracking of people using cell phones and who are under surveillance.
Map
Smartphone
May 1, 2012

For cell phone users, and that includes most everyone these days, there are myriad choices in plans beyond the hundreds of phones themselves. Anytime minutes. Off-peak minutes. Domestic roaming charges. International roaming charges. Minutes overage fees. Text messaging plans. Data plans. Limits and slowdowns on data plans.

For a growing number of local law enforcement agencies, they too have plans and choices to consider.

Cellular telephone carriers, who now have unique law enforcement liaison teams, can charge police departments from a few hundred dollars for locating one phone to more than $2,200 for a full-scale wiretap of a suspect, a recent New York Timesreport shows. And some law enforcement agencies are purchasing their own tracking gear in an effort to cut out the carriers.

Such activity is happening in places like Ogden, Utah and Grand Rapids, Michigan, as compared to the FBI, Secret Service and Homeland Security.

It’s a growing business as well as a crime fighting tool.

Tracking and locating services and technology, no doubt, have a place in some enterprise security programs.

 

Technology Ahead of the Rules

But, it seems, the genie is out of the tech bottle for tracking and locating people and vehicles when it comes to cellular phone and global positioning as well as a combination of both. In addition to local police, private investigators, dads concerned about a daughter’s date, someone caught in a testy divorce, a newspaper reporter or just a nerd tired of playing with a basement computer all have grabbed hold of surveillance equipment.

Some cell carriers now routinely market a catalog of surveillance fees to police departments to determine a suspect’s location, trace phone calls and texts or provide other services, according to the New York Timesreport. Some departments log dozens of traces a month for both emergencies and routine investigations. Some GPS devices now are micro-miniature and micro-priced at less than $150.

But it does seem that a police bandwagon for cell phone tracking; growth of cheap GPS aimed at consumers; red light cameras and their blowback, all combined with an election year spur to mistrust government – local, state and federal, could bring back that Big Brother thing. Ironically and thankfully, Americans see security video in public and private places differently; polls show they are reassured about their security and safety when they see video cameras.

Still, you can’t really blame the police for their growing embrace of technology.

Budgets are squeezed. Police officers are being laid off. Cities need to see crime prevention results and more money in their coffers from red light camera revenue, for example.

But there are bumps along the tech road.

In January, the U.S. Supreme Court unanimously restricted police use of a GPS device to track alleged criminal suspects in a rare test of how privacy rights will be protected in the digital age. The court rejected the government’s view that long-term surveillance of a suspect by GPS tracking without a warrant is no different than traditional forms of monitoring. But its decision was not totally clear, leaving open the overarching question of how government can use the information generated by modern technology for surveillance purposes.

That decision reversed the conviction of suspected D.C. drug kingpin Antoine Jones and was seen as a landmark ruling in applying the Fourth Amendment’s protection against unreasonable searches and seizures as compared to advances in surveillance technology, Washington lawyer Andrew Pincus stated in a brief on Jones’s behalf.

The court, without dissent, ruled that prosecutors violated Jones’s rights when they attached a GPS device to his Jeep and monitored his movements for 28 days. In one of the Washington region’s most celebrated drug trials, the nightclub owner was convicted and sentenced to life in prison.

When it comes to cellular phone tracking by police and the revenue-involved carriers, the borders are still to be decided.

And what does all this have to do with enterprise security?

Well, businesses have a longer leash than law enforcement and some government agencies. Employees and visitors on private property have an expectation of security as compared to privacy. But what is happening in the public sector, and the reaction by the public and the courts, can impact what private security can do, too.

KEYWORDS: cellular communications GPS law enforcement security smartphones surveillance technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cybersecurity Intrusion Detection

    Battle at the edge: How the convergence of 5G and IoT are opening a new front for threat actors

    See More
  • security guard freepik

    The fine line of security’s role as a deterrent: How people process and technology influence response

    See More
  • innovation 2 feat

    Pushes the Edge of Design while Offering High Security

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing