Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical Security

Stopping Thieves with Biometrics: If They Can’t Start It, They Can’t Steal It!

By Philip Scarfo
May 8, 2012
SEC_5-8-article3
Heavy construction equipment is often the target of thieves, but biometric start-up equipment works to counteract their crimes of opportunity.

 

Theft of heavy equipment places a $1 billion burden on contractors, dealers and rental agencies yearly and costs the insurance industry $300 million. In addition, insurance rates are affected by accidents caused by unauthorized operators, even though the boss has designated who are the only people who should drive the unit.

Thieves find that stealing heavy equipment is easy, profitable and as risk-free as theft can get. Their primary targets are skid steers, tractors, backhoes and landscape loaders. These four types of equipment have been at the top of the stolen lists for over a decade, according to Rental Equipment Register magazine. Theft is now increasing at idle worksites and farms, road projects and at dealership/rental yards.

To counteract the growing theft problem, contractors are building fences and gates, locking up equipment, running background checks on sellers and staff or adding identifying marks, such as painting phone numbers and ID numbers on the equipment. All are costly and, so far, unproductive.

However, what if your heavy equipment was useless to a thief? What if it just doesn’t start up and the thief, no matter what he does, can’t get the equipment going? Think that might make a difference?

That’s what multispectral biometrics can bring to the heavy equipment industry. To start up a unit, an authorized operator would first have to touch his finger to a biometric reader. If the person is authorized for that specific equipment, the unit starts up and can be operated. If not, it stands as still as a rock.

And You Thought Only People in Pretty Offices Could Use Biometrics…

For many years now, the promise of fingerprint biometrics has not been fully realized in large part because performance in the lab is not representative of performance in the field, especially where the dirt is flying, it’s raining, fingers get roughened up and manicures are useless. That is the reason many major government and commercial biometrics programs never reached their full potential.

The core problem has been that conventional fingerprint technologies, both semiconductor and conventional optical, were designed to rely on unobstructed and complete contact between the fingerprint and the sensor, a condition that is elusive in the real world, a world that is wet, dry or dirty and users are not all young office workers with great skin who are experienced at using biometrics. These older technologies continue to fail in many circumstances.

Multispectral imaging, on the other hand, is a newer, sophisticated technology that was specifically developed to overcome the fingerprint capture problems conventional imaging systems have in less-than-ideal conditions. This biometric technology excels in real world conditions such as those found on construction sites because, unlike conventional technologies, it does not rely on clean and perfect contact between the finger and the sensor. An analysis of several common real world conditions demonstrates why this sensor characteristic is so important.

Indeed, a construction site is an interesting real world case. Construction workers use their hands and have the cuts and calluses to prove it. Additionally, the construction site is dirty so workers may have grime on their hands when they approach a fingerprint sensor. Altogether, this real-world scenario is a nightmare for system administrators whose conventional fingerprint sensors depend on quality contact between the finger and the platen.

Multispectral fingerprint sensors capture high-quality images because the direct imaging process does not depend on a clean finger/sensor interface. Today, more than 40 million people are already enrolled on multispectral imaging-based systems at locales ranging from the classic door access control situation to the gates of the world’s favorite theme parks. Such readers are keeping borders secure around the world. Indeed, more than 400,000 people pass through multispectral imaging sensors every day at the Hong Kong border crossing.

And now, finally, biometrics can be used with confidence in the construction industry. When thieves see equipment guarded with biometric readers, it’s time to move on down the road.

“With biometrics, the Rugged Telematics Alliance (RTA) Ecosystem is now able to not only monitor the location and status of the asset but confirm who is operating it, a feature that can provide additional piece of mind to managers, owners and insurance providers,” said Michael Rodenberg, director of business development for Methode. 

KEYWORDS: biometric security construction security theft prevention

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Philip J. Scarfo, Senior Vice President of Sales and Marketing, Lumidigm (Part of HID Global)

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • From Wet Fingers to Vandalism: Tough Enough?

    See More
  • busy lobby

    How can security teams manage risk if they can’t measure it?

    See More
  • Global Study Says 63% of Organizations Believe They Can't Stop Data Theft

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing