Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementSecurity Leadership and ManagementSecurity Education & Training

The Rise of License Plate Reader Technology

How LPR can benefit your security program and potential challenges to consider.

By Sarah Ludwig Rausch
SEC0519-Tracking-Feat-slide1_900px
SEC0519-Tracking-slide2_900px

“Over time, technology gets less expensive, but you have to consider the use. You can’t mitigate every threat,” says Cody Mulla, senior information security manager of crisis, continuity and incident response at Informatica.

Photo courtesy of Cody Mulla.

SEC0519-Tracking-slide3_900px

“There’s a lot of great technology out there, so we need to utilize all these strategies without creating a police state,” says James DeMeo, a corporate security professional at Sunstates Security and instructor of event security and risk assessment at Tulane University.

Photo courtesy of James DeMeo.

SEC0519-Tracking-slide4_900px

“Good cameras have the ability to set thresholds for things like expired tags, but if we turned that on, we would be inundated,” says Detective Sergeant David Snively of the Brookhaven, Georgia, Police Department. “The only things that these cameras are measuring are stolen cars, stolen tags and wanted or missing people.”

Photo courtesy of Detective Sergeant David Snively.

SEC0519-Tracking-Feat-slide1_900px
SEC0519-Tracking-slide2_900px
SEC0519-Tracking-slide3_900px
SEC0519-Tracking-slide4_900px
May 6, 2019

License plate reader (LPR) technology is a hot topic and its usage is rapidly increasing. OpenAPLR, which offers free LPR software that lets any web-connected camera read license plates, has gone from utilization in around 300 cameras two years ago to 9,200 cameras around the world, an increase of nearly 3,000 percent. Interestingly, only about half of these users are police officers, a fact that carries all sorts of implications in a largely unregulated industry.

With little existing legislation and 5G knocking at the door with promises of significantly faster data transmission and an explosion in the number of IoT devices, it appears that we’re all groping our way through a messy intersection of creative ways to use LPR technology for multiple applications and potential privacy, ethical and legal issues that will likely spawn future litigation.

So how can security leaders who use LPR or are considering adding it to their existing programs stay above the fray while also mitigating risk, implementing best practices and adding value? Here are some points to consider.

 

Be Aware of Your State’s LPR Laws

As of this writing, just 16 states have official statutes regarding LPR use and/or data retention, a number that’s sure to eventually increase, says the National Conference of State Legislators. If you’re using the technology, you need to be informed about your state’s laws (or lack thereof) and your responsibilities, whether you’re using it as a private citizen or as law enforcement.

 

Privacy Concerns Will Continue to Create Challenges

With so little legislation governing LPR, groups like the American Civil Liberties Union (ACLU) have been calling for legislation and law enforcement policies regarding both the usage of LPR and the storage of collected data and filing (and winning) lawsuits that challenge data collection, storage and transparency. And with the increasingly rampant use of LPR by everyday citizens and private companies, questions are arising as to where all this data is going, with whom it is being shared and how it is being used. All these factors create an environment that is ripe for brand and agency distrust, if not outright lawsuits.

 

Cybersecurity Should Be Front-of-Mind

It goes without saying that a growing number of collection nodes, whether it is LPR cameras or other IoT devices, results in more areas of potential vulnerability. It seems too basic to even mention, but if your LPR camera is connected to the internet, it is imperative that you change the default password that comes with it.

Case in point: Over a week’s time in 2019, the website TechCrunch found more than 150 LPR cameras that were connected to the internet and either easily or completely accessible, thanks to the use of default passwords. No one wants the fallout of a hack, so do your due diligence and plug these obvious security holes.

And if you are not a cybersecurity guru, find someone who is to help you keep your devices secure. “Physical security people like me don’t necessarily understand all the ins and outs of cybersecurity, and vice versa,” says James DeMeo, a corporate security professional at Sunstates Security and instructor of event security and risk assessment at Tulane University. “But if we sit down at the table together and we share examples and best practices, we can effectively integrate these technologies to better protect patrons, assets and organizational brand.”

If you want to get a good handle on where you may have cybersecurity vulnerabilities, check out the search engine Shodan, which indexes everything that is connected to the internet.

 

LPR Continues to Create Success Stories

The Brookhaven Police Department, located just outside Atlanta, partnered with Georgia Power to place nearly 50 LPR cameras around the city. As the center of a multi-agency sting called “Operation Interception,” which targeted people who intended to travel to have sex with minors, 21 people were arrested in five days beginning January 30, 2019, thanks to the LPR technology the Brookhaven PD already had in place.

“We were able to get tags for vehicles that were registered to these people,” says Detective Sergeant David Snively of the Brookhaven PD. “We put them in and set it so that only our command post got the alerts. As soon as (predators) passed a tag reader, we knew where they were. It was one more piece of evidence, but much, much more importantly, it gave our arrest teams a heads up that made it safer for the officers and the community.”

Snively sees the publicization of the operation as a deterrent. “Our message is very simple: If you’re coming to Brookhaven to have sex with a kid, there’s a good chance you’re going to meet me instead,” he says.

Beyond that, he finds the LPR historical data to be relevant to virtually all the department’s ongoing criminal investigations. “I think we’re probably averaging a stolen car every week at least, maybe two or three,” he says.

Snively points out that officers don’t just randomly look up license plates. “It’s not a fishing expedition, we’re not going through every tag. We get specific tags and query them,” he says. There’s also a checks and balances system. “If I want to see historical data for a particular tag, before I can ever see it, I have to enter my user name and password so it identifies me specifically and I have to enter a case number and a brief description of why I’m searching that tag. It has a built-in audit trail.” Images can only be viewed — they can’t be deleted or manipulated in any way.

 

It’s a Good Strategy for Safeguarding Exterior Perimeters

In the event security arena, LPR technology is used extensively as law enforcement patrol the exterior perimeter parking lots. “LPR is a proactive risk mitigation strategy. Whether it’s a school or a stadium, these exterior perimeters are soft targets,” says DeMeo. “They’re extremely vulnerable, so if they’re in close proximity to mass transportation hubs, the ability to have officers patrolling the lots and looking for these suspicious vehicles utilizing LPR technology bodes well for ownership groups in terms of duty of care.”

 

It Can Add Value to Your Security Program

One of the great things about LPR is the multitude of ways the data it collects can be used to solve problems, whether financial, criminal, safety, customer service or security, notes Matt Powell, transportation market manager at Convergint. If there are vehicles involved and you need data, LPR is a good way to get it, he adds. Thinking creatively about how you can use LPR to drive revenue for your enterprise or client adds significant value to your security program.

For example, let’s say your enterprise or client needs to update an old, crowded parking deck. LPR data can help you analyze peak hours, create a charting system based on activity and provide heat mapping, yielding cold, hard data that justifies the upgrade. Not only does this give security more value, it keeps you in the conversation rather than pushing you out of the way in favor of third-party vendors, such as parking companies with their own LPR systems.

Aside from increasingly common applications like parking lot gate arms and access control, LPR is being utilized in other interesting ways. Enterprises like automotive dealerships, casinos and airports are using it as a concierge service to enable staff to provide a better, smoother customer service experience, as well as to send alerts  when VIP customers arrive.

Cody Mulla, senior information security manager of crisis, continuity and incident response at Informatica, sees a possible future application of LPR in workplace violence prevention programs as well. “If you have an employee that has a person of interest that may have a protective order and they collected that vehicle information, you could set up alerts to go to your internal security staff to let them know that the vehicle is around and possibly that person is operating the vehicle,” he says.

 

Transparency is Vital

Educating both clients or appropriate enterprise personnel and the public about how you’re using LPR technology and how it’s benefiting them helps to build public trust and can help minimize misuse of the technology, says Powell. Posting obvious signs wherever you have cameras is one way to maintain transparency.

 

Clear Policies Can Pave the Way to Success

“I’m not an attorney, but I always remind people that you’re probably going to get sued. However, if your actions are reasonable and necessary and you do everything within your power to take steps like proactive security staff training, utilizing metrics to measure learning and understanding, this places you in a very good position to protect yourself from those liabilities,” DeMeo says.

You should also know where your data is stored, for how long and if and with whom it’s shared. Even if there aren’t any hard and fast rules in your state yet, developing a clear internal policy on data storage, usage and sharing is a good practice and could help you down the road in the event of a lawsuit, as well as create transparency and build trust in your brand.

KEYWORDS: data storage Internet of Things (IoT) license plate recognition security career

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sarah Ludwig Rausch is a Contributing Writer to Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • license plate recognition will be installed at the University of Florida campus to boost security

    University of Florida will use license plate recognition technology to boost security

    See More
  • car wash

    License plate recognition boosts efficiency at Sonny’s The CarWash Factory

    See More
  • Marco Island Florida installs license plate recognition system for added security

    Marco Island in Florida installs license plate recognition for traffic on and off the island

    See More

Related Products

See More Products
  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products
×
“Over time, technology gets less expensive, but you have to consider the use. You can’t mitigate every threat,” says Cody Mulla, senior information security manager of crisis, continuity and incident response at Informatica. Photo courtesy of Cody Mulla.
“There’s a lot of great technology out there, so we need to utilize all these strategies without creating a police state,” says James DeMeo, a corporate security professional at Sunstates Security and instructor of event security and risk assessment at Tulane University. Photo courtesy of James DeMeo.
“Good cameras have the ability to set thresholds for things like expired tags, but if we turned that on, we would be inundated,” says Detective Sergeant David Snively of the Brookhaven, Georgia, Police Department. “The only things that these cameras are measuring are stolen cars, stolen tags and wanted or missing people.” Photo courtesy of Detective Sergeant David Snively.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!