In the beginning of September, a group of computer hackers calling themselves AntiSec announced that they had stolen a file containing unique identification data for 12,367,232 Apple iOS devices. They claimed the database was stolen from the compromised laptop of an FBI agent. Simultaneous to AntiSec’s release, the FBI denied the claim. To substantiate their claim, AntiSec released one million of the unique identifiers minus the personal data embedded in the stolen file.
Phillip Riordan, vice president for student life at Lynn University, Boca Raton, Fla., has added a third gatehouse recently to provide access control to his campus. But he knows that the guardhouses are more than modular buildings.
Pilot programs at Netflix and Good Technologies have proved successful for Near-Field Communication technology, including access control via smartphone.
Building on their widespread use and popularity as a security management tool, key control systems’ functionality has been expanded to include custom modules and lockers that can accommodate plastic card keys or other valuable items.
Two topics that I can never discuss enough are the reduction of violence and the use of access control and identification as a major component utilized to reduce violence. A few months ago there was another devastating shooting in the U.S.: the Aurora, Colo., movie theater shooting that killed 12 people and injured more than 50.
After a young man shot more than 70 people in a Colorado movie theater in July, many companies of all types and sizes have since re-evaluated their access control systems. And for businesses deemed “challenging to control,” finding the right solution can make all the difference in protecting your assets – whether property or people.
It was about 4:30 a.m. in Oak Ridge, Tenn., when sensors on the perimeter intrusion detection and assessment system alarmed. There was an unauthorized entry into a high-security, protected area. A well-trained and heavily armed guard force responded.