Long Arm of the Law Extends its Reach Robotically

April 2016
Orange County Business Journal;4/25/2016, Vol. 39 Issue 17, p3
The article reports that the low-profile company Susteen Inc. is involved in forensic investigations for testing a robotic arm to unlock the most common mobile phones used in crimes and presenst views of Jeremy Kirby, Susteen's director of sales and grant coordinator, on the device.


Related Articles

  • Remote Teleoperated and Autonomous Mobile Security Robot Development in Ship Environment. Long-Yeu Chung // Mathematical Problems in Engineering;2013, p1 

    We propose a wireless remote teleoperated and autonomous mobile security robot based on a multisensor system to monitor the ship/cabin environment. By doing this, pilots in charge of monitoring can be away from the scene and feel like being at the site monitoring and responding to any potential...

  • Cellular phone service theft.  // Consumers' Research Magazine;Sep95, Vol. 78 Issue 9, p41 

    Reports on the increase of cellular phone service theft in the cellular phone industry. Economic aspects; Measures developed to address the problem.

  • Cellular vendors go after fraud. Egolf, Karen // Telephony;4/1/96, Vol. 230 Issue 14, p24 

    Reports that cellular phone vendors in the United States have announced several services at the Wireless 1996 show in Dallas, Texas, to help combat fraud in the industry. Statistics on amount of money lost by the industry in 1995; Statistics on illegal wireless numbers; Reference to personal...

  • Companies try different ways to combat cellular fraud. Dziatkiewicz, Mark // America's Network;2/1/95, Vol. 99 Issue 3, p14 

    Discusses different means by which cellular telephone companies combat cellular fraud. Cloning of cellular phones; Nynex Mobile Communications and Bell Atlantic Mobile (BAM) blocks on automatic roaming service in New York City; Introduction of personal identification numbers (PINs) in cellular...

  • Smaller proportion of new wireless users are buying for safety. Beckman, Kristen // RCR;08/03/98, Vol. 17 Issue 31, p16 

    Focuses on the main reason subscribers use their cellular phones, while stating that security and safety is one of the main reasons, according to a survey carried out by IDC/Link company. What percentage of respondents said safety and security was the primary use of their phones; Comments from...

  • Cell phones keep cons in business. Hutchison, Kay Bailey // Clarendon Enterprise (TX);8/13/2009, Vol. 20 Issue 33, p2 

    In this article the author reflects on the growing number of security problems due to contraband cell phones smuggled to inmates in the U.S.

  • Cellular phone scam checklist.  // Public Management (00333611);Nov96, Vol. 78 Issue 11, p24 

    Gives advice on how users can protect themselves from theft of a cellular telephone identification code. Caution in selecting dealers and deals which offer prices too good to be true; Prevention of electronic scanning; Monitor of bill.

  • Easy information access could burn fingers. Coffee, Peter // PC Week;11/28/94, Vol. 11 Issue 47, p32 

    Discusses the security considerations regarding cellular telephones. Cases where users suffer due to lack of security; Cellular systems' lack of security; Suggestion for a challenge and response protocol; Security products; Importance of building security in the first place.

  • Corsair extends fraud protection.  // RCR;04/28/97, Vol. 16 Issue 17, p20 

    Reveals that Corsair Communications Incorporated has implemented a fraud prevention system for cellular phone users between Mexico and the United States. Information on the network; How the system works; Comments from David Thompson, vice president of marketing for Corsair.

  • Dialing up cellular telephone frauds. P.C. // Practical Accountant;Oct94, Vol. 27 Issue 10, p8 

    Discusses several ways for cellular telephone users to prevent fraud. Disabling of telephones between uses; Filing for lost or stolen telephones; Advice against advertisements of inexpensive cellular telephones.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics