Cactus, Canines and Cell Phones

Zalud, Bill
October 2008
Security: Solutions for Enterprise Security Leaders;Oct2008, Vol. 45 Issue 10, p14
Trade Publication
The article reports on the use of several technologies to detect illegal issuance of cellular phones to prisoners by their visitors in the U.S. It states that All States K-9 Detection is the first company to train K-9 dogs to sniff out prison mobile phones and stop the security threat. In relevance, it cites that many of the country's city police has installed security video cameras to manage the security system.


Related Articles

  • Good fido.  // Telecom Asia;Oct2008, Vol. 19 Issue 10, p40 

    The article reports on the ability of the dogs of Sharon Read of Al States K-9 Detection to detect cellular phones. According to the report from CSO Online, Read's dogs are used in prisons to find out cellular phones hidden under mattresses, in freezers, vending machines, and carved out books....

  • The Enhanced Video Alarm Meets the Bottom Line. McCourt, Mark // Security: Solutions for Enterprise Security Leaders;Mar2010, Vol. 47 Issue 3, p12 

    The article focuses on video alarms with enhanced capabilities and effectiveness which aid in event prevention. It stresses the importance of analytics for an effective alarm system comprising of interrelated systems including videos and mobile phones. It also mentions that enhanced video alarm...

  • Wireless cameras raise privacy fears. Fox, Barry // New Scientist;5/17/2003, Vol. 178 Issue 2395, p11 

    Setting up cameras for a neighborhood-watch scheme or even a domestic CCTV security network used to involve a great deal of wiring. Merger of cellphone technology with digital cameras is going to make CCTV wireless. Cellphone maker Nokia Corp. is launching a camera that can snap a...

  • Powerhouse by day, powerhouse by night.  // International Fire & Security Product News;Aug2003, Vol. 28 Issue 4, p8 

    Reports on the PowerDome camera developed by Vista in Great Britain. Functions of the security camera; Features of the camera; Types of housing for the camera.

  • To Protect and Serve.  // Baseline;Sep2003, Issue 22, p86 

    Presents an article on security spending. Information on a survey of corporate security managers by the Conference Board about security spending by corporations in 2002; Benefits of video cameras.

  • Security shutters deemed no security risk.  // Planning (14672073);8/21/2009, Issue 1832, p22 

    The article reports on the removal of the three security shutters in Blackpool, England areas after the inspector ended that those will not affect the security of the premises. The inspector comments that shutters will not threaten the pedestrians to stay away from the area and the retail...

  • Day, Night, Round the Clock. Poremba, Marquette // Security: Solutions for Enterprise Security Leaders;Mar2011, Vol. 48 Issue 3, p80 

    The article provides tips to consider in purchasing a day/night camera security system. It states that choosing and installing day/night cameras is challenging and it is important to consider the technical challenges which include sensors, pixels, and lenses. It notes that it is also important...

  • Strategies for Short-Term Surveillance. Morton, Jennie // Buildings;Jun2011, Vol. 105 Issue 6, p32 

    The article discusses temporary surveillance as a security measure. It highlights the importance of having a security protocol for incidents that do not often occur or for unique events. It provides guidelines on the setting up of temporary surveillance strategy which could include a mobile...

  • Correctional Security Technology: Catch the Wave. Scism, Bill // Corrections Today;Aug2009, Vol. 71 Issue 4, p8 

    This article discusses some of the latest technology being used to provide security at correctional institutions. Good correctional leaders use their staff in the field to evaluate security technology to see if it is effective. Technology can cover a range of security issues from detecting cell...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics