26.03.2016 Views

GSN March 2016 Digital Edition

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

data against the personnel inventory<br />

system to inform and report on the<br />

personnel located inside the building.<br />

In the event of an evacuation,<br />

managers can quickly account for all<br />

employees, and alert authorities to<br />

any discrepancies in their locations.<br />

To illustrate the usefulness of this<br />

<br />

suggested that we walk through a<br />

scenario.<br />

“Imagine a large federal healthcare<br />

facility with around 2,000 employees,<br />

four acres of campus space,<br />

and a fairly high level of security.<br />

Employees are assigned badges<br />

equipped with active RFID technology,<br />

which identifies each individual,<br />

and a ‘panic button’ that can be activated<br />

as a silent alarm sent to the<br />

remote server. Any number of incidents<br />

could prompt a security response<br />

– white powder found in the<br />

mailroom, a toxic spill of infectious<br />

substance, a natural disaster such as<br />

a tornado or earthquake, a fire, an active<br />

shooter on campus, or the worstcase<br />

possibility – blatant terrorism.”<br />

<br />

described a supervisor arriving at<br />

work and noticing a man she does<br />

not recognize, loitering by the employee<br />

entrance.<br />

“As she passes through the door,<br />

the inventory point captures her<br />

identifying data, and makes a digital<br />

record that she is in the building, just<br />

as it does for every employee on that<br />

39<br />

morning,” he described. “Moments<br />

later, she sees the unauthorized man<br />

enter the building behind another<br />

employee, and dart into the elevator.<br />

Immediately, she activates her RFID<br />

panic button while arriving her office.<br />

As she sits down, she hears shots<br />

in the hallway upstairs, signaling that<br />

an active shooter is on campus. As<br />

security protocols are implemented,<br />

she evacuates her team and meets up<br />

with other employees at a preplanned<br />

mustering location. There, she accesses<br />

the remote data server to take<br />

inventory of her team, and discovers<br />

that one of her team members is still<br />

inside. The system’s real-time tracking<br />

enables law enforcement to know<br />

that one of her employees is hiding<br />

in the men’s restroom. With law enforcement<br />

already notified earlier by<br />

her panic button activation, their re-<br />

<br />

on scene within moments of the first<br />

report of shots fired.”<br />

<br />

law enforcement is able to intercept<br />

the innocent employee as he exits<br />

the men’s room, and evacuate him<br />

safely – avoiding any chance of him<br />

encountering the shooter.<br />

sciotta<br />

added, “the system reports<br />

that a small group of employees –<br />

still inside the building, as reported<br />

by their RFID badges – are huddled<br />

together in an upstairs closet. This al-<br />

ing<br />

from the shooter, directing them<br />

to search that part of the building,<br />

where they apprehend the shooter,<br />

and release the employees from their<br />

hiding spot after the area is secure.”<br />

<br />

real-time tracking solutions can be a<br />

powerful means of identifying unauthorized<br />

activity, and ultimately protecting<br />

employees and infrastructure.<br />

He is enthusiastic about the<br />

potential for federal, state, and local<br />

agencies to implement this technology,<br />

and about the positive impact<br />

it can have on government security<br />

response capabilities.<br />

Looking forward, I expect we will<br />

be seeing broader implementation<br />

of RFID technology across government,<br />

and the development of new<br />

and better RFID technologies as new<br />

RFID innovators emerge in this market.<br />

John Convy and Convy Associates<br />

provide strategic alliance, A&E consultant,<br />

technology ecosystem, and<br />

lead generation programs to monetize<br />

relationships and accelerate demand<br />

for leading security industry manufacturers.<br />

John is the Founder and<br />

Managing Director of the Open Standards<br />

Security Alliance and the IP<br />

Security Academy, and a speaker at<br />

many global industry events. Email:<br />

John@ConvyAssociates.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!