• Trash Teaches Us A Lesson

    What if you came into work one morning to find rotting garbage strewn about your cubicle? You may be angered and possibly confused, but you would certainly want to find the perpetrator, especially after spending hours cleaning up the mess.

    What if this continued on? Do you have the time in your work schedule to keep dealing with this madness? George Schaaf didn’t.

    Schaaf is the park and landscape superintendent for the city of Juneau, Alaska and the Juneau Empire recalls his story of how he turned to video technology to catch litterers who were trash dumping — including deer carcasses, live clams, tires, refrigerators and sofas—on the park grounds. What’s more, the entirely gross situation also turns out to be quite expensive. Schaaf estimates the city spends $10,000 a year in cleaning up and removing the garbage in staff time, equipment and dumping fees.

  • Hackers vs. IP Video Surveillance Systems Part II

    A 2011 study from the Urban Institute found that surveillance cameras can be a powerful crime deterrent, but their efficacy is largely dependent on how the surveillance system is set up and monitored.

    And what if the wrong person is monitoring a system? Wired’s Threat Report reported last week on new research indicating that several popular surveillance cameras are open to hackers. Wired’s Kim Zetter writes:

    Three of the most popular brands of closed-circuit surveillance cameras are sold with remote internet access enabled by default, and with weak password security — a classic recipe for security failure that could allow hackers to remotely tap into the video feeds, according to new research.

  • Are you a security influencer?

    There’s a new type of security officer in the security industry: the security “influencer.”

    These officers are “confident and capable” and are doing more than battling security risks, explains a new report from IBM’s Center for Applied Insights.

    Thanks to security technology, security executives are shifting from security technicians to higher-level strategic managers, according to an analysis of the report by Sci-Tech Today.

    To compile the report, IBM surveyed 138 security leaders and found that most security “influencers” automated routine processes so that they could focus more time on innovation and improving their enterprise, not only for security purposes but driving decision making for the business.

  • Identity Thieves Who Target the Dead: How Video Intelligence Can Help

    Anyone who has ever been a victim of identity theft knows how frustrating and painful the experience can be. In fact the Department of Justice warns that “criminal identity theft is usually not discovered until the victim: 

    • Fails a criminal background check;
    • Cannot renew his or her driver’s license;
    • Receives notice of outstanding citations or warrants; or
    • Is arrested"

    Talk about a rude awakening. Unfortunately identity theft is widespread in the United States; according to The New York Times, the Justice Department estimated that identity theft cost households a total of $13.3 billion in 2010 in direct financial losses.


Fatal error: Allowed memory size of 134217728 bytes exhausted (tried to allocate 2145280 bytes) in /mnt/space/www.3vr.com/sites/all/modules/browscap/import.inc on line 104