![]() ![]() ![]() The video can be used retroactively to investigate the suspect to see if the placement of the device, as well as to manage the on-going investigation without having to be at the location. Milestone offers access to live and recorded video. Another connector is Milestone’s XProtect. It can also help locate the where the device is and the best path to get to it. If evacuation of a location is required, the floor plans give insight into the safest areas to do so. HERE Floor Plans, a mapping platform to manage indoor assets, is a connector that is beneficial in a bomb threat investigation. A useful technology is Live Earth, a real-time platform that connects multiple systems into one interactive map. The details of the threat can be very vague therefore, pertinent information can be missing that would help in resolving the threat without incident. Present: Law enforcement has to respond in a timely and organized manner because of the threat of immediate danger. Immediate response was impossible because situation evaluation is a time-consuming process when comparing information across desperate systems. Previously, there has not been a tool to combine information and give detailed support and alerts in real-time. The bomb squad is dispatched to investigate and remediate if the threat is valid. When a bomb threat is reported, there is an investigation to determine the integrity of the threat. Past: A bomb threat is a time critical crime, and police have to investigate the threat thoroughly to ensure there is no harm to the public. The search can focus on specific areas such as select activity in a particular area like a spot on a shelf or follow a suspect around the store. Now, hours of searching through a video can be reduced to minutes. If the store is aware of missing items from a certain section, then a rapid search can be performed. BriefCam technology elevates the surveillance video process by having search capabilities. Present: While both technologies are still being utilized in loss prevention today, there have been significant enhancements to video, allowing for a more accurate and faster lead. Think of it like finding a needle in the haystack (research has been done on how much is actually missed in video review). Why these methods weren’t super effective – video required a ridiculous number of man hours to review and often details were missed. The tag is disarmed during checkout, but if the merchandise is being stolen it would trigger an alarm at the exit of the store. Electronic article surveillance (EAS) tags are another deterrent that stores placed on merchandise. The recording could be used to identify shoplifters and then in a subsequent criminal case. The 1970’s introduced Closed Circuit Television (CCTV) as a form of surveillance video as one strategy to help with loss prevention. Due to this epidemic, companies are losing money and have taken steps to stop shoplifters. Over the decades, technology has been developed in an effort to deter theft and aid in loss prevention. Shoplifters report that they are caught one out 48 times they steal and are turned over to the police 50 percent of the time. Past: Shoplifting is extremely common with approximately 27 million shoplifters in our nation today. We’re going to look at three different crimes and what technologies were used to solve them in the past and present. As with many aspects of life, new technologies have positively and dramatically changed the investigation and crime solving process to make the cutting-edge technologies seen in dramas closer to being a reality. The process of solving a crime is not always an easy task (and typically doesn’t neatly wrap up at the end of the prime-time hour). ![]()
0 Comments
Leave a Reply. |