Positioning GPS

Blog Date:  4/18/2012
Author:  Ray Coulombe

From the first time I used a Hertz GPS navigation system in lieu of a paper map on the front passenger’s seat, I have found the technology to be an almost indispensable tool. Its adoption over the last 10 years has been remarkable and, for many, a must-have feature in cars and phones. Not surprisingly, GPS has security applications — and vulnerabilities. GPS is a satellite-based navigation system made up of a network of 24 satellites circling the earth twice daily at about 12,600 miles altitude. GPS satellites transmit 50-watt signals (@ 1575.42 MHz in the UHF band for civilian use) which GPS receivers use to determine time of transmission and, using the signal speed (nearly the 186,000 miles per second speed of light), calculate a distance to each one seen. With three satellites in view, latitude and longitude (2-D) can be derived; and altitude can be calculated (3-D) when four or more satellites are visible. Many GPS units show derived information such as direction and speed, calculated from position changes.
GPS has been used in security to provide monitoring and security of people and assets. Cellular (GSM, GPRS, CDMA), satellite radio (SATCOM), text (SMS) and e-mail are commonly used to send real-time position data and, in some products, device information including system health and status and alarm information. Some manufacturers also employ short and long-range FM radio transmission. Alternatively, data may be stored on a device local to the GPS receiver for later analysis.
Applications include personnel tracking and safety, vehicle tracking, fleet management, container and trailer monitoring, taxi management, ATM tracking, school buses, oil-tank truck monitoring, police patrol management and ambulance management. An interesting variation is “geo-fencing,” where a virtual perimeter is established using coordinate information, allowing the determination of when a person or object has crossed the boundary. With the growing use of smart phones as portals, data repositories and authentication devices for security systems, techniques for locating and recovering lost or stolen devices — such as Apple’s “Find My iPhone” — take on additional importance.
Link to Complete Article as it appeared in Security Technology Executive Magazine


Resource Blogs

Most Recent Blog List for Blog Author: Ray Coulombe

Security Specifier Blog List Image for  Stay Safe! While Traveling This Summer

Stay Safe! While Traveling This Summer

It’s summer vacation time! The last thing you need to worry about it is getting your identity stolen while you’re sitting on a beach somewhere exotic. In 2016, more than 15 million Americans were victims of identity theft, up 16 percent from the previous year, according to Experian. Plus, about 33 percent of that fraud took place when people were traveling. Here’s a few tips to staying safe all summer while traveling...
read more -->

Security Specifier Blog List Image for Rethinking Cabling

Rethinking Cabling

Cat 5e became an ANSI/TIA/EIA standard in 2001, Cat 6 in 2002, and Cat 6a in 2008. However, it may be extremely useful to consider taking advantage of other existing cabling infrastructure in lieu of running new. Read more to learn how to approach cabling.
read more -->

Security Specifier Blog List Image for Off the Beaten Path at ISC West

Off the Beaten Path at ISC West

This year at ISC (the International Security Conference and Exposition), I was determined to try to see the latest iStechnologies hiding in the nooks and crannies—literally! I visited booths in the back, the basement, small kiosks hidden inside larger vendor books, and throughout the Emerging Technology Zone.

In case you missed the show, I’ll round up some of the best new technologies and companies to keep an eye on. Read more.
read more -->

Security Specifier Blog List Image for Cyber Crime Taking Down Cities

Cyber Crime Taking Down Cities

Earlier this year, in March, the City of Atlanta’s nearly 8,000 employees heard words they never thought they would hear: “It’s okay to turn your computers on.” Their computers were powered off for five days. In those five days Atlanta residents could not pay traffic tickets, water bills, or report city issues. Read how ransomware impacted this metropolitan area.
read more -->

Security Specifier Blog List Image for A Few Thoughts on K-12 School Security

A Few Thoughts on K-12 School Security

There is no one size fits all when it comes to K-12 school security. Schools vary in so many ways: size, age, local environment, affluence, culture, governance, and more. Read some helpful tips and resources that might just help your school be better prepared.
read more -->

Copyright Ⓒ 2010 SecuritySpecifiers™