Police Take To The Air With Connectivity

The San Diego Police Department is getting new value from its connected helicopters powered by AT&T.

The police department uses its Airborne Law Enforcement helicopter fleet to protect San Diegans as crime or other events unfold. Previously, tactical flight officers were unable to access the department’s computer-aided dispatch system that provides officers on the ground with up-to-date information about evolving incidents.

The AT&T wireless LTE network and specially-designed, highly-secure internet connectivity now lets the tactical flight officers wirelessly connect ruggedized tablets to police communications and dispatch systems while in the air.
Upon completing their mission, airborne police can use the AT&T technology to follow-up on older or overdue calls. They can handle cases that rely on visual inspection like a damaged property or vehicle report, freeing up officers on the ground to respond to other calls, according to the company’s announcement on prnewswire.com.

The new solution means more efficient use of the helicopter fleet. It also speeds and optimizes crime caseload management. 

Chief of police Shelley Zimmerman said. “Our ‘Connected Copters’ are just the latest example of how we can make our city better through technology.”

The new technology can help officers locate and track the helicopters while airborne with the solution’s integration to the helicopter’s onboard GPS. It also logs and provides post-flight mission reporting, which includes helicopter coverage trails and flight paths to use in response to citizens’ noise complaints.

“When it comes to public safety, communication is critical,” said Chris Roy, vice president, AT&T Government and Education. “With the San Diego Police Department, we saw a real opportunity to literally take our connectivity to new heights. We’re delivering the meaningful innovations they need to better serve the communities where we live and work.”

I-HLS

You Might Also Read

New App Minimising Police Violence:

Emergency Connection - Teachers And Police:

Police Using IoT To Detect Crime:

Real-life RoboCop Will Replace Human Cops By 2020:

 

« You Should Read LinkedIn's New Privacy Policy Carefully
Terrorism Prevention & Border Protection – New Face Recognition Platform »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Institute for National Security and Counterterrorism (INSCT)

Institute for National Security and Counterterrorism (INSCT)

INSCT is a center for the study of national security, international security, and counterterrorism. Research programs include New Frontiers in Science, Cyber, & Technology

Cyberlytic

Cyberlytic

Cyberlytic applies artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data.

Resilient Information Systems Security (RISS)

Resilient Information Systems Security (RISS)

RISS is a research group is in the Department of Computing at Imperial College London.

Netresec

Netresec

Netresec is an independent software vendor with focus on the network security field. We specialize in software for network forensics and analysis of network traffic.

Arkose Labs

Arkose Labs

Arkose Labs' Fraud and Abuse Platform combines Telemetry and adaptive Enforcement Challenges to break down the ROI of fraudsters and protect digital businesses.

CyCognito

CyCognito

CyCognito empowers companies to take full control over their attack surface by uncovering and eliminating the critical security risks they didn't even know existed.

Datplan

Datplan

Datplan offers a software solution that gives an overview of 8 key cyber risk areas, their threats, and risk management steps.

Snode Technologies

Snode Technologies

Snode's Guardian cybersecurity platform uses AI and machine learning to monitor, detect and proactively respond to all threats on every device within your network.

Sygnia

Sygnia

Sygnia is a cyber technology and services company, providing high-end consulting and incident response support for organizations worldwide.

Predatech

Predatech

A cyber security consultancy offering a range of services, including CREST accredited penetration testing, vulnerability assessments and certifications incl. Cyber Essentials & Cyber Essentials Plus.

RedHunt Labs

RedHunt Labs

RedHunt Labs is a premier Cybersecurity Solutions provider, offering Attack Surface Management solution 'NVADR' and Penetration Testing services.

NexGen Cyber

NexGen Cyber

NexGen Cyber helps customers in commercial SMB markets with IT security, security integration, service management, outsourced service transition, and transformative security solutions.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.

Seal Security

Seal Security

Seal Security revolutionizes software supply chain security operations, empowering organizations to automate and scale their open source vulnerability remediation and patch management.

TDi Technologies

TDi Technologies

TDI Technologies' flagship solution ConsoleWorks, is an IT/OT cybersecurity and operations platform for Privileged Access Users.

Cure53

Cure53

Cure53 offers classic black-box penetration tests (zero-knowledge) as well as white-box tests and code audits.