Wearable Sensor Tech For Beat Police Officers

One of the risks evolving during police operations is that when an officer is injured, the period of time until help arrives might be long and critical. A new wearable sensor technology named Automatic Injury Detection (AID) provides on the spot rescue alerts when a police officer comes under attack and can save lives.

The AID panel consists of a thin film with an ink trace that covers the area of the film. When that trace is broken by a sharp edge or bullet, AID detects the event and sends an emergency alert to a phone or radio that can forward the notification through the communication infrastructure to emergency services or backup personnel.

According to datasoft.com, the panel can be worn in the front and back, typically in the body armor carrier, in front of the ballistic panel. Each panel has two separate zones so that the system can detect injuries in all areas.

AID, which costs $150-$375 per unit is made of a light-weight, flexible polyester material and is equipped with a small sensor.

“If the officer is shot, stabbed or injured by shrapnel, the technology automatically transmits through a communications module the officer’s ID and his location,” said President of Select Engineering Services and AID co-inventor Bob Ufer.

Other active sensor capabilities include a wireless connectivity for wearables and biometric sensors, a sensor gateway for Internet of Things (IoT) and Machine-to-Machine (M2M) applications, wired/wireless communication for monitoring sensors in cameras, firearms, machines, etc.

The Montgomery County Sheriff’s Office in Virginia became the first law enforcement agency to buy it in February. Six others around the country have followed. The Charlotte County Sheriff’s Office could now become the first in the state to purchase AID.

“Our training department is researching the technology,” said Katie Heck, CCSO public information officer. “We’re always open to new things that are, you know, helping officer safety.”

I-HLS:

You Might Also Read:

US Police Make Widespread Use Of Facial Recognition Software:

Visualisation Tech Helps Police Process Complex Data:

 

« Canadian University Hit For $12m Phishing Scam
Unmanned Helicopters Launched »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Logpoint

Logpoint

Logpoint is a creator of innovative security platforms to empower security teams in accelerating threat detection, investigation and response with a consolidated tech stack.

Federal Office For Information Security (BSI)

Federal Office For Information Security (BSI)

The BSI (Bundesamt fur Sicherheit in der Informationstechnik) is the federal cyber security agency and the chief architect of secure digitalisation in Germany.

European Cybercrime Training and Education Group (ECTEG)

European Cybercrime Training and Education Group (ECTEG)

The primary aim of ECTEG is to enhance the coordination of cybercrime training, by identifying opportunities to build the capacity of countries to combat cybercrime

PerimeterX

PerimeterX

PerimeterX is the leading provider of solutions that secure digital businesses against automated fraud and client-side attacks.

Securepoint

Securepoint

Securepoint is the market leader in the development of professional “Unified Threat Management” solutions in Germany.

Callsign

Callsign

Callsign’s mission is to seamlessly power the identification of every web, mobile and physical interaction.

Conference Index

Conference Index

Conference Index provides an indexed listing of upcoming meetings, seminars, congresses, workshops, summits and symposiums across a wide range of subjects including Cybersecurity.

24By7Security

24By7Security

24By7Security are Cybersecurity & Compliance Specialists with extensive hands on experience helping businesses build a defensive IT Infrastructure against all cyber security threats.

Valid Network

Valid Network

Valid Network DSP is blending traditional cyber security methodologies with blockchain transactions to achieve trust, internal and federated between organizations and stake holders.

Motorola Solutions

Motorola Solutions

Motorola Solutions build mission-critical services, software, video and analytics, backed by secure, resilient land mobile radio communications.

Activu

Activu

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security.

DeVry University - Cyber Security Degree

DeVry University - Cyber Security Degree

Explore the dynamic world of data protection with a hybrid or online cyber security degree specialization with DeVry's IT & Networking Bachelor's Degree.

ServerScan

ServerScan

ServerScan specializes in providing server scanning & compliance services to organizations of all types and sizes.

ECS Ethiopia

ECS Ethiopia

ECS Ethiopia provides Ethiopia’s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business.

HackersEra

HackersEra

HackersEra is a leading offensive cybersecurity service provider. We enable our clients to operate in a more secure environment efficiently and produce more value.

Secjur

Secjur

Secjur is a provider of AI-based compliance tools that aim to put compliance, data protection, information security and whistleblowing on autopilot.