Why is this ability so important?
The ability to detect the actions of a criminal before he has the ability to determine that he is under surveillance is crucial. The Law Enforcement officer now has the tactical advantage. This simple tactical advantage gives the Law Enforcement officer greater control over the criminal and his actions.
The Law Enforcement officer may continue to monitor the actions of the subject from afar, or the officer may choose to move within tactical range and pick the right time and place to intercept the criminal and his accomplices. Either way, the tactical advantage is with the officer.
For centuries, Law Enforcement officers have been forced to respond to crimes that have been committed hours or even days before their arrival on the scene. Once on the scene, the officers worked through the crime scene looking for minute clues left by the criminal.
With the advent of Remote Intrusion Detection, a Ground Scout system may be deployed at the scene of a repetitive crime with the system lying in wait for the criminal's return. Often the criminal thinks he has the tactical advantage because he has gotten away with the crime in the past. He is betting that a repeat crime at the same location will net the same results. The criminal is under the false assumption that because he can choose the best time to commit the crime, he will have no problem committing the crime for a second time.
As the criminal approaches the crime scene for a second time, perhaps months later, the Ground Scout system detects the presence of the criminal and begins the notification process. The Law Enforcement officer, while tending to other law enforcement issues, is notified via pager or cell phone of the activity in the target area and responds, initiating his surveillance. As the criminal goes about his business, the Law Enforcement officer views the activity and radios for additional officers to form a containment perimeter.
Our Remote Intrusion Detection Systems were originally designed for military and border patrol applications but are now available for law enforcement surveillance deployments. These systems are designed for deployment in areas where long term surveillance is not feasible or even possible.
Remote Intrusion Detection Systems can be broken down into the following stages of action: