dedicated to perimeter safety and security
October 2025 Issue
TRENDS
Let’s Shoot Down the Drones
Every security manager has had the thought. The buzzing quadcopter pops up over the stadium, the warehouse yard, or the refinery fence line, and the knee-jerk instinct is: “Somebody grab the 12-gauge.”
It would be satisfying, but here’s the rub: in the United States, that drone is legally an aircraft. And blasting it out of the sky puts you in the same federal criminal category as someone trying to take down a 747. Spoiler alert: the FAA and DOJ don’t find “it was annoying” to be a strong defense.
Why We Want to Shoot Them
Drones have become the Swiss Army knife of bad actors:
- Logistics & Warehouses: Gone are the moments of threat actors sitting in a van for days. Criminals now fly recon over your lot in 90 seconds flat.
- Sports & Concerts: You bought a ticket, but the drone didn’t. They buzz in anyway, making fans nervous and the venues desperate for legislative change.
- Critical Infrastructure: Data centers, substations, refineries, and essentially every place that invested in perimeter security now has to worry about flying cameras mapping blind spots.
In worst-case scenarios, drones can carry drugs, explosives, or worse. The threat to private property from airspace intrusions is already high and growing. And shooting one down at an entertainment venue might send it dangerously into the crowd.
So no: shooting them down isn’t an option.
The laws that tie your hands:
- Title 18 of the United States Code (U.S.C.) § 32: Destroying an aircraft is a federal crime. Yes, even if it’s a $299 hobby drone with flashing LEDs.
- FCC Rules: Those cool-looking “drone jammers” on YouTube? They are illegal to sell, buy, or operate in the U.S.— unless you enjoy visits from FCC enforcement.
- The Short List: Only certain federal agencies—DHS, DOJ, DoD—under specific statutes can legally mess with drones in flight. Your facilities manager is not on that list, no matter how much they like clay pigeons.
Some Glacial Movement by Congress:
- The FAA Reauthorization Act of 2024 quietly tucked in some drone-related language, but didn’t hand stadiums or private campuses a magic “drone zapper” pass.
- The Safeguarding the Homeland from the Threats Posed by Unmanned Aircraft Systems Act (try fitting that on a PowerPoint) aimed to expand state/local authority. Note: this bill has stalled.
What Can a Private Entity Do?
-
-
- Detect, Don’t Destroy: Use RF, radar, and optical detection. Knowing the drone is there is legal but making it crash isn’t.
- Document Everything: Get screenshots, logs, and video, because the authorities will need evidence, not just “we saw it, we swear.”
- Build Standard Operating Procedures (SOPs): Treat drones like fire alarms: create a call tree, a response checklist, and a quick path to law enforcement.
- Pick the Right Partners: Companies like Dedrone, DroneShield, and Fortem are building tools designed to see, identify, and ward off drones.
-
Until the law catches up, security teams will be forced to operate with one hand tied behind their backs. The smart move? Detect, document, and escalate, while pushing for the legal clearance to fight back.
5 Questions With…
Larry Bowe – CEO, PureTech Systems
“Let Machines Do What They Do Best—So People Can Do What We Do Best.”
In an age where false alarms outnumber real incidents by thousands to one, the perimeter security industry faces an uncomfortable truth: the noise is drowning out the signal. Larry Bowe, CEO of PureTech Systems, has been engineering his way toward quiet accuracy for two decades. In this exclusive conversation with Mark McCourt, publisher of smartPerimeter.ai, Bowe explains how Deep Learning is transforming situational awareness, reducing alarm fatigue, and rewriting the economics of physical security operations.
THE BIGGER PICTURE
For Bowe, the future of perimeter protection lies in quiet confidence—systems that simply work, accurately and autonomously. But the real transformation, he says, must happen in the mindset of customers.
“Security leaders need to articulate business value, not just technical specs. They must show how precision and automation reduce risk, improve up time, and free people to focus on decisions instead of data.”
When that happens, security finally steps out of its defensive crouch and into the strategic conversation.
PureTech’s journey—from avionics-grade engineering to AI-driven situational awareness—suggests that the future isn’t just possible. It’s already here.
PURETECH BY THE NUMBERS
- Founded: 2004
- Headquarters: Phoenix, Arizona
- Core Technologies: AI-boosted geospatial computer vision analytics, autonomous perimeter detection
- Patents: 16
- Global Deployments: U.S. Border, critical infrastructure sites worldwide.
- Mission: Achieve high accuracy Autonomous perimeter protection from early warnings to non-lethal interventions.
Crime Finds a Parking Spot: Why Vehicle Storage Lots Stay in the Crosshairs

Vehicle storage lots, from dealer inventory yards, rental-car depots, auction overflow, impound/tow facilities, and fleet yards, sit at the uneasy crossroads of high-value assets, thin margins, and semi-public real estate. When things go wrong, they go wrong fast: smash-and-grab theft rings, fake-ID embezzlement, catalytic-converter stripping, after-hours parts raids, and even insider-enabled drives straight off the lot.
The Problem:
- High-Dollar Targets, Low-Friction Perimeters: Expansive acreage, dozens to thousands of keys, predictable shift changes, and clear sightlines make it easy for offenders to study response patterns and strike when coverage is thin.
- Organized Playbooks: Today’s theft crews blend old-school physical breaches like cutting the fence, hopping the gate, and drive-through tailgates, with digital exploits such as key fob cloning, VIN/plate swaps, and identity fraud at the counter.
- Blended Crime Types: It’s no longer just vehicle theft anymore. Operators face catalytic-converter stripping, parts piracy, fuel siphoning, vandalism, burglary, and even assault risks for lone employees.
27% INCREASE
Cargo Crime
Jumped in the auto and logistics ecosystem in 2024
How Big is the Problem?
After four years of rising thefts, U.S. vehicle thefts fell 17% in 2024, the steepest one-year decline in four decades. This was driven in part by anti-theft fixes on vulnerable Hyundai/Kia models. The trend held into early 2025, with the national theft rate dropping from 126.62 to 97.33 per 100,000 residents.
But the relief isn’t universal. Cargo crime across the broader auto and logistics ecosystem jumped 27% in 2024 and has stayed high into 2025, proof that organized crews don’t retire, they pivot.
Quarterly snapshots tell the story: 776 recorded incidents in Q3 2024, 787 in Q1 2025, and 884 in Q2 2025, according to CargoNet. The pressure’s still on, it’s just shifting to easier, higher-value targets, from warehouse lots to fleet and vehicle storage yards.
Operators Under Fire:
“We had criminals literally walk inside our service department and steal customers’ cars right out of service… The criminal knows no boundaries.”
— Aaron Zeigler, CEO, Zeigler Automotive Group, describing a six-month period where 76 vehicles were stolen off group lots, a ~$4M hit.
Rental fleets face their own headaches, especially when theft crosses borders. Kevin Carter, CEO of Collateral Consultants, urges operators to make sure every stolen unit gets a National Crime Information Center (NCIC) entry number fast. Without it, “stolen” isn’t official and recovery stalls. Retrievals from Mexico can run $4,500 to $7,500 in legal costs and specialized counsel.
The Hidden Front: Off-Site Fleet Yards
Not all vehicle storage risks play out in retail-facing lots. Thousands of off-site storage yards across the U.S. hold fleet vehicles that sit unattended after hours: yellow school buses parked overnight, landscaping trailers stacked with power tools, plumbing vans with expensive copper and fittings, HVAC trucks loaded with specialized equipment, and local delivery fleets idling until the next morning’s routes.
After-Hours Crime Patterns:
- Fuel Thefts and Siphoning: Organized crews and opportunists drain tanks or cut filler necks.
- Parts and Tools: Catalytic converters, batteries, copper coils, power tools, and ladders are easy grabs when a lot is breached.
- Vandalism and Joyriding: School districts in particular have seen buses stolen for one-off rides, often returned with body damage and repair bills.
- Property Damage as Entry Tactic: Chain-link fences cut, gates rammed, locks pried on storage sheds or toolboxes.
Arson and Sabotage: In some cases, disgruntled employees or vandals target service fleets to inflict reputational and financial harm.
Lessons from the Yard
“We learned the hard way after losing three landscaping trucks in one night. They didn’t just take the vehicles, they took every mower, trimmer, and blower. That’s a week of lost work for six crews. Now, we treat the yard like a warehouse: hardened fence, cameras, and GPS trackers on every truck.”
“Our school buses are critical infrastructure. A stolen bus isn’t just property loss—it’s 50 kids with no way to get to school. We upgraded to video-verified alarms and fenced layover lots, and we work closely with our sheriff’s office.”
The Playbook: How Operators Win Back the Lot
There’s no silver bullet—just layered defense, measured in minutes saved and losses avoided. For dealerships, rentals, and off-site fleet yards, the fundamentals are the same. What changes is where you apply the pressure: open-hour vs. after-hours vulnerabilities.
Objective: Reduce theft attempts, shrink average loss per incident, and cut time-to-recovery from hours/days to single-digit minutes.
- Risk Map (first 30 days): Define your zones: public, staff, inventory. Audit fence lines, blind spots, and lighting. Map key workflows and nighttime activity patterns.
- Controls (60–120 days):
- Perimeter: Alarmed fences and PTZ/thermal cameras at chokepoints.
- Lanes: LPR at entries and exits tied to dispatch or gate-release rules.
- Keys: Dual-authorization cabinets with a full audit trail. Missing-key SLA in minutes, not hours.
- Tracking: GPS on high-value/high-risk vehicles with geofences and exception alerts.
- Remote Guarding: Talk-downs, strobes, scripted escalation.
- People & Process: Rotate duty officers. Keep a 24/7 escalation tree. Standardize NCIC reporting. Train staff to spot counterfeit IDs and enforce rental/test-drive Standard Operating Procedures (SOPs).
- Proof & Review: Track what matters in monthly metrics—attempts detected, verified, or interdicted. Watch response time averages, NCIC timestamps, recovery rates, and claim outcomes.
- Carrier & Police Department (PD) Alignment: Invite insurers and local PD for a night walkthrough. Exchange contact cards. Define what “good evidence” looks like, i.e., clear clips, plate hits, tracker pings.
Theft may be trending down on paper, but not on the lot. Storage yards remain target-rich and time-critical environments where a few minutes decide everything.
Either you build that reflex, or you keep bleeding margin.
What about you?
Operators, integrators, fleet managers: What are you seeing on the ground? Are the crews pivoting, or just getting bolder? Let us know.
Intermodal Cargo Theft Is Rising: Learn How Smart Yards Are Strengthening Security
As thefts at rail yards and container depots rise, intermodal operators are rethinking perimeter protection with AI-driven video, multi-sensor detection, and remote monitoring centers.
Across the U.S, intermodal cargo theft is escalating at a troubling pace. In 2024, industry data estimated more than 65,000 thefts from U.S. rail-freight operations, a roughly 40% increase over the previous year. The Association of American Railroads reported that Class I railroads collectively loss more than $100 million to stolen goods, damage, and related delays in 2024. And one supply chain risk firm projects overall U.S. cargo theft incidents could climb another 22% in 2025 as organized crime expands inland from coastal hubs.
Much of this surge occurs during the quiet moments of freight operations, when loaded containers sit stationary in rail yards, switching terminals, or depots. These expansive, multi-acre intermodal hubs, like BNSF’s Hobart Intermodal Facility near Los Angeles and the CenterPoint Intermodal Center southwest of Chicago, illustrate the scale and complexity of environments where cargo must remain secure amid constant movement.
How are smart yards fighting back against the threat?
$100 Million
Class I Railroads
Loss in 2024 to stolen goods, damage and related delays.

The New Perimeter Reality
To meet this rising threat, intermodal facilities are shifting from conventional perimeter guards, fences, and security cameras toward more layered, intelligence-based strategies. Video systems with embedded analytics, thermal sensors, and radar are being deployed to provide real-time awareness across open-air yards.
“Intermodal operators are deploying video platforms that escalate response automatically, starting with AI-driven detection and advancing to operator-assisted intervention,” says Brent Gable, Vice President of Business Development at OpenEye. “Live remote monitoring is becoming a game changer, allowing operators to deter behavior with pre-recorded audio messages, automated lighting, or two-way audio warnings to stop a crime before it happens.”
Gable also notes that many facilities now use multi-sensor configurations combining PTZ, thermal, and radar technologies to automatically detect and track activity across large, complex sites.
These systems apply analytics such as people and vehicle detection, license plate recognition, and loitering detection to filter out false alarms and focus operator attention on actual threats. The result is faster verification, quicker dispatch, and a more proactive perimeter—one that blends automation with human insight to prevent loss before it occurs.
Expansive Yards Demand Multi-Sensor Detection
Across intermodal and rail logistics hubs, multi-sensor detection is evolving from a technology add-on into a core operational layer. Video analytics now interact directly with other systems, using software-based macros within the video management platform to trigger deterrence the moment an anomaly is detected. This includes activating perimeter lighting, speakers, or other localized responses that can be implemented remotely and instantly.
“Many organizations are also employing VMS integrations that extend beyond security, automating truck check-ins, recording container IDs, and syncing with yard management software to track shipments and improve operational flow,” says Gable.
This convergence of logistics and security data gives operators a more complete view of yard activity, like who’s on-site, where cargo is positioned, and when irregular patterns emerge. It’s a shift that goes beyond monitoring incidents to understanding how operational inefficiencies can create openings for theft or delay.
As Gable notes, the advantage isn’t just expanded coverage, it’s smarter filtering. By combining analytics with radar and thermal sensors, AI can distinguish routine movement from real threats and stream live video only when an actionable event occurs. That precision reduces false alarms and ensures operators focus attention where it’s needed most.
From Presence-Driven to Intelligence-Driven
Perhaps the most significant transformation underway is the move from guard-centric protection to remote, intelligence-driven monitoring. Instead of walking miles of fencing with a flashlight and radio, security personnel are now supported by interactive monitoring centers where specialized operators oversee multiple sites in real time and follow detailed escalation procedures.
“The biggest shift we’re seeing is from traditional on-site guards to centralized monitoring centers staffed by trained specialists,” says Gable. “Video itself is becoming the alarm system, replacing conventional intrusion panels and allowing operators to arm or disarm systems virtually through the VMS.”
This evolution represents more than a staffing change. Instead, it’s reshaping how perimeter security is managed. Rather than relying on continuous manual observation, AI analytics now filter massive data streams and apply rules that define and identify real threats. A person lingering near a restricted area for several minutes, a vehicle idling after hours, or motion detected along a fence line can all trigger precise alerts without overwhelming operators with false alarms.
That focus on actionable intelligence is already reshaping outcomes. At one retail chain, thieves repeatedly targeted high-value outdoor equipment (lawn tractors and snow blowers) secured by monitored anti-theft cables. Knowing that rural law enforcement could take 20 to 30 minutes to respond, they staged trailers nearby and hit multiple stores using the same tactic. After radar detection was added to monitor vehicle movement into restricted zones after hours, operators could alert law enforcement earlier and stop the pattern of theft before it spread further.
Toward Smarter, More Autonomous Perimeters
Interactive monitoring continues to grow rapidly, and costs are trending downward as cloud-based systems mature. In the next five to seven years, Gable believes AI will analyze a far greater share of video in real time and make more autonomous decisions about actionable threats, helping multi-site operations like intermodal yards detect and deter with precision.

Intermodal cargo theft is no longer simply a logistics nuisance. Today, it poses a systemic risk to the nation’s freight network. With thousands of containers sitting idle every day, operators are realizing that the challenge isn’t simply locking down perimeters, it’s about intelligent visibility with instant deterrence to act swiftly. Across the industry, a new formula is taking hold: data, detection, and deterrence. By layering sensors, analytics, and integrated video intelligence, intermodal operators are transforming passive surveillance into proactive protection.
In an environment where every minute counts, the smartest yards will be the safest.
For a closer look at how access points are being redefined, explore this month’s feature, “The Gate Reimagined: Where Security and Motion Converge.” It examines how smart gates are joining sensors, analytics, and video platforms to create a fully layered perimeter.
By editor Heather Martin with insights from Brent Gable, Vice President of Business Development at OpenEye.
The Gate Reimagined: Where Security and Motion Converge
The modern gate does more than move. It senses, verifies, and defends, turning the most visible point of access into an active layer of perimeter intelligence.
A gate used to be a simple mechanism. It opened when commanded, closed when forced, and stood silent the rest of the time. But the perimeter has changed. As cargo theft and facility intrusions accelerate, the gate has become a frontline decision point between business continuity and exposure.
CargoNet’s statistics are alarming. Cargo theft across the U.S. and Canada surged to 3,625 incidents in 2024—a 27% increase over 2023—with an average loss of $202,364 per event. The trend shows no sign of slowing: after a brief dip early in 2025, second-quarter thefts rose 13% year-over-year, signaling that organized crime is finding new opportunities at the edge. These incidents rarely start with a cyberattack. More often, they begin with something far simpler: a cut fence, a tailgated entry, or a gate that didn’t detect movement.
That shift is redefining the role of gates in modern security. Once seen as mechanical infrastructure, they’re now becoming intelligent systems, built to sense intrusion, manage access, and maintain uptime through any disruption.
The New Layered Perimeter
Traditional gates managed flow. Smart Gates manage risk. They integrate sensors, analytics, and deterrence into a coordinated system that detects, verifies, and reacts in real time, transforming motion into intelligence.
The Movement Layer: Mechanical Control
Precision and durability still form the foundation, but the motor and controller are now part of the network. Some DoorKing gate operator models connect to access control systems via Gate Tracker™ technology and compatible expansion boards, transmitting operator data such as cycle counts, obstructions, or forced-entry attempts. What was once a simple motion command is now an integrated part of the facility’s access record.
The Sensing Layer: Structural Awareness
The gate’s frame has become a live surface. Cochrane Global’s anti-climb fencing demonstrates how physical barriers are becoming sensor-ready, designed with reinforced mesh, rigid frames, and pathways for detection cables. Those same design principles are now informing the gate systems that connect movement to sensing at the perimeter’s edge.
The Uptime Layer: Deterrence and Continuity
Power is now part of the security strategy. AMAROK’s monitored electric deterrent systems use solar panels and battery backup so that during grid outages, voltage and detection remain active. These are systems that don’t “go dark.” They maintain alert status long after power is lost. In industries such as logistics and recycling, where theft and downtime are especially costly, that continuity becomes a critical deterrent.
The Decision Layer: System Orchestration
Smart gates no longer operate in isolation. They are increasingly connected to video-management, PSIM and access-control platforms, forming part of a broader security ecosystem. When a gate intrusion or tailgate is detected, integrated systems can respond: cameras may automatically pan toward the event, lights may engage, access credentials may be locked, and alerts may be routed to the Security Operations Center (SOC) within seconds. In short, the system does more than move, it begins to reason.
The New Intelligence of Entry
Smart gates now balance the demands of safety, security, and speed.
They separate safety logic from security logic.
Modern gate systems are designed to meet UL 325 and ASTM F2200 safety standards, using loop detectors, photo-eyes, and sensing edges to protect people and vehicles, while integrated analytics and access-control software decide who passes and when. A single lane can shift from open access to lockdown based on schedule, credential type, or threat condition.
They make the gate a sensor, not just an actuator.
When equipped with perimeter-detection technologies, such as fiber optic or accelerometer-based sensors, magnetic contacts, or detection lines, the barrier becomes a data point in the security network. Some advanced systems can locate climbing, cutting or vibration events with meter-level accuracy, and use signal processing to distinguish them from noise caused by weather or traffic. That level of precision provides operators with real-time situational awareness rather than relying on post-event guesswork. (IDS/Senstar)
They reconcile speed with scrutiny.
At the perimeter, the gate becomes the point where digital authorization meets physical movement. High-throughput facilities can now use License Plate Recognition (LPR), driver ID verification, and digital pre-registration to keep cargo moving efficiently, while analytics monitor for anomalies (i.e., close-follow entries, duplicate credentials, or off-schedule arrivals). With this level of automation, a gate that clears hundreds of trucks by day can still pivot to stop a single bad actor at night.
Designing a Gate That Thinks
Designing a gate isn’t just about hardware anymore; it’s about intelligence at the perimeter. The following design principles define what separates a smart gate from a moving barrier.
Your Next Layer of Awareness
The gate has become more than a barrier. It’s now a sensor, a decision point, and a signal of system evolution. When intelligence, power resilience, and integration converge at the perimeter, the result isn’t just a smarter fence line. It’s now a facility that can detect and act ahead of the threat.
DFW Airport Strengthens Perimeter Security with SAFR Facial Recognition
A major U.S. transportation hub takes a bold step toward integrated, AI-powered perimeter protection using facial recognition and seamless VMS connectivity.

At Dallas Fort Worth International Airport (DFW), one of the busiest airports in North America, maintaining secure access for thousands of employees, contractors, and vehicles is a daily challenge. Over time, the airport’s legacy biometric access control system struggled to keep pace, creating operational bottlenecks and leaving critical areas harder to secure.
“The legacy system at DFW Airport presented significant operational challenges,” explained Hari Gunturu, Operations Manager at Convergint Technologies. “Their badge technology was locked into proprietary access control readers, creating a closed ecosystem that prevented integration with any third-party systems.”
The outdated system created significant inefficiencies, requiring employees to visit multiple stations to complete badge encoding and facial enrollment in separate systems. Even more problematic, the legacy biometric technology couldn’t function outdoors, leaving critical security gaps across airfield and terminal perimeters. SAFR’s weather-resistant facial recognition technology closed those gaps, delivering seamless performance in all environments.
Improving Security at DFW: Discovery and Rigorous Testing
After discovering SAFR at the GSX conference, DFW initiated a six-month evaluation to test real-world performance, integration flexibility, and durability across indoor and perimeter access points.
“We deployed test devices at the airport,” Gunturu recounted. “SAFR was willing to undergo an extensive six-month testing period, showing their commitment to delivering a solution that truly met the unique security needs at DFW.”
This testing period allowed the team to verify SAFR’s performance in the challenging Texas climate, with trials in temperatures exceeding 120 degrees Fahrenheit. When winter arrived, SAFR devices performed well even when covered in ice. The team also simulated rain to ensure reliability in all weather conditions.
The successful pilot quickly expanded into a comprehensive implementation. Today, over 30 SAFR devices secure critical employee portals, vehicle gates, and perimeter access points, fully integrated with the airport’s Lenel access control system.
One of the most visible implementations is at the employee portals, part of DFW’s multilayered perimeter defense, providing quick, secure access for authorized personnel after screening.
Delivering ROI: Transformative Features and Flexibility
What sets the SAFR implementation apart is its remarkable flexibility and comprehensive feature set. Unlike the previous system, which had rigid authentication workflows, SAFR allows customization at each access point.
“We’re able to configure it for face only or face and card, or face, card, and keypad,” Gunturu explained. “The keypad wasn’t initially part of SAFR’s offering, but they swiftly added this capability once they recognized its widespread applicability.”
This responsiveness to DFW’s needs extended beyond feature development. The SAFR team created custom workflows to address the airport’s unique badge encryption challenges and developed an auto-enrollment solution that eliminated the need to bring all employees back to the badge office. Plus, the system’s sophisticated liveness detection technology ensures that only real people, not photos or masks, can authenticate, providing an additional layer of security against spoofing attempts.
“With the new system, we avoided the hassle of bringing the entire airport staff back to the badge office,” noted Gunturu. “Instead, employees just walk through the employee portal during their normal workday, and on their first pass, the system recognizes their face and automatically enrolls their card information.”
“SAFR’s zero-effort enrollment represents a true breakthrough for airport security operations,” explained John Cassise, Chief Product Officer at SAFR. “By leveraging existing credential images and eliminating redundant processes, we’ve created a solution that delivers immediate ROI through streamlined operations. Airports no longer need to manage separate stations for badge printing, encoding, and biometric enrollment. Our integrated approach eliminates these inefficiencies while enhancing security.”
Seamless VMS Integration Delivers Real-Time Analytics
Beyond performance and flexibility, the SAFR solution delivered significant cost advantages. The device costs were approximately half of the previous solution, with no per-user licensing fees for cardholder capacity with 100,000 users included. Each device comes with multiple built-in features including an RTSP camera feed for integration with the airport’s Video Management System (VMS), an intercom, tailgating detection, and enhanced nighttime capabilities.
“SAFR comes with advanced facial recognition capability and cameras that provide RTSP feeds directly to your VMS system,” says Gunturu. “That’s a significant advantage we haven’t found in other biometric solutions on the market.”
This integration with the VMS has proven invaluable for security investigations. When employees report access issues, security personnel can correlate events in the SAFR system with video recordings to determine whether the problem was device-related or user error. Additionally, the SAFR cameras provide clear facial images at optimal height and angle, addressing a gap in the airport’s existing surveillance coverage.
DFW has also implemented SAFR’s mobile application, enabling users to verify credentials in the field using their smartphones. This capability has proven particularly valuable for authenticating personnel in restricted areas of the airfield perimeter.
Excellent User Experience
Most telling is the positive reception from employees using the system. Gunturu shares that they’ve captured images of surprised faces when employees realize the gate has opened without them needing to present their badges.
“By the time they’re trying to get their card out, the gate opens. They’re like, ‘What happened?'” he recalled. “It was pretty cool for us to see. We captured those reactions and were able to share those internally.”
This seamless user experience has facilitated the widespread adoption of the system across the airport, representing a significant achievement given the challenges of transitioning security infrastructure in a busy operational airport.
“Replacing an existing security system across an entire airport is incredibly challenging, especially when it was only recently deployed,” noted Gunturu. “SAFR’s ability to implement a complete replacement so quickly is a testament to both their exceptional support and the seamless integration capabilities of their solution.”
A New Era of Biometric Security at DFW
With the successful implementation at key access points, DFW continues to expand its use of SAFR technology across the airport. The solution has effectively addressed previous limitations while delivering additional benefits through enhanced features, improved user experience, and cost savings.
For Gunturu and the DFW team, the partnership with SAFR has transformed what began as a challenging security problem into an opportunity to enhance the airport’s overall operations. As Gunturu said, “The system performs flawlessly, day in and day out.”
In an industry where reliability and security are critical, those words represent the highest praise for a system now protecting one of North America’s busiest air transportation hubs.
Learn more about airport identity solutions here.
EVENTS
NEW Perimeter Track at ISC East!
smartPerimeter.ai is proud to sponsor the new Perimeter Education Track at ISC East. You’re invited to join two dynamic sessions featuring top industry experts and forward-thinking strategies in perimeter protection.
Risk Intelligence is Driving Security Strategy with Proven ROI
Wednesday, Nov 19th, 10:30 AM – 11:15 AM
Learn actionable insights into the vital role of risk intelligence in designing effective perimeter security solutions. The session will explore how risk metrics drive smarter decision-making, strengthen collaboration with technology partners, and demonstrate measurable business outcomes.

Modernizing Perimeter Security: Leveraging Robotics as a Force Multiplier in a Constrained Labor Market
Wednesday, Nov 19th, 1:00 PM – 1:45 PM
This session will cover practical strategies for integrating robotic patrols—both ground and aerial—into existing security programs. Learn how organizations are approaching change management, and the impact of robotics-as-a-service models on operational effectiveness. Attendees will leave with a strategic framework for evaluating robotic solutions, understanding deployment requirements, and taking the first steps toward modernizing their perimeter security posture.

Illinois’ BIPA Is A Legal & Privacy Reality Check: Don’t Ignore the Law
As AID2entry technology advances, regulation is lagging, but critical. In the U.S., biometric use is governed not by a single federal law but by a patchwork of state statutes. The most influential is Illinois’ Biometric Information Privacy Act (BIPA), enacted in 2008.
BIPA requires:
- Consent: Written or electronic notice and release before collection.
- Retention: Destroy data after its purpose ends or within three years of last use.
- No Profit/Limited Sharing: Selling or profiting from biometric data is forbidden.
- Security Standards: Protect biometric data like financial data.
- Private Right of Action: Individuals can sue for $1,000 (negligent) or $5,000 (reckless) per person, per violation.
BIPA is unique. It’s the only law worldwide with a private right of action, which has driven thousands of lawsuits. There is no cure period, no “safe harbor,” and little guidance—organizations are expected to comply on their own.
High-profile cases illustrate the risk:
- Facebook (2020): $650M settlement over facial recognition; later sued under Texas’ biometric law for $1.4B.
- BNSF Railway (2022): $228M verdict for fingerprinting truck drivers without consent (settled for $75M).
- White Castle (2023): Exposure of up to $17B in a timeclock case, settled for $9.4M.
The message is clear: biometric compliance failures scale quickly into multi-million-dollar liabilities.
For more information on BIPA, visit www.bipabuzz.com
Why BIPA Matters at the Fence
BIPA lawsuits don’t discriminate. Amusement parks, tanning salons, nursing homes, pizza chains, and manufacturers have all faced penalties. Settlements range from $1 to $10 million, with more than 2,000 cases filed in Illinois courts.
Many companies were (or still are) “caught in a BIPA trap.” They installed biometric systems—often just to prevent “buddy punching”—without understanding the compliance requirements or penalties.
At the perimeter, the same risks apply.
- Timeclocks = Access Gates: A fingerprint scanner for attendance is legally no different than a biometric gate reader.
- Consent Failures Trigger Lawsuits: The issue isn’t adding AID2entry technology—it’s missing notice, release, or retention policy.
- Exposure Scales Fast: One scanner processing 5,000 workers a year can balloon into millions in liability.
Golden rule: if you can’t protect it, don’t collect it. Compliance is continuous, not one-and-done. Best practices include:
- Publish Policy: Be clear on what you collect, why, and for how long.
- Minimize Data: Use templates over images and purge regularly.
- Get Consent: Digital or paper with non-biometric alternatives.
- Automate Retention: Delete by design, not by discretion.
- Audit Regularly: Courts demand proof, not intent.
BIPA lawsuits have cost organizations from Facebook ($650M) to White Castle ($9.4M). For every new deployment, the rule is simple: if you can’t protect it, don’t collect it.
The future is promising.
Innovative approaches like privacy-by-design, decentralized identity, and reusable identity are moving from theory to practice, showing up across industries worldwide. Imagine a future where the convenience of Clear or TSA PreCheck extends beyond airports, empowering you to access workplaces, services, and even entertainment securely and seamlessly, “using you as the credential.” And, ideally, it will even be BIPA compliant.
By Doug OGorden
*Consult a security consultant or legal counsel before installing any new technology.
NEWS FROM THE EDGE
Milestone Strengthens Cloud and Intelligence Across XProtect and Arcules

Milestone Systems unveiled major upgrades to XProtect 2025 R3 and the Arcules cloud platform, enhancing proactive monitoring, multi-camera investigation, and unified management. XProtect Remote Manager now offers real-time system health visibility, role-based access control, and event-driven alerts to reduce downtime and site visits. Arcules adds multi-camera forensic search, dual-layer motion detection, and secure external case sharing, advancing cloud reliability and investigative speed across hybrid deployments. Read the full release here.
NYC Launches First ‘Direct-to-First Responder’ School Emergency System

New York City has partnered with SOS Technologies to deploy the nation’s first Emergency Alert System (EAS) linking public schools directly to 911 dispatch. The platform enables instant communication with NYPD, FDNY, and EMS, cutting notification times from minutes to seconds. The pilot debuted at Brooklyn’s Spring Creek campus and will expand to 25 school buildings, representing 51 public schools across all five boroughs during the 2025–2026 school year. Read the press release here.
ONVIF to End Support for Profile S; Promotes Profile T as Successor

ONVIF announced it will end support for its long-standing Profile S, first introduced in 2011, citing outdated authentication mechanisms that no longer align with modern cybersecurity standards. The organization recommends transitioning to Profile T, which offers enhanced video streaming features and stronger security through TLS/HTTPS support. The June 2026 conformance test tools will be the last to certify Profile S products. ONVIF urges integrators and end users to follow updated security best practices and adopt Profile T for ongoing interoperability and protection. Read more here.
Ambient.ai to Unveil “An Intelligence Unlike Any Before” in November 19 Online Keynote

Ambient.ai will host a global keynote on November 19, unveiling what it calls a breakthrough in purpose-built AI for physical security. The virtual event promises to demonstrate a new level of context-driven adaptability and situational awareness, transforming how operators interact with their environments.
Teasers show real-time responses from a surveillance camera system to prompts like “notify me when any delivery truck arrives” and “alert when the service door is open,” hinting at a next-generation platform where users can query security cameras directly. Registration is open at ambient.ai/events.
PRODUCT / COMPANY SHOWCASE
The Altronix NetWaySP4TCW53 is a 4-port hardened PoE switch in a NEMA 4/4X, IP66-11 rated enclosure, delivering up to 60W per port (240W total). Equipped with the EBC48 rapid battery charger, it ensures 24/7 uptime by leveraging lighting circuits with seamless battery backup. Embedded LINQ™ Technology enables remote monitoring, control, and diagnostics. Visit Altronix at GSX Booth 2115 to see it in action.
AMAROK is a full-perimeter security company that provides commercial security services. Specializing in solar-powered electric fencing and perimeter security systems for commercial properties, AMAROK also provides supplemental surveillance solutions, including cameras, and alarms. Together, these business security services form the ultimate crime prevention solution for any business.
Asylon Robotics: Humans + Robots + AI = Security Redefined
Asylon Robotics is redefining perimeter security by combining humans, robotics, and AI. Through autonomous ground robots (DroneDog™), FAA-compliant aerial systems (Guardian™), and a 24/7 Robotic Security Operations Center, Asylon delivers scalable, cost-effective protection. Their turnkey service enhances coverage, fills the security labor gap, and provides real-time monitoring across critical infrastructure. With 260,000+ missions completed, industry leaders trust Asylon to modernize and strengthen perimeter defense. Visit www.AsylonRobotics.com to learn more.
The Dortronics CleanWave Touchless Switch provides reliable, hands-free operation with a simple wave. Using advanced microwave sensor technology, it ensures high detection accuracy with an adjustable range of 4–24 inches. Designed for sanitary environments, it features a gasketed faceplate, IP54 rating, and selectable output hold times (0.5–30 seconds). Ideal for cleanrooms, healthcare, biolabs, and food processing, CleanWave withstands harsh conditions indoors and outdoors. It seamlessly integrates with electronic locks, automatic door openers, and access systems, offering a durable, hygienic solution for modern access control in demanding settings.
Magnasphere revolutionized door protection with the first major advancement since the 1930s reed switch. Its patented, award-winning technology sets new standards for high-security performance and offers a more reliable, cost-effective alternative to traditional reed switches. Magnasphere Motion, powered by Inxpect radar, eliminates false alarms, while its motion-sensing platform, panic switch, and anti-climb fence system deliver advanced, connected security solutions for modern protection needs.
PureActiv® is an Autonomous Perimeter Protection Software featuring patented Geospatial AI-Boosted Video Analytics. It enhances security by using advanced machine learning to reduce false alarms from sensors and cameras while integrating seamlessly with existing systems. PureActiv® provides real-time intruder tracking, automated detection, and geospatial visualization for superior situational awareness. Its extended detection range cuts infrastructure costs by up to 30% and supports flexible deployment across edge, server, and cloud environments.










Improving Security at DFW: Discovery and Rigorous Testing












