Preventing The Next Active Shooter Attack

New security tools are needed to prevent the types of mass shootings that have become endemic to US culture in recent years.

With policymakers and legislators seemingly unable to find ways to limit the availability of automatic assault weapons, another way to approach the problem may be innovations in the concealed weapon detection through new technology.

With a fixed installation at a secure facility, perimeter controls require costly operator manpower and can be avoided during a dedicated assault.

Individual screening with equipment that employ millimeter bandwidth scans are slow and prone to operator errors or false-positive results along with increasing privacy concerns. Expensive and slow, increased deployment of large fixed detection equipment will inevitably shift threats to “softer” less secure targets.

Patriot One Technologies’ solution claims to be a “first-of-its-kind” Cognitive Microwave Radar, a concealed weapon detection system to combat active shooter threats before they occur.

While microwave radars have been in military service for years, they have not been widely deployed in commercial or consumer applications because of expense until now.

Designed for cost-effective deployment in weapon-restricted buildings and facilities, the Patriot One software solution and related hardware can be installed in hallways and doorways to covertly identify weapons and to alert security of an active threat entering the premises, according to oracledispatch.com.

The company partnered with researchers from Canada’s McMaster University to develop a solution that employs near field radar in a manner that addresses several requirements: Reasonably priced, small, covertly located, simple to operate, safe to health, have an intelligent yes/no decision making capability, and possess a low false alarm rate, according to their website.

I-HLS

You Might Also Read:

Scenarios For Predicting Terrorist Attacks:

Dallas Shooting: US Police Robot Kills Suspect:

 

« High Performance Face Recognition
The Most Severe Global Attacks Of 2017 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Maryville Online - Cybersecurity Program

Maryville Online - Cybersecurity Program

The Cybersecurity Program at Maryville Online is designed to help students reach opportunities in cybersecurity leadership and management through an entirely online curriculum.

CyberSecurity Malaysia

CyberSecurity Malaysia

CyberSecurity Malaysia is the national cyber security specialist agency under the Ministry of Science, Technology and Innovation (MOSTI).

Alan Boswell Group

Alan Boswell Group

We are a Group of Companies providing specialist Insurance Broking and Risk Management advice and services including Cyber Risk cover.

Rogue Wave Software

Rogue Wave Software

At Rogue Wave, our mission is to simplify your hardest problems, improve software quality and security, and shorten the time it takes to deliver value.

CybernetIQ

CybernetIQ

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one umbrella and providing organizations faster, better and more accurate cybersecurity.

Techleap.nl

Techleap.nl

Techleap.nl is a non-profit publicly funded organisation helping to quantify and accelerate the tech ecosystem of the Netherlands.

Tangible Security

Tangible Security

Tangible employs the most sophisticated cyber security tools and techniques available to protect our clients’ sensitive data, infrastructure and competitive advantage.

Immuta

Immuta

Immuta empowers data engineering and operations teams to automate data governance, security, access control & privacy protection.

Outsource Group

Outsource Group

Outsource Group is an award winning Cyber Security and IT Managed Services group working with a range of SME/Enterprise customers across the UK, Ireland and internationally.

Prelude

Prelude

Prelude offer the first autonomous platform built to attack, defend and train critical assets through continuous red-teaming.

Balance Theory

Balance Theory

Balance Theory provides the knowledge infrastructure and collaboration center for the cybersecurity community. A networked community to build better cybersecurity outcomes.

NPCERT

NPCERT

NPCERT is a team of Information Security experts formed to address the urgent need for the protection of national information and growing cybersecurity threat in Nepal.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.

Iolo

Iolo

Iolo develops patented technology and award-winning software that repairs, optimizes, and protects computers, to maximize system speed and performance while keeping them safe.

CovertSwarm

CovertSwarm

Since 2020 CovertSwarm have been radically redefining how enterprise security risks are discovered. We outpace the cyber threats faced by our clients using a constant cyber attack methodology.

Meta 1st

Meta 1st

Meta 1st are a progressive SAAS enterprise, dedicated to harnessing the power of AI to address the most critical vulnerabilities in the world of cybersecurity: the Human Layer.