Wearable Sensor Tech For Beat Police Officers

One of the risks evolving during police operations is that when an officer is injured, the period of time until help arrives might be long and critical. A new wearable sensor technology named Automatic Injury Detection (AID) provides on the spot rescue alerts when a police officer comes under attack and can save lives.

The AID panel consists of a thin film with an ink trace that covers the area of the film. When that trace is broken by a sharp edge or bullet, AID detects the event and sends an emergency alert to a phone or radio that can forward the notification through the communication infrastructure to emergency services or backup personnel.

According to datasoft.com, the panel can be worn in the front and back, typically in the body armor carrier, in front of the ballistic panel. Each panel has two separate zones so that the system can detect injuries in all areas.

AID, which costs $150-$375 per unit is made of a light-weight, flexible polyester material and is equipped with a small sensor.

“If the officer is shot, stabbed or injured by shrapnel, the technology automatically transmits through a communications module the officer’s ID and his location,” said President of Select Engineering Services and AID co-inventor Bob Ufer.

Other active sensor capabilities include a wireless connectivity for wearables and biometric sensors, a sensor gateway for Internet of Things (IoT) and Machine-to-Machine (M2M) applications, wired/wireless communication for monitoring sensors in cameras, firearms, machines, etc.

The Montgomery County Sheriff’s Office in Virginia became the first law enforcement agency to buy it in February. Six others around the country have followed. The Charlotte County Sheriff’s Office could now become the first in the state to purchase AID.

“Our training department is researching the technology,” said Katie Heck, CCSO public information officer. “We’re always open to new things that are, you know, helping officer safety.”

I-HLS:

You Might Also Read:

US Police Make Widespread Use Of Facial Recognition Software:

Visualisation Tech Helps Police Process Complex Data:

 

« Canadian University Hit For $12m Phishing Scam
Unmanned Helicopters Launched »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CRU Data Security Group (CDSG)

CRU Data Security Group (CDSG)

CRU is a pioneer in devices for data mobility, data security, encryption, and digital investigation.

InnoSec

InnoSec

InnoSec is a software manufacturer of cyber risk management technology.

Iceberg

Iceberg

Iceberg has been established to provide companies with cyber security experts who will protect businesses from the unseen threat of cyber crime.

ThreatBook

ThreatBook

ThreatBook is dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks.

_cyel

_cyel

_cyel is introducing a new cybersecurity strategy: not a new generation of patches and firewalls, but moving target security – we take away the targets. Without replacing your existing system.

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling and Data Destruction protect the environment and your data with proven and trusted electronics recycling and data destruction services.

Curtail

Curtail

Curtail keeps businesses running by using live traffic analysis to identify defects before software goes live, and detect and isolate security threats before they impact systems.

Finnish Security & Intelligence Service (SUPO)

Finnish Security & Intelligence Service (SUPO)

The Finnish Security and Intelligence Service is a government agency tasked with combating serious threats to national security in Finland.

Pragma Strategy

Pragma Strategy

Pragma is a CREST approved global provider of cybersecurity solutions. We help organisations strengthen cyber resilience and safeguard valuable information assets with a pragmatic approach.

Guernsey

Guernsey

Guernsey provides a wide range of engineering, architecture and consulting services to multiple markets, including cybersecurity consulting and CMMC certification.

CornerStone

CornerStone

CornerStone is an award winning, independent risk, cyber and security consulting firm providing a range of Risk Management, Security Design and Implementation Management Services.

Bright Pixel Capital

Bright Pixel Capital

Bright Pixel Capital is a venture capital company with a focus on Cybersecurity, Retail Technologies, Digital Infrastructure and Emerging Technologies.

Finesse Global

Finesse Global

Finesse is a global system integration and digital business transformation company.

NetApp

NetApp

The NetApp portfolio includes intelligent cloud services, data services, and storage infrastructure that helps organizations manage applications and data everywhere across hybrid cloud environments.

The Cyber Scheme

The Cyber Scheme

The Cyber Scheme provides NCSC certified and assured assessments, training and career support for security testers & technical cyber professionals.

WillCo Tech

WillCo Tech

WillCo Tech works to enhance national security and force readiness for military and commercial enterprises with a suite of software capabilities surrounding the human element of cybersecurity.