• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2022

MISSION CRITICAL MOBILE LOCATION TECHNOLOGY

January 26, 2011 by

GLOBAL MOMENTUM FOR MISSION CRITICAL MOBILE LOCATION TECHNOLOGY
By Brian Varano, Director of Marketing, TruePosition

There are currently more than five billion mobile connections around the world. The mobile phone began as a communications device – as simple means to connect people through voice calls and SMS messaging. The success of mobile communications stems from the sheer convenience, flexibility, freedom and productivity enhancements that mobility offers. The capabilities of mobile devices continue to evolve as they become more and more integral to our everyday lives.

Mobile devices have been a runaway success and added significant value to the lives of billions of people. Despite this, we must also acknowledge that over the past few years mobile communications have been used by the criminal underworld to plan and execute illegal activity. The freedom and convenience of the mobile device is being used by radical groups including political extremists, smugglers, terrorists, kidnappers and drug dealers to conduct illegal activity, often causing substantial harm to innocent people.

Mission critical mobile location technology – a valuable weapon in itself

Over the past few years, terrorist attacks in global cities including Madrid and Mumbai were coordinated by perpetrators using mobile phones. In the case of Madrid, the devices were used as detonators for improvised explosive devices (IEDs). While call detail records (CDRs) can be used by police and security agencies to investigate mobile usage patterns, traced to specific users, they can only go so far. One significant drawback that these organisations face is the inability to specify the exact location of certain mobile phones at any one time and their vicinity to other suspicious devices.

With the arrival of mission critical mobile location technology, the capability to extract this information now exists. Determining the location of specific, suspicious devices and their interaction with other phones has the potential to radically improve the rates of success. This type of technology can identify the numbers of devices used to detonate explosive devices, provide valuable insight in to attack planning as well as provide intelligence on the groups of people linked to incidents through communication patterns. Many of the answers lie in analysing data that exists in the mobile network.

The information is in the network

The behaviour of criminals and their associates can be closely scrutinised by analysing location information and data available through their mobile phones and usage patterns. This includes not only the behaviour of specific individuals, but also those people they come in to contact with. Location technology within the mobile network can identify and provide law enforcement officials with data regarding who suspicious individuals are speaking with, who they send messages to, even identify when mobile devices are switched on or off. This information is then tracked against key identifiers including the mobile phone being used, the SIM card identifier, and the user’s phone number. This technique ensures that a mobile phone can be tracked effectively even if the SIM card is switched to multiple phones, which is a common practice in the planning and execution of illegal activity.

By combining this data, law enforcement officials can build detailed intelligence models and generate insightful profiles on the behavioural patterns of suspects. This data can then be further mined to reveal specific behaviours and conditions. For instance, they can search mobile call traffic patterns and associations, location proximity of multiple devices or to events and ascertain location behaviour over time.

High accuracy is paramount

Mobile phone location technology is not a new phenomenon. Consumer applications such as Four Square and Google Maps are commonplace on many of the latest smartphones. Other mobile local search applicati

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • InVeris
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • DSEi
  • Atkins
  • IEE
  • EXFOR logo
  • KME logo
Hilux DVD2022 GlobalMilSat

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    July 1, 2022
    Read more
  • VETERANS UPDATE

    July 1, 2022
    Read more
  • MANAGEMENT ON THE MOVE

    July 1, 2022
    Read more

Copyright BATTLESPACE Publications © 2002–2022.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT