Thief Identification

Node Header

Thief Identification

MAC addresses of smart phones are captured anonymously by the Node.

In case of a Robbery

  • Couple Video Surveillance with MAC addresses.
  • Law enforcement can coordinate with cell phone carriers who have customer information for each MAC address.
  • Identify suspects, victims, and witnesses.
  • Use contact information obtained from the carrier and GPS to locate each person.

Prison picture