FAQ

ask us
anything

  • National special security events 
  • Airports, train stations, major bus depots
  • Embassies and consulates 
  • Government and federal buildings 
  • Stadiums, venues, and convention centers 
  • Nonprofits, schools, and universities
  • Businesses, private facilities, and events
  • Military-grade technology
  • Concealed weapons detection
  • Smart-temp thermal/infrared cameras
  • AI-enhanced facial capture & behavioral analytics
  • Indoor/outdoor target tracking
  • Drone deterrence
  • Stationary and mobile installation
  • Fully-encrypted, real-time data
  • Integration with DHS

The WG System detects all devices that emit radio waves for communications, such as smartphones, flip phones, drones, computers, vehicles, corporate beacons, IoT, and RFID tags.

Wireless Guardian is compliant with all current privacy laws. Our system allows us to assess potential threats without accessing sensitive personal information. The four main components of our system follow standard privacy practices:

  • Our radar system compiles the same real-time data collected during the standard usage/operation of any Wi-Fi/Bluetooth/Beacon/RFID-enabled device.
  • The camera systems and onsite security personnel follow the same privacy protection procedures that airport and stadium security currently follow.

Target lists lawfully compile lists of individuals who may be threats to prevent them from entering a facility.

Google, Facebook, Foursquare, and Waze are companies that collect the same information as Wireless Guardian. However, WG is one of the few, if only, companies that collect and use data to actively protect individuals and public and private facilities.

The Wireless Guardian system employs advanced encryption and frequency-hop technologies to protect itself from being compromised.

We seamlessly integrate with the Department of Homeland Security (DHS) and deliver secure operations in real-time. (DHS information is never shared with the Wireless Guardian system during operations.) We use a sterile onsite terminal that is connected to a DHS server via an encrypted pipeline and load our system’s operational data into a queue processed by that server; when the server receives a “hit” from the queued data, a DHS agent in charge of the venue contacts onsite security personnel with the necessary information to respond to the threat.

This data that WG’s system generates is the property of the client or the client’s security company. The client can analyze the data on their server, cross-reference data against their historical data, or utilize external databases such as DHS to match potential security threats.

Integration with DHS means we can keep global locations safe from threats that DHS actively tracks and provide an enhanced presence at all Class A/Tier 1 events inside the United States. DHS sets the specifications for the sterile terminal, queue requirements, and response protocols.

We thoroughly train security personnel to use the Wireless Guardian system and provide additional training and operational classes as needed.

Wireless Guardian can be installed permanently or in temporary configurations, such as building tops, car roofs, etc. Additional hardware can occasionally be utilized to extend the perimeter of a permanently installed WG system.

Wireless Guardian leverages its nationwide footprint to gather unique pieces of data that together provide our customers with traceable patterns of life and situational awareness. As part of our Store-as-a-Medium offering, Wireless Guardian combines computer vision with digital demographic markers to provide our partners with an enhanced understanding of customers and visitors.

Wireless Guardian leverages Our Edge Technology Partner’s superior infrastructure to operate our devices on the Edge. Our Edge Technology Partner’s ability to provide edge computing and other services enhances our system with the ability to track customer and employee movements and behavior, observe traffic patterns, increase revenue, anticipate expenses, mitigate risks, prevent theft and violence, and monitor employee workflow, time, and access.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy. We won’t track your information when you visit our site. But in order to comply with your preferences, we’ll have to use just one tiny cookie so that you’re not asked to make this choice again.