Copper Theft vs. The Videofied ® Video Intrusion System

  • By lemaster
  • 27 Apr, 2016

According to FBI crime statistics, and recently reported on CNBC“Stopping copper theft becomes big-time business”

CNBC, Published: Monday, 12 Aug 2013

“Copper theft is costing businesses in the U.S. some $1 billion a year —mostly through the destruction of property that thieves strip of the metal. But now a growing industry is rising up to stop them. The FBI has said copper theft is threatening U.S. critical infrastructure—electrical substations, cellular towers, telephone land lines, railroads, water wells, construction sites, and even vacant homes.”

To combat this growing crime wave, Security Technology of South Texas, partnered with Videofied Security, are implementing this unique “video verification” intrusion system throughout south Texas. President of Videofied, Keith Jentoft, says “our products are used on cell phone towers, power substations, construction sites, anywhere there’s copper tubing or wiring”.   Videofied is the recognized world leader in video verification security, has operations throughout Europe and North America, and has been in business since 2000.

The three most important features of Videofied that makes it truly unique in the marketplace are:

  •  It uses motion detection and cameras integrated together to the central monitoring center can “see” what activated the system. Because the alarm is “verified”, the police response time is typically much faster than conventional security systems because the alarm event is dispatched as a confirmed “burglars in action” call.
  • Videofied is 100% wireless and weatherproof. The motion/camera sensors can be placed virtually anywhere within a specified distance from the main control panel and are made to work outside, making the system much more affordable to install than conventional camera systems which require expensive wiring.
  • Videofied does not require power, phone line or an internet connection to work. Because the system works on a supervised internal power system and communicates the video alarms via an integrated cellular system, it can be installed in the most difficult of environments, making it ideal for protecting fenced lots, construction sites, or anywhere that traditional security options are not feasible.

To learn more about Videofied and to see some actual videos of criminals being caught red-handed, go to

  Remote Video Surveillance and the South Texas Oilfield   Security Technology of South Texas, Inc. Secures Seguin Independent School District  
By proadAccountId-378954 07 Oct, 2017

Recently, Security Technology of South Texas Inc, installed a video surveillance for a local Home Owners Association that had been experiencing problems with people hitting the security gates at their community. We installed a Geovision IP video system with megapixel cameras and special license plate recognition cameras to capture the front and rear plate of every vehicle entering and exiting the property at multiple gates. Using remote cellular telemetry provided by Security Technology of South Texas the entire system is connected to the Internet and the customer can view all activity through the gates and identify unauthorized entries as well as “tailgaters” and vandalism at the gate.


Such was the case last week. At about 2:00AM  a vehicle pulled up to the gate and crashes through, causing thousands of dollars in damage. The customer easily retrieved the high quality overview video of the event along with the license plate information, and within a couple of hours a DMV (Department of Motor Vehicles) search was performed by the Sherriff’s department, and the intruder was apprehended shortly thereafter.


After the intruder was apprehended, the customer called us and said that the security system had basically just paid for itself.


If you would like more information on our “Connected Video System” for your gated entry, please contact Richard Youngman at Security Technology of South Texas, Inc. 210-446-4863 .

By proadAccountId-378954 12 Sep, 2017

 The use of drones for surveillance is no longer confined to the pages and scripts of sci-fi stories. While it is true that we have been using sophisticated camera systems combined with flight to spy across the Ocean at least since the development of the U2 program during the Cold War, it is the addition of modern “IOT” style tech to this equation that has opened the possibility for open (or closed) networks of semi-autonomous security devices to be used in securing important locations.

 The advent of the "smart-phone", for instance, brought with it some pretty serious improvements to the types of technologies you might want to strap to a drone. Global Positioning, high-efficiency LI-ion batteries, megapixel IP cameras, bluetooth and wifi ; As far as the hardware is concerned these are the same types of tech we already use in high-end "ground-level" security systems, such as IP cameras, decentralized computing and storage. The promise of a mobile platform such as a drone is not necessarily in its hardware, but in the possibilities afforded by moving the element of human observation and choice to where it is needed in the most efficient manner.

 It is the writer's opinion that these devices will eventually be absolutely essential in high security of the future, as the advantage that having a GPS/GLONAS based waypointing system and an LTE connection attached to a quadracoptor with a camera and a piece of software telling it what to watch for can gift overall operational security in large outdoor areas is significant. As a consumer, I can purchase a drone that can track me as I move, hit several points in a row and return to me, and fly several kilometers on one charge. There are features that allow some devices to return  "home" when faced with a battery with just enough life left to get to the charger.

 In some ways, it doesn't sound particularly incredible on paper. We have had cameras attached to flying machines for decades. Drones have been used to survey large swaths of farm and ranch land and to manually patrol other areas where a human element is needed as part of the security presence.

 It is more the marriage of the architecture of our cellular ecosystems to the increasingly affordable and scalable hardware that stands to be a game-changer for certain sectors of the industrial security market in the near future. STST has already implemented systems which can differentiate between human activity and other types of on-screen movement, and it is this sort of tech, working in tandem with global positioning routing software that could help realize a new standard for securing large areas during times where no one should be there.

   For more information on access control systems for your facility contact Security Technology of South Texas, Inc. at: or call (210) 710-5881


By proadAccountId-378954 12 Sep, 2017

 To what extent any niche in the overall market will open up in response to some of these new possibilities is not certain right now. It could be that for some reason, consumer drone tech becomes unavailable in the near future. Economy of scale might not be dialed in just right. 

 Regardless of any of that, the fact remains that the technology to create a simple team of drones is more or less with us today. When the first murder by drone occurs, culpability could be all but impossible to prove. Using software not unlike that which Lyft uses to parse and sort passengers for pick up and drop off in tandem with  hardware for pattern detection, it could easily be possible for the type of person who typically gets their kicks “trolling” or otherwise harassing to get in too deep.

  And as for those who say that such an idea sounds like something from the future, I would not blame you. The media is full of ominous images of “intelligent” machines. From "The Terminator" to this year's, "Horizon:Zero Dawn", there is no shortage of human fear surrounding drones. 

 Sometimes even the imagery of the language we use to describe our “IOT” seems to evoke something more sinister. But the days of an AI “ecosystem” complex enough to take advantage of the machines in which it is embedded are certainly not upon us yet. 

 As I said before, the idea of using a UAS (Unmanned Aerial System) to oversee an area or complex is not a new one. Machines with the ability to recognize and respond to their surroundings have been a staple of the human imagination for thousands of years of recorded history; right alongside flight, so there is something very attention grabbing about mixing the two.  Naturally, there is a flurry of application to the FAA for permits for commercial drone use, and it is anticipated that new regulations concerning these types of devices will be necessitated as more and more people own them.

 To our universe, we are organizers and processors of information, its sensory and perceptual organs, if you can tolerate the metaphors. As a result, the responsibility for whether or not we write home-brew targeting software will be with us. With drone technology in its infancy, not much can be truly said. But with the exposure the devices are currently getting, I personally do not think it will be long before someone bolts a WalMart purchased assault rifle onto some consumer drone that thinks it is playing an AR game with whomever it is looking for.

   For more information on access control systems for your facility contact Security Technology of South Texas, Inc. at: or call (210) 710-5881


By proadAccountId-378954 23 Aug, 2017

The days of using on-site DVRs to record and store data has increasingly become a thing of the past in the industry of professional security. While many electronics and outlet stores still sell $500 DIY systems using this old technology, managing data using cloud hosting has become otherwise ubiquitous.

   defines it as “hosting on virtual servers which pull their computing resource from extensive underlying networks of physical web servers”. All  this means is that instead of using more expensive on-site computing power, the data is sent to the servers of a hosting company. In systems using computers to run high-end video analytics, however, it may still be necessary to use on-site servers.

                As a Brivo authorized dealer, Security Technology of South Texas has access to industry-leading cloud technologies. “Brivo OnAir” accomplishes the management of the large databases necessary in securing heavily-trafficked gates or with access control systems where many different people are using assigned key fobs. Video-footage for each recorded event is stored on Brivo’s computers, and accessible to the user  via desktop, smartphone, or other internet capable device.

                Finally, one of the most important advantages that cloud hosting offers is the protection and security of your data. Video stored on local disk space is not as secure, and hardware failure is always a possibility. The distributed computing of “the cloud” ensures all your data remains protected.






By proadAccountId-378954 10 Aug, 2017

   Although you will still see decades old analog cameras recording in 240p in many businesses, the security industry has benefited from the last  15 years of progress in computer analytics and networking technology more than most. “No longer will you need some kind of server to store the camera data, it will all be stored on the cloud from now on.” (proclaims the The move from onsite data storage to cloud based archiving has lowered the cost while increasing the amount, quality, and security of data.

                “The value of a security solution increases in relationship to the extent of its integration with other security and information technology components.” (  Adding in analytics devices can screen against false alarms by being “taught” over time to distinguish between an intruder and, for instance, an animal passing through. Highly integrated systems can create extensive metadata logs as well. Combining a system of key fobs with 1080p IP cameras and analytics allows an ecosystem of interconnected devices to perform tasks that would be unfeasible using outmoded technologies.

                The advent of the massive web of 4GLTE connected phones over the last decade permits quicker and smarter security solutions, particularly at the industrial level. It is increasingly possible to detect intrusion and dispatch police with a “video verified” break in in progress rather than simply have a grainy black and white recording to try and discern a face in after the fact, a fact which often piques the interest of business owners who may not have looked into security until a break in.

   For more information on access control systems for your facility contact Security Technology of South Texas, Inc. at: or call (210) 710-5881




By proadAccountId-378954 05 Aug, 2017

On July 30, Christus St. Vincent Regional Medical Center in Santa Fe, New Mexico underwent a full lockdown for over an hour. A nearby gang related shooting prompted the hospital to “[go] into lockdown mode until the situation [was] resolved and it's been determined that there is no danger to patients or visitors", according to Arturo Delgado, a hospital spokesman.

In the past, emergency lockdowns of this sort were achieved through the physical  act of locking all entrances to a complex, and often using human security guards to enforce the lockdown. A modern, state of the art access control system can dramatically reduce response times and overall security, “giving you the ability to lock all exterior doors with a couple clicks of a button, not allowing any entry whatsoever.” (

The ability to selectively limit access to certain areas through the use of key fobs (or even biometric scans) can of course also do much to limit lockdown emergencies from occurring in the first place. A log of who went where and when can be consulted later during any investigation, and is a further measure of protection from liability.

In a setting like a school or hospital, where there is typically a lot of traffic from the public, a professional access control system designed and installed “turn-key” can be the difference between a lawsuit and “crisis averted”.  

For more information on access control systems for your facility contact Security Technology of South Texas, Inc. at: or call (210) 710-5881












By proadAccountId-378954 03 May, 2017

Traditionally, school video surveillance security consisted of a few low quality analog cameras, connected to a DVR, watching exterior areas and hallways.  As is the case with analog cameras, the video quality was poor and the recorded video required an onsite visit to view footage.

Thanks to Eagle Eye Networks, that has all changed.  As an authorized integrations provider for Eagle Eye Networks cloud video surveillance in the South Texas market, Security Technology of South Texas, Inc. is helping school districts as well as all types of commercial enterprises with high resolution smart cameras and cloud connected/managed services.  Cloud cameras eliminate the need for local recorders and allow instant access to video on campus in real-time.  In case of an emergency situation – when information delivered to first responders quickly becomes the difference in life and death – the Eagle Eye system has the unique advantage of delivering crisp, clear video via the cloud interface.  Below is an example of how Eagle Eye Networks have helped Oakwood High School address their safety and security issues:


Oakwood High School did not have a video surveillance system on campus, so they did not have complete visibility into what was happening among their 300 students.  The principal was looking for a solution that would allow the staff to view multiple locations at once to ensure safety and to assist with resolving on-campus disputes.

Oakwood High School decided to implement Eagle Eye’s Cloud Security Camera VMS throughout their campus. They granted access to key faculty members as well as the city’s police chief so that all parties can view video footage from their phones, adding an extra layer of security should any incidents occur. The principal also monitors the video footage to ensure no students are loitering in the halls, the third shift custodial staff is doing their job properly, and that no suspicious activity is taking place near or on the campus.

“Eagle Eye is better than I imagined. I’ve used it beyond our intended security purposes. When there’s a disciplinary issue, the video gives me a better idea of what happened. There’s no more dealing with he said, she said arguments – Eagle Eye has become my third eye. We have already decided to implement this system throughout our district.”

Tim Lee

Principal, Oakwood High School


To learn more about Security Technology of South Texas, Inc., and the revolutionary Eagle Eye Networks cloud video surveillance system, please contact us at 210-446-4863 or by email at .  Or visit us at .

(article provided by Eagle Eye Networks)

By proadAccountId-378954 20 Jul, 2016
Security Technology of South Texas, Inc. is happy to introduce our newest member of our sales and design team, Roxann Corralejo. Roxann comes to us with a successful history in professional sales, and already she has achieved sales well beyond her initial objectives as she has helped several businesses protect their property and employees with our unique security solutions. Welcome to the STST family Roxann!!!
By lemaster 27 Apr, 2016
With the price of oil sinking to a 13 year low, oil and gas producers are scrambling to find ways to cut costs related to the operation and production of   leas es and related sites.

With tough times in any market, though, comes innovation. And stepping up to meet the challenge to innovate in a difficult energy market is Security Technology of South Texas, Inc., with the “Virtual Gate Guard System”.

The Virtual Gate Guard, using cloud-based video and access control technology, replaces costly manned gate guard services, and does so for a fraction of the monthly cost. In fact, Security Technology has been installing such innovation for various oil and gas producers and saving them hundreds of thousands of dollars per year at multiple gate entry locations throughout south Texas. One of the largest O&G producers in Texas reports savings of approximately one million dollars on an annual basis using this unique technology.

The Virtual Gate Guard uses high resolution video cameras that connect directly to a remote 24/7 call center where video analysists view – in real time – drivers requesting entry to a property, lease or facility. Using a cloud-based intercom system, the driver communicates with the security center and are “logged in” with the same information as a physical guard would collect. The gate is then remotely opened and the driver enters the property, without ever having to leave the vehicle, creating a safer environment for the driver and smoothly logging in and moving all drivers onto the property.

Since the system can be installed for no initial investment, the company only pays a monthly fee, which is a fraction of what they were paying for a guard service, and the savings is realized immediately. For more information on the Virtual Gate Guard System contact Security Technology of South Texas, Inc. at 210.446.4863. Or to learn more go to

By lemaster 27 Apr, 2016

Managing safety and protecting workers in the oil and gas industry, especially given the rugged environment of the Eagleford Shale territory, has always been a challenge. Understanding a safety issue in real-time, as it is happening, is critical in creating a safe environment for the men and women who work in this vast – and dangerous – part of the country.

A breakthrough technology being deployed for some of the most active oil and gas companies in South Texas is the use of Smart Cameras. The high tech video systems are solar powered, and use a private cellular network canopy that has been deployed over the vast majority of the Eagleford area. Using special analytics, the cameras can be installed anywhere, and do not require power or Internet connection. Using the camera’s analytics, it is “taught” to only detect what its told to, such as truck traffic into leases, over bridges, into tank fields, pad sites, etc. This new technology extends the reach of O&G field managers by allowing them to “see” multiple locations at once and detect any safety issues which might be happening.

Ignoring everything except the presence of human or vehicular traffic, the Smart Camera – upon detecting a vehicle entering the detection zone – records a video clip of the event and instantly transmits it to the cloud-based system provided by Security Technology of South Texas, Inc. and then the video event is sent to the end-user’s smart phone, tablet or PC.

Marketing this technology as “Camera Anywhere”, Security Technology can deploy the system to a site within one day and be tracking and sending video notifications from the site that same day. And because the system is completely self-contained, it can be relocated to other sites should the need arise. Some of the critical areas O&G companies that currently use this system to cover are:

- Entrances to leases (it can even incorporate a keypad and electrically control a gate while sending video clips)
- Pad Sites (employee can see what is happening at the pad site before arrival. Also, by doing remote video tours of multiple sites, cut down on travel for routine inspections)
- Tank Fields and SWD (be alerted to vehicle traffic as they pull oil and help mitigate oil theft)
- Monitor traffic on critical areas inside of lease, i.e. one lane bridges and other areas where traffic safety is a concern

To learn more about Camera Anywhere and remote video technology contact Richard Youngman, President, Security Technology of South Texas, Inc. at 210-710-5881 or on the web at .

More Posts
Share by: