Thief Identification
MAC addresses of smart phones are captured anonymously by the Node.
In case of a Robbery
- Couple Video Surveillance with MAC addresses.
- Law enforcement can coordinate with cell phone carriers who have customer information for each MAC address.
- Identify suspects, victims, and witnesses.
- Use contact information obtained from the carrier and GPS to locate each person.