Uploaded on

CCTNS & Homeland Security

CCTNS & Homeland Security

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads


Total Views
On Slideshare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. CCTNS & Homeland Security A Geospatial Perspective Sanjay Sahay, ADGP, Police Computer Wing, Bangalore
  • 2. Crime & Criminal Tracking & Network Systems About the Program • Mission Mode Project under the National e-Governance Plan of Govt. of India • IT-enabled-state-of-the-art tracking system around 'Investigation of crime and detection of criminals' • An allocation of Rs. 2000 Crores has been made for CCTNS Project. • Cabinet Committee on Economic Affairs (CCEA) has approved the project on 19.06.2009. Coverage Approx. 14,000 Police Stations throughout the country 6000 higher offices in police hierarchy Circles, Sub-Divisions, Districts, Range, Zones, Police Headquarters, SCRB
  • 3. Objective Citizen friendly and more transparent Police functioning Delivery of citizen-centric services through effective usage of ICT Provide tools, technology and information to facilitate investigation of crime and detection of criminals Improve Police functioning areas such as Law and Order, Traffic Management etc. Facilitate Interaction and sharing of Information among Police units Assist senior Police Officers in better management of Police Force Keep track of the progress of Cases, including in Courts
  • 5. Scope of Project CCTNSData Centre / DRC Site Preparation / Infrastructure Software Enhancements Capacity Building Data Digitization
  • 6. Scope of Project SIData Centre / DRC Site Preparation / Infrastructure Software Enhancements Capacity Building Data Digitization
  • 7. Police IT - CCTNS • GoI accepted Karnataka as Lead State • Both the Projects get integrated • Mission Mode Project • Wipro, the Developer Police IT CCTNS Lead State CCTNS Police IT
  • 8. Core Infrastructure - Karnataka
  • 9. Software Scope Core Application Software Registration, Investigation & Prosecution Traffic Citizen Portal Integration Crime Search and Analysis Law and Order
  • 10. Other Components Infrastructure • Client Site Infra • Data Center • DR Center • Connectivity Training • Basic IT • Role Based • System Admin Data Digitization • Crime Data Digitization • Data Migration
  • 11. Advanced Solutions CCTNS - II Crime Analytics Mobile Data Terminal CAD based PCR AVLS Traffic Magt. System Business Intelligence
  • 12. Karnataka CCTNS - Update Pending Change Management Program Train The Trainer ISO Policy On-going CAS-Gap Development Citizen Portal Center-State Integration DR Center Set up Completed Site Preparation Client Site Infrastructure Data Center ( except SSO/SLB) Police IT Enhancements
  • 13. Center – State Integration Karnataka Crime DB National Crime DB State- 1 State- 2 State- 3 State- 4 2-way data transfer
  • 14. All Police Stations have all relevant maps on display Sand models have been a part of standard training
  • 15. The Map of today is the Geospatial Information as the requirements are much more complex yet precise, the demand for which is dictated by ground realities. Herein lies the need for Geospatial Information
  • 16. Geospatial Technology ought to be at the base of CCTNS Google Earth Google Maps Mapmyindia
  • 17. From Crime Analysis to Homeland Security: A Role for Neighborhood Profiling?
  • 18. From Crime Analysis to Homeland Security The Vulnerable Localities Index for Sandwell in the West Midlands region of England. A score of 100 is representative of the study area’s average measure. Values greater than 100 indicate higher measures of vulnerability. Areas with the highest VLI scores are those that should receive focused neighbourhood policing attention (Chainey 2004)
  • 19. Distribution of postcodes with conflict- related deaths in Belfast (1970–2004). Peacelines are labeled
  • 20. Schematic of spatial characteristics of Critical Risk Zones according to Olivares and Maghelal (2005)
  • 21. Internal Security for Communities Location of City of Bryan and Brazos County, Texas
  • 22. Internal Security for Communities Geo-coded addresses of reported sex crimes and suspected offenders
  • 23. Proximity of perpetrators’ dwelling to location of crime they perpetrated than the designated buffers creating child safe zones (Fig. 6.11), indicating the CSZs offer little impact as a preventative measure.
  • 24. Map to show the 2,000 feet proposed buffer around premises where children congregate including school bus stops
  • 25. CCTNS – the road ahead Geospatial Preparedness The power of Processing Appropriate Geospatial Assets Imagery/data as required Processing
  • 26. CCTNS- the road ahead Geospatial Preparedness The power of Processing Inputs as per software requirements Appropriate Software Actionable Output
  • 27. CCTNS – the road ahead Geospatial Preparedness The power of Processing The human expertise Standard Communications & Operations The data/the SP/the Ops Commander all on the same page, real time
  • 28. Homeland Security A Robust Counter Terrorism Mechanism Watershed in Modern Human History
  • 29. Homeland Security A Robust Counter Terrorism Mechanism The attack on the World Trade Center in 2001 has been by far the single most important event in the history of the modern world and more so because it forced the world to change its perception on the nature of organization, the usage of technology, the responses, the consolidation of activities and spread of mechanisms needed to thwart the ever growing terrorism the world over.
  • 30. Mega City Policing Project
  • 31. Mega City Policing Project Criticality of mega cities as economic growth engines Formidable beginning for war against terrorism Connecting the cities would lead to a national network Returning to normalcy insurmountable
  • 32. Leveraging Technology for HLS Gaping holes in technology Functionalities cannot be achieved when basic issues related to execution, back end processes and its robustness is still in question Need of the hour: identification of technological platforms as first foundation stones of HLS in India
  • 33. Technological Framework Command and Control Centre (CCC) Interception Systems (IS) City Based Video Surveillance System (CBVSS)
  • 34. Command and Control Center (CCC) Integrating all fields – radio, audio, video, text, data, images and graphics Through a viable command and control center software Creation of a state of the art C4i
  • 35. Interception Systems( IC) Capability to monitor and penetrate any mode of communication/storage Connect to HLS specific requirements Analyse on a real time basis Up-gradation and Scalability inbuilt
  • 36. City Based Video Surveillance System (CBVSS) Proven track record of providing best possible information ( video footage ) Ajmal Kasab Technologically way ahead of CCTV networks Inbuilt video analytics provides the connects Integrated system. Deterrent and a must!!!
  • 37. Technological Framework TETRA Radio Network (TRN) Geospatial Technology for HLS (GTHLS) ERP Solution, RDBMS and Integration (ERI)
  • 38. TETRA Radio Network (TRN)  TETRA – A Public Safety Network  Fully digital mode  Complete integration of all communication gadgets  Delivery of high quality voice/data/other outputs
  • 39. TETRA eludes India
  • 40. Geospatial Technology for HLS  Conventional inputs are unable to provided actionable data  Map of today is Geospatial imagery/GIS  Third Eye  Critical for planning, preparation & response
  • 41. Geospatial Technology for HLS  Supports incident management  Great tool for regulation, enforcement, monitoring and supervision
  • 42. Geospatial Technology for HLS  detection, preparedness, prevention, protection, rescue, relief, recovery, and reconstruction  accurate geospatial information in order to accomplish many of the tasks during an emergency response situation  tighter coupling between geospatial technologies and homeland security missions
  • 43. Geographic Information Science  addresses the fundamental issues behind spatial data handling efforts, such as spatial data representation, analysis, modeling, and visualization
  • 44. BlackandwhiteLandsatimagemosaicofAfghanistan(Shroder,1977)
  • 45. Part of the Kabul and Pansher landsat mosaic (1:500,000 scale) printed by the CIA during the Soviet-Afghan War showing the area between Salang Pass, Baghram Air Base, and Kabul
  • 46. Remote Sensing and GIS as Counterterrorism Tools for Homeland Security Example of the legend of part of the Kabul III sheet at 1:500,000 scale of the Landsat mosaic in false color made by the CIA in the early 1980s, with gazetteer information on the back
  • 47. Part of the Kabul III sheet showing Kabul in the upper left, the Spin Ghar (Safed Koh) range, the Parachinar (‘parrot’s beak’) border reentrant of the Kurram Agency part of the Northwest Frontier Province of Pakistan into which bin Laden escaped, and the many enumerated passes along the border that are used for smuggling people, drugs, and weapons
  • 48. Example spatial subset of 8 September 2005 AVIRIS scene acquired over the New Orleans vicinity, LA, USA. Shown is band 42 (739.35 nm). The area in the upper right portion of the scene is submerged by Hurricane Katrina- induced floodwaters
  • 49. Economic Impacts of Terrorist Attacks and Natural Disasters Total losses of jobs from the hypothetical hurricane event
  • 50. Isometric view of a hyperspectral AVIRIS image cube, New Orleans area, LA, USA, with bands 42 (739.35 nm), 30 (645.58 nm), and 18 (529.81 nm) as R, G, B for the top-plane image, converted to grayscale. The scene was acquired on 8 September 2005 with a pixel size of ∼9.7 m. The image cube displays, in the z- dimension, 224 spectral channels on the 370–2500-nm wavelength interval
  • 51. Poppy and Terrorism
  • 52. Poppy and Terrorism
  • 53. Remote Sensing-Based Damage Assessment for Homeland Security
  • 54. Pre- and post-Hurricane Katrina IKONOS satellite images of a portion of New Orleans, LA, USA, acquired on 28 August 2002 (left) and 2 September 2005 (right), respectively (truecolor, converted to grayscale). Building damage and flooded areas are readily apparent in the post-hurricane image on the right. Such outwardly apparent structural damage can be visually interpreted by a human analyst.
  • 55. Agent-Based Modeling and Evacuation Planning Human and Geophysical What if scenarios Agent Based modelling takes care of this and also the simulation process  Evacuation Planning remains to be a challenging task
  • 56. Traffic situations at different times during a simulated evacuation: One and half hours into the evacuation
  • 57. Security Audit •Where it all starts…. Evacuation Plan •For a safer end! Geospatial all the way!
  • 58. Agent-Based Modeling and Evacuation Planning Human and Geophysical What if scenarios Agent Based modelling takes care of this and also the simulation process  Evacuation Planning remains to be a challenging task
  • 59. Building Evacuation in Emergencies  Surge of interest in this field now developing building evacuation analysis using models that focus explicitly upon the human individual’s locus of behavior  Large number of softwares available for modelling and simulating pedestrian evacuation from enclosed spaces
  • 60. Spatial Epidemiology: Where Have We Come in 150 Years? We have a well proven precedent!
  • 61. The Role of Geosurveillance and Security in the Politics of Fear Motive agnostic!
  • 62. The Importance of Spatial Thinking in an Uncertain World
  • 63. Geospatial education and R & D is the key
  • 64. Three characteristics distinguish homeland security applications from other domains: the need for speed; the difficult environments in which technology must operate; and the impossibility of anticipating many relevant kinds of events in either space or time. The challenge!
  • 65. ERP, RDBMS & Integration  Complete functioning of the department on ERP  To be populated in a real time and dynamic mode  RDBMS  Integration of the legacy systems  On single sign in / sign off concept
  • 66. Managerial Response to War on Terror
  • 67. Managerial Response to War on Terror HUGE GAPS in learning, skills and attitudes of internal security managers Human resources should outmatch the technical system Utility is how best we utilize Innovative methods inclusive of outbound learning Change management is the most critical component
  • 68. National Homeland Security Resource Base & Incident Support System Differential levels of technologies & differential levels of mental frames Executed at the division level in a city / then seven cities integrated at the national level Six technologies having their national control centers at any location Six of the these control centers gets integrated into NHLSRB - ISS
  • 69. Integration National Homeland Security – Resource Base and Incident Support System (NHLS – RBISS)
  • 70. National Homeland Security Blueprint The beginning of this grandiose plan set to have a transformational impact on the Homeland Security scenario of the country is yet to be made. The world’s best buildings were a blueprint one day. A blueprint is the first to crystallize our thoughts, it could take a large number of revisions, nonetheless it has to start. Time seems to be running out.
  • 71. Overall Framework