SlideShare a Scribd company logo
1 of 2
Download to read offline
October 15, 2015
TOOLS FOR THE UNKNOWN
Posted by Jeff Menken Oct 15, 2015
What happens when a foreign conflict hits home?
How do you prepare for a terror attack on a large crowd?
How do you gather real-time information and survey a crime scene when civilians and dignitaries are still at risk,
and assailants at large?
For 36 domestic and international SWAT, EMS, and federal law enforcement teams, the best way to plan for the
worst case is to run through the events as if they’re already happening, and train with the smartest tools to support
the mission. UrbanShield’s comprehensive training weekend, hosted by Alameda County Sheriff's office, provided
that opportunity to assess global tactical and EMS teams on their response capabilities in multi-discipline planning,
procedure, organization, equipment and training.
As an UrbanShield technology partner, Motorola Solutions participated in this year’s Dignitary Rescue scenario-one
of 36 different programs throughout the bay area-- and allowed teams to experience Intelligence-Led Public Safety
(ILPS) in action. Participants saw firsthand – through tablets, smartphones and real-time crime center displays –
how aggregated data from sources, such as video, social media, and location-based apps, can dramatically enhance
tactical team’s situational awareness, and how mission critical voice can be extended beyond land mobile radio to
the same smart devices.
Each scenario began the same way: teams were in a briefing room watching a “live” scenario unfold as a public
figure on a terror group’s watch list was presenting to a large crowd. Local law enforcement anticipated that the
dignitary may be in danger, so immediate response teams including tactical EMS groups were on standby,
and StrongWatch’s Freedom On The Move (FOTM) was deployed. Mid-way through the speech, terrorists
concealed in the masses launched an attack to take out the official and several people nearby. As the teams watched
the video surveillance feed, assailants remained on the ground hidden in heavy smoke, firing automatic weapons at
civilians.
While these events unfolded, the FOTM and hospital cameras were all viewable on CommandCentral
Aware and CommandCentral Inform. With thermal imaging technology, FOTM saw through the smoke to identify
potential human threats, such as gunmen, and object threats, such as IED and casualties. With this information,
command staff and EMS teams got a good idea of the number of shooters and their positions, the number of people
still left in the courtyard, and those that need medical assistance. Because of the technology in use, high level
officials knew immediately that the dignitary had been successfully evacuated, and which civilians needed
immediate attention. As the scenario concluded, the teams could useBriefCam video synopsis software integrated
into CommandCentral Aware to view their performance in the debriefing room.
These tools dramatically changed the way that teams planned and acted in a crisis situation. CommandCentral
enabled teams to assess and analyze multiple video sources, provided a single, operational view for incident
command, and streamed real-time video and data to tablets and smartphones. While no one can predict what a real
attack will look like, teams experienced a life-like scenario with real-time data streams, and this exercise equipped
team members with the tools to operate in the unknown.

More Related Content

Similar to Urban Shield 2015 Menken Blog

ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ronnasleightholm
 
Computers, Technology,andCriminalistics inPolicingAfte.docx
Computers, Technology,andCriminalistics inPolicingAfte.docxComputers, Technology,andCriminalistics inPolicingAfte.docx
Computers, Technology,andCriminalistics inPolicingAfte.docxmaxinesmith73660
 
Breaking Down the Applications of Anti-Drone Technologies
Breaking Down the Applications of Anti-Drone TechnologiesBreaking Down the Applications of Anti-Drone Technologies
Breaking Down the Applications of Anti-Drone TechnologiesNovoQuad
 
Essay On Tactical Analysis
Essay On Tactical AnalysisEssay On Tactical Analysis
Essay On Tactical AnalysisLaura Martin
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17Ed Alcantara
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17Ed Alcantara
 
Outline D
Outline DOutline D
Outline Dbutest
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Trilateral Research
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensJeremiah Grossman
 
The Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public SafetyThe Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public SafetyNovoQuad
 
The Effective Use of Unmanned Aerial Vehicles for Local Law Enforcement
The Effective Use of Unmanned Aerial Vehicles for Local Law EnforcementThe Effective Use of Unmanned Aerial Vehicles for Local Law Enforcement
The Effective Use of Unmanned Aerial Vehicles for Local Law EnforcementLeighton Gasque
 
Drone Threats and Countermeasures for Public Safety
Drone Threats and Countermeasures for Public SafetyDrone Threats and Countermeasures for Public Safety
Drone Threats and Countermeasures for Public SafetyNovoQuad
 
Protecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big EventsProtecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big EventsNovoQuad
 
Crisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareCrisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareI-Pix Technologies
 
Mass transit security awareness white paper
Mass transit security awareness white paperMass transit security awareness white paper
Mass transit security awareness white paperzcelik
 
Running head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docxRunning head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docxwlynn1
 
JOSHUA - advanced threat detection system
JOSHUA - advanced threat detection systemJOSHUA - advanced threat detection system
JOSHUA - advanced threat detection systemKim Klein
 
Slándáil Project Magazine 2015
Slándáil Project Magazine 2015Slándáil Project Magazine 2015
Slándáil Project Magazine 2015Victoria Macarthur
 

Similar to Urban Shield 2015 Menken Blog (20)

ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
 
Computers, Technology,andCriminalistics inPolicingAfte.docx
Computers, Technology,andCriminalistics inPolicingAfte.docxComputers, Technology,andCriminalistics inPolicingAfte.docx
Computers, Technology,andCriminalistics inPolicingAfte.docx
 
Homeland Security Bill
Homeland Security BillHomeland Security Bill
Homeland Security Bill
 
Breaking Down the Applications of Anti-Drone Technologies
Breaking Down the Applications of Anti-Drone TechnologiesBreaking Down the Applications of Anti-Drone Technologies
Breaking Down the Applications of Anti-Drone Technologies
 
Essay On Tactical Analysis
Essay On Tactical AnalysisEssay On Tactical Analysis
Essay On Tactical Analysis
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
Outline D
Outline DOutline D
Outline D
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
 
Uddin
UddinUddin
Uddin
 
The Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public SafetyThe Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public Safety
 
The Effective Use of Unmanned Aerial Vehicles for Local Law Enforcement
The Effective Use of Unmanned Aerial Vehicles for Local Law EnforcementThe Effective Use of Unmanned Aerial Vehicles for Local Law Enforcement
The Effective Use of Unmanned Aerial Vehicles for Local Law Enforcement
 
Drone Threats and Countermeasures for Public Safety
Drone Threats and Countermeasures for Public SafetyDrone Threats and Countermeasures for Public Safety
Drone Threats and Countermeasures for Public Safety
 
Protecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big EventsProtecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big Events
 
Crisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareCrisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced Software
 
Mass transit security awareness white paper
Mass transit security awareness white paperMass transit security awareness white paper
Mass transit security awareness white paper
 
Running head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docxRunning head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docx
 
JOSHUA - advanced threat detection system
JOSHUA - advanced threat detection systemJOSHUA - advanced threat detection system
JOSHUA - advanced threat detection system
 
Slándáil Project Magazine 2015
Slándáil Project Magazine 2015Slándáil Project Magazine 2015
Slándáil Project Magazine 2015
 

Urban Shield 2015 Menken Blog

  • 1. October 15, 2015 TOOLS FOR THE UNKNOWN Posted by Jeff Menken Oct 15, 2015 What happens when a foreign conflict hits home? How do you prepare for a terror attack on a large crowd? How do you gather real-time information and survey a crime scene when civilians and dignitaries are still at risk, and assailants at large? For 36 domestic and international SWAT, EMS, and federal law enforcement teams, the best way to plan for the worst case is to run through the events as if they’re already happening, and train with the smartest tools to support the mission. UrbanShield’s comprehensive training weekend, hosted by Alameda County Sheriff's office, provided that opportunity to assess global tactical and EMS teams on their response capabilities in multi-discipline planning, procedure, organization, equipment and training. As an UrbanShield technology partner, Motorola Solutions participated in this year’s Dignitary Rescue scenario-one of 36 different programs throughout the bay area-- and allowed teams to experience Intelligence-Led Public Safety (ILPS) in action. Participants saw firsthand – through tablets, smartphones and real-time crime center displays – how aggregated data from sources, such as video, social media, and location-based apps, can dramatically enhance tactical team’s situational awareness, and how mission critical voice can be extended beyond land mobile radio to the same smart devices. Each scenario began the same way: teams were in a briefing room watching a “live” scenario unfold as a public figure on a terror group’s watch list was presenting to a large crowd. Local law enforcement anticipated that the dignitary may be in danger, so immediate response teams including tactical EMS groups were on standby, and StrongWatch’s Freedom On The Move (FOTM) was deployed. Mid-way through the speech, terrorists concealed in the masses launched an attack to take out the official and several people nearby. As the teams watched the video surveillance feed, assailants remained on the ground hidden in heavy smoke, firing automatic weapons at civilians. While these events unfolded, the FOTM and hospital cameras were all viewable on CommandCentral Aware and CommandCentral Inform. With thermal imaging technology, FOTM saw through the smoke to identify potential human threats, such as gunmen, and object threats, such as IED and casualties. With this information, command staff and EMS teams got a good idea of the number of shooters and their positions, the number of people still left in the courtyard, and those that need medical assistance. Because of the technology in use, high level officials knew immediately that the dignitary had been successfully evacuated, and which civilians needed immediate attention. As the scenario concluded, the teams could useBriefCam video synopsis software integrated into CommandCentral Aware to view their performance in the debriefing room. These tools dramatically changed the way that teams planned and acted in a crisis situation. CommandCentral enabled teams to assess and analyze multiple video sources, provided a single, operational view for incident
  • 2. command, and streamed real-time video and data to tablets and smartphones. While no one can predict what a real attack will look like, teams experienced a life-like scenario with real-time data streams, and this exercise equipped team members with the tools to operate in the unknown.