CCTNS & Homeland Security

882 views

Published on

CCTNS & Homeland Security

  • Be the first to comment

CCTNS & Homeland Security

  1. 1. CCTNS & Homeland Security A Geospatial Perspective Sanjay Sahay, ADGP, Police Computer Wing, Bangalore
  2. 2. Crime & Criminal Tracking & Network Systems About the Program • Mission Mode Project under the National e-Governance Plan of Govt. of India • IT-enabled-state-of-the-art tracking system around 'Investigation of crime and detection of criminals' • An allocation of Rs. 2000 Crores has been made for CCTNS Project. • Cabinet Committee on Economic Affairs (CCEA) has approved the project on 19.06.2009. Coverage Approx. 14,000 Police Stations throughout the country 6000 higher offices in police hierarchy Circles, Sub-Divisions, Districts, Range, Zones, Police Headquarters, SCRB
  3. 3. Objective Citizen friendly and more transparent Police functioning Delivery of citizen-centric services through effective usage of ICT Provide tools, technology and information to facilitate investigation of crime and detection of criminals Improve Police functioning areas such as Law and Order, Traffic Management etc. Facilitate Interaction and sharing of Information among Police units Assist senior Police Officers in better management of Police Force Keep track of the progress of Cases, including in Courts
  4. 4. A FULLY FUNCTIONAL NATIONAL DATABASE
  5. 5. Scope of Project CCTNSData Centre / DRC Site Preparation / Infrastructure Software Enhancements Capacity Building Data Digitization
  6. 6. Scope of Project SIData Centre / DRC Site Preparation / Infrastructure Software Enhancements Capacity Building Data Digitization
  7. 7. Police IT - CCTNS • GoI accepted Karnataka as Lead State • Both the Projects get integrated • Mission Mode Project • Wipro, the Developer Police IT CCTNS Lead State CCTNS Police IT
  8. 8. Core Infrastructure - Karnataka
  9. 9. Software Scope Core Application Software Registration, Investigation & Prosecution Traffic Citizen Portal Integration Crime Search and Analysis Law and Order
  10. 10. Other Components Infrastructure • Client Site Infra • Data Center • DR Center • Connectivity Training • Basic IT • Role Based • System Admin Data Digitization • Crime Data Digitization • Data Migration
  11. 11. Advanced Solutions CCTNS - II Crime Analytics Mobile Data Terminal CAD based PCR AVLS Traffic Magt. System Business Intelligence
  12. 12. Karnataka CCTNS - Update Pending Change Management Program Train The Trainer ISO Policy On-going CAS-Gap Development Citizen Portal Center-State Integration DR Center Set up Completed Site Preparation Client Site Infrastructure Data Center ( except SSO/SLB) Police IT Enhancements
  13. 13. Center – State Integration Karnataka Crime DB National Crime DB State- 1 State- 2 State- 3 State- 4 2-way data transfer
  14. 14. All Police Stations have all relevant maps on display Sand models have been a part of standard training
  15. 15. The Map of today is the Geospatial Information as the requirements are much more complex yet precise, the demand for which is dictated by ground realities. Herein lies the need for Geospatial Information
  16. 16. Geospatial Technology ought to be at the base of CCTNS Google Earth Google Maps Mapmyindia
  17. 17. From Crime Analysis to Homeland Security: A Role for Neighborhood Profiling?
  18. 18. From Crime Analysis to Homeland Security The Vulnerable Localities Index for Sandwell in the West Midlands region of England. A score of 100 is representative of the study area’s average measure. Values greater than 100 indicate higher measures of vulnerability. Areas with the highest VLI scores are those that should receive focused neighbourhood policing attention (Chainey 2004)
  19. 19. Distribution of postcodes with conflict- related deaths in Belfast (1970–2004). Peacelines are labeled
  20. 20. Schematic of spatial characteristics of Critical Risk Zones according to Olivares and Maghelal (2005)
  21. 21. Internal Security for Communities Location of City of Bryan and Brazos County, Texas
  22. 22. Internal Security for Communities Geo-coded addresses of reported sex crimes and suspected offenders
  23. 23. Proximity of perpetrators’ dwelling to location of crime they perpetrated than the designated buffers creating child safe zones (Fig. 6.11), indicating the CSZs offer little impact as a preventative measure.
  24. 24. Map to show the 2,000 feet proposed buffer around premises where children congregate including school bus stops
  25. 25. CCTNS – the road ahead Geospatial Preparedness The power of Processing Appropriate Geospatial Assets Imagery/data as required Processing
  26. 26. CCTNS- the road ahead Geospatial Preparedness The power of Processing Inputs as per software requirements Appropriate Software Actionable Output
  27. 27. CCTNS – the road ahead Geospatial Preparedness The power of Processing The human expertise Standard Communications & Operations The data/the SP/the Ops Commander all on the same page, real time
  28. 28. Homeland Security A Robust Counter Terrorism Mechanism Watershed in Modern Human History
  29. 29. Homeland Security A Robust Counter Terrorism Mechanism The attack on the World Trade Center in 2001 has been by far the single most important event in the history of the modern world and more so because it forced the world to change its perception on the nature of organization, the usage of technology, the responses, the consolidation of activities and spread of mechanisms needed to thwart the ever growing terrorism the world over.
  30. 30. Mega City Policing Project
  31. 31. Mega City Policing Project Criticality of mega cities as economic growth engines Formidable beginning for war against terrorism Connecting the cities would lead to a national network Returning to normalcy insurmountable
  32. 32. Leveraging Technology for HLS Gaping holes in technology Functionalities cannot be achieved when basic issues related to execution, back end processes and its robustness is still in question Need of the hour: identification of technological platforms as first foundation stones of HLS in India
  33. 33. Technological Framework Command and Control Centre (CCC) Interception Systems (IS) City Based Video Surveillance System (CBVSS)
  34. 34. Command and Control Center (CCC) Integrating all fields – radio, audio, video, text, data, images and graphics Through a viable command and control center software Creation of a state of the art C4i
  35. 35. Interception Systems( IC) Capability to monitor and penetrate any mode of communication/storage Connect to HLS specific requirements Analyse on a real time basis Up-gradation and Scalability inbuilt
  36. 36. City Based Video Surveillance System (CBVSS) Proven track record of providing best possible information ( video footage ) Ajmal Kasab Technologically way ahead of CCTV networks Inbuilt video analytics provides the connects Integrated system. Deterrent and a must!!!
  37. 37. Technological Framework TETRA Radio Network (TRN) Geospatial Technology for HLS (GTHLS) ERP Solution, RDBMS and Integration (ERI)
  38. 38. TETRA Radio Network (TRN)  TETRA – A Public Safety Network  Fully digital mode  Complete integration of all communication gadgets  Delivery of high quality voice/data/other outputs
  39. 39. TETRA eludes India
  40. 40. Geospatial Technology for HLS  Conventional inputs are unable to provided actionable data  Map of today is Geospatial imagery/GIS  Third Eye  Critical for planning, preparation & response
  41. 41. Geospatial Technology for HLS  Supports incident management  Great tool for regulation, enforcement, monitoring and supervision
  42. 42. Geospatial Technology for HLS  detection, preparedness, prevention, protection, rescue, relief, recovery, and reconstruction  accurate geospatial information in order to accomplish many of the tasks during an emergency response situation  tighter coupling between geospatial technologies and homeland security missions
  43. 43. Geographic Information Science  addresses the fundamental issues behind spatial data handling efforts, such as spatial data representation, analysis, modeling, and visualization
  44. 44. BlackandwhiteLandsatimagemosaicofAfghanistan(Shroder,1977)
  45. 45. Part of the Kabul and Pansher landsat mosaic (1:500,000 scale) printed by the CIA during the Soviet-Afghan War showing the area between Salang Pass, Baghram Air Base, and Kabul
  46. 46. Remote Sensing and GIS as Counterterrorism Tools for Homeland Security Example of the legend of part of the Kabul III sheet at 1:500,000 scale of the Landsat mosaic in false color made by the CIA in the early 1980s, with gazetteer information on the back
  47. 47. Part of the Kabul III sheet showing Kabul in the upper left, the Spin Ghar (Safed Koh) range, the Parachinar (‘parrot’s beak’) border reentrant of the Kurram Agency part of the Northwest Frontier Province of Pakistan into which bin Laden escaped, and the many enumerated passes along the border that are used for smuggling people, drugs, and weapons
  48. 48. Example spatial subset of 8 September 2005 AVIRIS scene acquired over the New Orleans vicinity, LA, USA. Shown is band 42 (739.35 nm). The area in the upper right portion of the scene is submerged by Hurricane Katrina- induced floodwaters
  49. 49. Economic Impacts of Terrorist Attacks and Natural Disasters Total losses of jobs from the hypothetical hurricane event
  50. 50. Isometric view of a hyperspectral AVIRIS image cube, New Orleans area, LA, USA, with bands 42 (739.35 nm), 30 (645.58 nm), and 18 (529.81 nm) as R, G, B for the top-plane image, converted to grayscale. The scene was acquired on 8 September 2005 with a pixel size of ∼9.7 m. The image cube displays, in the z- dimension, 224 spectral channels on the 370–2500-nm wavelength interval
  51. 51. Poppy and Terrorism
  52. 52. Poppy and Terrorism
  53. 53. Remote Sensing-Based Damage Assessment for Homeland Security
  54. 54. Pre- and post-Hurricane Katrina IKONOS satellite images of a portion of New Orleans, LA, USA, acquired on 28 August 2002 (left) and 2 September 2005 (right), respectively (truecolor, converted to grayscale). Building damage and flooded areas are readily apparent in the post-hurricane image on the right. Such outwardly apparent structural damage can be visually interpreted by a human analyst.
  55. 55. Agent-Based Modeling and Evacuation Planning Human and Geophysical What if scenarios Agent Based modelling takes care of this and also the simulation process  Evacuation Planning remains to be a challenging task
  56. 56. Traffic situations at different times during a simulated evacuation: One and half hours into the evacuation
  57. 57. Security Audit •Where it all starts…. Evacuation Plan •For a safer end! Geospatial all the way!
  58. 58. Agent-Based Modeling and Evacuation Planning Human and Geophysical What if scenarios Agent Based modelling takes care of this and also the simulation process  Evacuation Planning remains to be a challenging task
  59. 59. Building Evacuation in Emergencies  Surge of interest in this field now developing building evacuation analysis using models that focus explicitly upon the human individual’s locus of behavior  Large number of softwares available for modelling and simulating pedestrian evacuation from enclosed spaces
  60. 60. Spatial Epidemiology: Where Have We Come in 150 Years? We have a well proven precedent!
  61. 61. The Role of Geosurveillance and Security in the Politics of Fear Motive agnostic!
  62. 62. The Importance of Spatial Thinking in an Uncertain World
  63. 63. Geospatial education and R & D is the key
  64. 64. Three characteristics distinguish homeland security applications from other domains: the need for speed; the difficult environments in which technology must operate; and the impossibility of anticipating many relevant kinds of events in either space or time. The challenge!
  65. 65. ERP, RDBMS & Integration  Complete functioning of the department on ERP  To be populated in a real time and dynamic mode  RDBMS  Integration of the legacy systems  On single sign in / sign off concept
  66. 66. Managerial Response to War on Terror
  67. 67. Managerial Response to War on Terror HUGE GAPS in learning, skills and attitudes of internal security managers Human resources should outmatch the technical system Utility is how best we utilize Innovative methods inclusive of outbound learning Change management is the most critical component
  68. 68. National Homeland Security Resource Base & Incident Support System Differential levels of technologies & differential levels of mental frames Executed at the division level in a city / then seven cities integrated at the national level Six technologies having their national control centers at any location Six of the these control centers gets integrated into NHLSRB - ISS
  69. 69. Integration National Homeland Security – Resource Base and Incident Support System (NHLS – RBISS)
  70. 70. National Homeland Security Blueprint The beginning of this grandiose plan set to have a transformational impact on the Homeland Security scenario of the country is yet to be made. The world’s best buildings were a blueprint one day. A blueprint is the first to crystallize our thoughts, it could take a large number of revisions, nonetheless it has to start. Time seems to be running out.
  71. 71. Overall Framework

×