In this session, companies will provide an overview of solutions and expertise that they can offer to emergency services in the framework of the deployment of public warning systems.
In this session, companies will provide an overview of solutions and expertise that they can offer to emergency services in the framework of the deployment of public warning systems.
In 3 years, Advanced Mobile Location has brought considerable improvements to public safety. In this panel, experts will discuss the latest updates and the future improvements of the technology.
Chair: Christoph Kautz, Deputy Head, Unit Galileo and EGNOS – Applications, security, international cooperation, European Commission
Fiona Lee, Manager, and Alastair Breeze, Software Engineer, Google – Emergency Location Service (ELS): New developments since EENA 2019
Salvatore Baglieri, Head of EMEA – Pixel Carrier Engineering, Google – ELS error rates & best practices
In this session, companies will provide an overview of solutions and expertise that they can offer to emergency services in the framework of the deployment of public warning systems.
In 3 years, Advanced Mobile Location has brought considerable improvements to public safety. In this panel, experts will discuss the latest updates and the future improvements of the technology.
Chair: Christoph Kautz, Deputy Head, Unit Galileo and EGNOS – Applications, security, international cooperation, European Commission
Fiona Lee, Manager, and Alastair Breeze, Software Engineer, Google – Emergency Location Service (ELS): New developments since EENA 2019
Salvatore Baglieri, Head of EMEA – Pixel Carrier Engineering, Google – ELS error rates & best practices
The opportunities presented by the roll-out of LTE are significant but are those challenges well known? In this session attendees heard from experts about how the emergency services will potentially benefit from LTE and how the rollout will impact on the emergency services.
Cloud-Based Protection, Making Cities Safer
Nadim Abdulrahim, Vice President Public Safety Sector, Enterprise Business Group Middle East, Huawei Technologies
Advanced Mobile Location is a rapidly expanding technology designed to support the provision of accurate and reliable mobile caller location information to the emergency services. In this session attendees joined us to hear the latest updates from those who are participating in the initiative in Europe.
With the emergency services facing many IT challenges, cloud and hybrid cloud solutions can alleviate many of the issues. Supporting a scalable, highly available, up-to-date infrastructure and facilitating the consolidation of the IT estate, they can significantly reduce costs and increase operational efficiencies. Join this session to hear how this technology could be concretely used.
Chair: Iratxe Gomez, Presales Manager, Global Emergency Management Solutions, Atos
During public events our emergency services often need to establish a temporary mobile control room to support the field activities. In this session attendees heard about practical examples and experiences of mobile PSAPs and control room deployments.
Markus Bornheim, International Practice Lead Public Safety & Emergency Services, Avaya – Automated drone services with real-time communication and collaboration experience
During public events our emergency services often need to establish a temporary mobile control room to support the field activities. In this session attendees heard about practical examples and experiences of mobile PSAPs and control room deployments.
In 3 years, Advanced Mobile Location has brought considerable improvements to public safety. In this panel, experts will discuss the latest updates and the future improvements of the technology.
Chair: Christoph Kautz, Deputy Head, Unit Galileo and EGNOS – Applications, security, international cooperation, European Commission
The opportunities presented by the roll-out of LTE are significant but are those challenges well known? In this session attendees heard from experts about how the emergency services will potentially benefit from LTE and how the rollout will impact on the emergency services.
iParanoid: an IMSI Catcher - Stingray Intrusion Detection SystemLuca Bongiorni
The goal is the research and development of Intrusion Detection System related with Cell Networks.
Mainly this App will check the status of some Cell Network variables (e.g. Cellid, LAC, A5 Encryption, etc.) subsequently update a local DB and check if the information about the cell networks around the users are valid or if there could be a risk (e.g. possible interception, possible impersonation, etc.).
The opportunities presented by the roll-out of LTE are significant but are those challenges well known? In this session attendees heard from experts about how the emergency services will potentially benefit from LTE and how the rollout will impact on the emergency services.
Cloud-Based Protection, Making Cities Safer
Nadim Abdulrahim, Vice President Public Safety Sector, Enterprise Business Group Middle East, Huawei Technologies
Advanced Mobile Location is a rapidly expanding technology designed to support the provision of accurate and reliable mobile caller location information to the emergency services. In this session attendees joined us to hear the latest updates from those who are participating in the initiative in Europe.
With the emergency services facing many IT challenges, cloud and hybrid cloud solutions can alleviate many of the issues. Supporting a scalable, highly available, up-to-date infrastructure and facilitating the consolidation of the IT estate, they can significantly reduce costs and increase operational efficiencies. Join this session to hear how this technology could be concretely used.
Chair: Iratxe Gomez, Presales Manager, Global Emergency Management Solutions, Atos
During public events our emergency services often need to establish a temporary mobile control room to support the field activities. In this session attendees heard about practical examples and experiences of mobile PSAPs and control room deployments.
Markus Bornheim, International Practice Lead Public Safety & Emergency Services, Avaya – Automated drone services with real-time communication and collaboration experience
During public events our emergency services often need to establish a temporary mobile control room to support the field activities. In this session attendees heard about practical examples and experiences of mobile PSAPs and control room deployments.
In 3 years, Advanced Mobile Location has brought considerable improvements to public safety. In this panel, experts will discuss the latest updates and the future improvements of the technology.
Chair: Christoph Kautz, Deputy Head, Unit Galileo and EGNOS – Applications, security, international cooperation, European Commission
The opportunities presented by the roll-out of LTE are significant but are those challenges well known? In this session attendees heard from experts about how the emergency services will potentially benefit from LTE and how the rollout will impact on the emergency services.
iParanoid: an IMSI Catcher - Stingray Intrusion Detection SystemLuca Bongiorni
The goal is the research and development of Intrusion Detection System related with Cell Networks.
Mainly this App will check the status of some Cell Network variables (e.g. Cellid, LAC, A5 Encryption, etc.) subsequently update a local DB and check if the information about the cell networks around the users are valid or if there could be a risk (e.g. possible interception, possible impersonation, etc.).
Exploring LTE security and protocol exploits with open source software and lo...EC-Council
The security flaws of legacy GSM networks, which lack of mutual authentication and implement an outdated encryption algorithm, are well understood among the technology community and have been extensively discussed for years. However, my smartphone’s settings do not provide the means to shut down the GSM radio to prevent my phone from connecting to a potentially insecure GSM access point. Instead, I have the option to turn off LTE, the fastest mobile network.
This is not the only confusing aspect of mobile network security. Given LTE’s mutual authentication and strong encryption scheme result, there is a general assumption that LTE rogue base stations are not possible. However, before the connection authentication step, any mobile device implicitly trusts (and exchanges a substantial amount of messages with) any LTE base station, legitimate or not, that advertises itself with the right parameters. Such implicit trust and unprotected messages can be exploited to block mobile devices and track their location.
Finally, it is generally assumed that Stingrays and IMSI catchers are expensive equipment that require downgrading the connection of mobile devices to GSM. However, a basic fully-LTE IMSI catcher can be implemented by means of low-cost software radio and slight modification of a well known open-source implementation of the LTE stack.
This talk will present an exploration of the security of LTE networks, as well as experimentation results of passive eavesdropping threats, LTE protocol exploits to block mobile devices and a location leak that allows tracking mobile devices as the connection is handed off from tower to tower.
EGLA's Patent and Intellectual Property Portfolio - LicensingDr. Edwin Hernandez
EGLA represents a variety of patents and intellectual property for sale or license to any bidder. Our IP includes : RF Emulation/Simulation Platforms and Patents, Mobility Protocols for 4G, Cloud-based systems for multimedia streaming, Safety Apps/Cloud with patents (SafeFi) and a Hotel Management System.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The security flaws of legacy GSM networks, which lack of mutual authentication and implement an outdated encryption algorithm, are well understood among the technology community. Moreover, until now, the main cellular vulnerabilities being discovered and exploited in the mobile security research field were based on 2G base stations and GSM open source implementations. The Long Term Evolution (LTE) is the newest standard being deployed globally for mobile communications, and is generally considered secure. LTE’s mutual authentication and strong encryption schemes result in the false assumption that LTE networks are not vulnerable to, for example, rogue base stations, IMSI catchers and protocol exploits. However, these threats are also possible in LTE. Before the authentication and encryption steps of an LTE connection are executed, a mobile device engages in a substantial exchange of unprotected messages with *any* LTE base station (real or rogue) that advertises itself with the right broadcast information. Eavesdropping or spoofing these messages can be leveraged to implement a long list of exploits to which all LTE mobile devices are vulnerable. This talk will demonstrate how to eavesdrop LTE base station broadcast messages, and how to implement full-LTE IMSI catchers and other LTE protocol exploits, such as blocking SIMs and devices. Details will be provided as well on a previously unknown technique to track the location of mobile devices as the connection moves from tower to tower. We will discuss as well the necessary toolset to implement these and other exploits, which are possible with simply $1.5k worth of off-the-shelf hardware and some modifications of the code of widely available LTE open source implementations.
The objective of vehicle theft detection system is to provide prevention of theft activity for any vehicle. Electronic gadgets being a great advancement in the field of technology, these can be used to solve so many day to day problems. If we talk about the theft activity then this mainly happens with vehicles. The technology has also given great solution for these activities. The purpose of this project is to prevent vehicle theft detection. The issue of vehicle theft has increased tremendously nowadays.
LoRa vs NB-IoT, What is the difference between the two LPWAN technologies?
The proliferation of interactive data requires the support of corresponding network technologies, and the network technologies applied at this stage are not yet able to meet the needs of long-distance and narrow-bandwidth communication scenarios, in such a context, the Internet of Things was born. The low-power network, as an important technology for IoT, is developing at the fastest pace.
LPWA - Low power wide area, short for low power wide area technology, using lower power consumption to achieve long-distance wireless signal transmission.
Compared with the familiar low-power Bluetooth (BLE), Zigbee and Wifi technologies, LPWA has a much longer transmission distance, generally at the kilometre level, and its link budget (link budget) can reach 160dBm, while BLE and Zigbee are generally below 100dBm.
Compared with traditional cellular network technologies (2G, 3G), LPWA has lower power consumption, and battery-powered devices can last for several years. Based on these two distinctive features, LPWA can truly enable the Internet of Things (IoT) revolution.
LPWAN - Low power wide area network, i.e. a wireless connection network built with LPWA technology, LPWAN can be connected in various forms.
Kirk Arthur and Chad Wallace, Worldwide Public Safety & Justice, Microsoft Corporation – Improving Urban Safety through innovative technologies and new operational models
In this keynote session, a representative from the European Commission will present the European legislation affecting emergency communications and aspects of its implementation.
Gyula Bara, Policy Officer, European Commission
The high-level performance of frontline professionals is crucial but this becomes increasingly difficult during a long-term crisis with no replacements for personnel and no end in sight. It is essential to think and act differently, working strategically and actively with recovery. We will hear how a team turned a Swedish military concept and experiences from working in conflict zones into a civilian toolbox. The practical techniques were applied in Intensive Care Units managing the COVID-19 pandemic.
• Magdalena Robertsson Lind, Expert in crisis management and resilience, Co-founder of Metis Services
• Håkan Kalzén, Managing Director, Anaesthesia and Intensive Care Clinic Södertälje Hospital, Stockholm, Sweden
Search & Rescue and Missing Persons’ investigations often come to a standstill due to lack of information. How can technology change that? Robert Sell will explore the answer. We will hear how crowdsourced OSINT can be successfully used by emergency services and law enforcement, providing lifesaving information to fill the gaps and bring loved ones back to their families.
Robert Sell, OSINT expert and Founder, Trace Labs
In this session, NENA’s representatives will present how the security of 911 and NG911 services is now considered a priority in the United States. The speakers will explore the ecosystem of security agencies, as well as training and possible funding schemes that are in place or possible legislative efforts that would protect first responders’ agencies – the first point of contact for safety and security.
• Brian Fontes, CEO, NENA: The 9-1-1 Association, USA
• Brandon Abley, Director of Technology, NENA: The 9-1-1 Association, USA
Michael Kelly, Head of Operations, and Ciaran Moynihan, Systems Architect, Emergency Call Answering Service (ECAS), BT Ireland - Remote call-taking as a response to COVID-19
Pablo Gomez, Mass Notification Systems Strategic Marketing Director, Genasys – Multi-channel public warnings adding value in combination to evacuation management solutions
Michael Sargeant, Senior Manager, Public Warning, Everbridge, and Manuel Cornelisse, Chief Sales Officer, one2many, an Everbridge company – Everbridge & one2many – Pioneering Next Generation Public Warning
Amélie Grangeat, Head of Product Public Warning System, and Alessandro Lazari, Senior Key Account Manager, F24 - The F24 Multi-channel Public Warning System: Warn everyone, everywhere, anytime
Björn Skoglund, Operations Specialist on 112 and Crisis Management, SOS Alarm, Sweden – How non-emergency numbers can really help emergency services - The examples of 11313, 11414 and 1177 in Sweden
This presentation, created by Syed Faiz ul Hassan, explores the profound influence of media on public perception and behavior. It delves into the evolution of media from oral traditions to modern digital and social media platforms. Key topics include the role of media in information propagation, socialization, crisis awareness, globalization, and education. The presentation also examines media influence through agenda setting, propaganda, and manipulative techniques used by advertisers and marketers. Furthermore, it highlights the impact of surveillance enabled by media technologies on personal behavior and preferences. Through this comprehensive overview, the presentation aims to shed light on how media shapes collective consciousness and public opinion.
This presentation by Morris Kleiner (University of Minnesota), was made during the discussion “Competition and Regulation in Professions and Occupations” held at the Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found out at oe.cd/crps.
This presentation was uploaded with the author’s consent.
0x01 - Newton's Third Law: Static vs. Dynamic AbusersOWASP Beja
f you offer a service on the web, odds are that someone will abuse it. Be it an API, a SaaS, a PaaS, or even a static website, someone somewhere will try to figure out a way to use it to their own needs. In this talk we'll compare measures that are effective against static attackers and how to battle a dynamic attacker who adapts to your counter-measures.
About the Speaker
===============
Diogo Sousa, Engineering Manager @ Canonical
An opinionated individual with an interest in cryptography and its intersection with secure software development.
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Orkestra
UIIN Conference, Madrid, 27-29 May 2024
James Wilson, Orkestra and Deusto Business School
Emily Wise, Lund University
Madeline Smith, The Glasgow School of Art
Have you ever wondered how search works while visiting an e-commerce site, internal website, or searching through other types of online resources? Look no further than this informative session on the ways that taxonomies help end-users navigate the internet! Hear from taxonomists and other information professionals who have first-hand experience creating and working with taxonomies that aid in navigation, search, and discovery across a range of disciplines.
Acorn Recovery: Restore IT infra within minutesIP ServerOne
Introducing Acorn Recovery as a Service, a simple, fast, and secure managed disaster recovery (DRaaS) by IP ServerOne. A DR solution that helps restore your IT infra within minutes.
2. Opencode Systems - Proprietary and Confidential
About Opencode Systems
▪ Founded in 2000
▪ Headquarters in Sofia, Bulgaria
▪ Specialize in Core Network Technologies & Applications
▪ About 200 Engineers, 60 Customers, 50 Countries
3. Opencode Systems - Proprietary and Confidential
EU DIRECTIVE 2018/1972 KICKS IN
December 11, 2018
EU DIRECTIVE 2018/1972
Came Into Force
4. Opencode Systems - Proprietary and Confidential
DIRECTIVE ARTICLE 110 - 1
▪ 1.By 21 June 2022, Member States shall ensure that, when
public warning systems regarding imminent or developing
major emergencies and disasters are in place, public
warnings are transmitted by providers of mobile number-
based interpersonal communications services to the end-
users concerned.
5. Opencode Systems - Proprietary and Confidential
DIRECTIVE ARTICLE 110 - 2
▪ 2.Notwithstanding paragraph 1, Member States may
determine that public warnings be transmitted through
publicly available electronic communications services other
than those referred to in paragraph 1, and other than
broadcasting services, or through a mobile application relying
on an internet access service, provided that the effectiveness
of the public warning system is equivalent in terms of
coverage and capacity to reach end-users, including those
only temporarily present in the area concerned, taking
utmost account of BEREC guidelines. Public warnings shall be
easy for end-users to receive.
6. Opencode Systems - Proprietary and Confidential
REQUIREMENTS FOR EFFICIENT PUBLIC WARNING
In short, Public Warnings shall:
▪ … be transmitted by/via mobile operators
▪ … to all end-users concerned
▪ … located in the geographic areas being affected
▪ … independently of their place of residence
▪ … as determined by the competent authorities
Inform end-users entering a Member State of the
existence of such a public warning system (SMS)
7. Opencode Systems - Proprietary and Confidential
WHAT ARE THE TECHNICAL OPTIONS?
Communication in case of emergency
Source: ETSI: TS 102 182, Emergency Communications (EMTEL)
8. Opencode Systems - Proprietary and Confidential
WHAT ARE THE TECHNICAL OPTIONS?
▪ TV?
▪ Radio?
▪ Pager?
▪ Civil Defense Sirens?
▪ Voice?
▪ SMS?
▪ Mobile App?
▪ Cell Broadcast?
9. Opencode Systems - Proprietary and Confidential
LIMITATIONS OF TECHNICAL OPTIONS
▪ TV, Radio, Pager, Sirens?
Not via mobile operators, unavailable, unclear..
▪ Voice, SMS?
Inappropriate (location unavailable, network congestions…)
▪ Mobile App?
Must be installed; Data enabled; What about roamers?
10. Opencode Systems - Proprietary and Confidential
CELL BROADCAST!
▪ Cell Broadcast is a mobile technology that allows messages to
be broadcasted to all mobile devices based in, or entering a
designated geographical area.
▪ Messages are very similar to flash SMS (1395 characters,
default character set)
▪ Area could be a single radio cell, a group of cells or even the
whole network
▪ Not a new technology! First demonstrated in Paris in 1997
11. Opencode Systems - Proprietary and Confidential
CELL BROADCAST vs SMS
CELL BROADCAST SMS
Point to Area Point to Point
Dependant of Location Independant of Location
No need for Mobile ID Need for Mobile ID
Repetition No Repetition
Independant of Congestion Dependant/Increases Congestion
Specific User Experience Regular User Experience
Strong Security Poor Security
12. Opencode Systems - Proprietary and Confidential
CELL BROADCAST - Efficiency
▪ CB messages are sent to the radio infrastructure, bypassing
the core, directed to Cells
▪ Millions of mobile users can be notified in few seconds
Cell Broadcast
Radio infra:
BSC/RNC/MME
Location A
Location B
Location C
Agency
13. Opencode Systems - Proprietary and Confidential
CELL BROADCAST – Service Flows example
5-a. Broadcast
Information
1. Registration and Security Procedures
6. User
Alerting
2. Information
CBE
5-b. Paging
5-c. Primary Notification
with Security
SGSN NodeB UEiCBC
3. Write - Replace
7. Report - Success
8. Ack.
RNC
4. Broadcast
Request
Warning message delivery procedure in UTRAN (3G)
14. Opencode Systems - Proprietary and Confidential
CELL BROADCAST - Activation
Activation for Android devices
15. Opencode Systems - Proprietary and Confidential
CELL BROADCAST - Activation
Activation for iPhone
16. Opencode Systems - Proprietary and Confidential
CELL BROADCAST – User Experience
Example of an Amber Alert
(Missing Persons)
18. Opencode Systems - Proprietary and Confidential
Case Study: RO ALERT
Romania – General Overview:
▪ Population: 20 million (2018)
▪ Mobile subscribers: 28 million (2018)
▪ Area: 235,000 square km.
▪ GDP: $27,653 (PPP, 2019 est.)
▪ Mobile networks:
▪ Orange (2G,3G,4G)
▪ Vodafone (2G,3G,4G)
▪ T-Mobile (2G,3G,4G)
▪ Digi Mobil (3G,4G)
19. Opencode Systems - Proprietary and Confidential
Case Study: RO ALERT
▪ Romanian Government Initiative: RO ALERT
▪ Owned by the Special Telecommunications Service (STS) Agency,
providing special telecommunications services to public authorities:
▪ The Romanian Parliament
▪ The Presidential Administration
▪ The Romanian Government
▪ National Security, Law Enforcement, National Defense Agencies
▪ Judicial Authority
▪ National & Single European 112 Emergency Number Service
▪ Others
20. Opencode Systems - Proprietary and Confidential
Case Study: RO ALERT
▪ Romanian Government Initiative: RO ALERT for national Cell
Broadcast-based Early Warning System
▪ RO ALERT deployed on 2G, 3G, 4G networks of Orange,
Vodafone, T-Mobile and Digi Mobil
▪ Integrated with 300+ radio nodes (BSC, RNC, MME) and
250K+ cells
▪ BSC, RNC, MME from Huawei, Ericsson, Nokia and ZTE
▪ Ready for Live service in April 2018 (4/5 months project)
22. Opencode Systems - Proprietary and Confidential
Case Study: RO ALERT
Screenshot taken during a
national test of the system.
Message translation:
This is a test message from
the RO-ALERT systems.
There is no need to take
any protective/safety
measures. Romania’s
Department for Emergency
Situations.
Alert to Local Subscriber
23. Opencode Systems - Proprietary and Confidential
Case Study: RO ALERT
Same alert received by a
Bulgarian roamer in
Romania.
The message title is in the
phone’s default language –
in this case Bulgarian.
Alert to Roaming Subscriber
24. Opencode Systems - Proprietary and Confidential
Case Study: RO ALERT
Same alert received directly on a
Smartwatch with a SIM card.
Alert on Smartwatch
25. Opencode Systems - Proprietary and Confidential
Case Study: RO ALERT
The moment the alert is received (short video)
26. Opencode Systems - Proprietary and Confidential
Case Study: RO ALERT
▪ 16.11.2018 RO-Alert text:
Incendiu fabrica de mobilă cu
degajări mari de fum. Pentru
asigurarea protecţiei, ramâneţi în
incinte, închideţi geamurile şi nu
vă expuneţi la fum. Respectaţi
recomandările pompierilor!
27. Opencode Systems - Proprietary and Confidential
Case Study: RO ALERT
▪ 23.11.2018 RO-Alert text:
Populaţia este sfătuită să rămână
în case şi să evite zona. În plus,
oamenii sunt rugaţi să nu se
expună la fum şi să elibereze
coloarele de trecere pentru
maşinile de intervenţie.
28. Opencode Systems - Proprietary and Confidential
Case Study: RO ALERT
▪ 04.12.2018 RO-Alert text:
Atenție, urs observat liber în zona
strada Turnului. Evitați zona.
29. Opencode Systems - Proprietary and Confidential
Case Study: RO ALERT
▪ 26.01.2019 RO-Alert text:
Pentru evitarea suprasolicitarii
sistemului de apel 112, rugam
populatia din Bucuresti si Ilfov, sa
evite apelurile repetate la 112 care
vizeaza degajarea copacilor sau
alte situatii similare, cu exceptia
celor cu victime sau care pun in
pericol imediat viata.
30. Opencode Systems - Proprietary and Confidential
Case Study: RO ALERT
▪ 02.02.2019 RO-Alert text:
Norul de fum şi-a schimbat direcţia
şi se îndreaptă şi spre municipiul
Alba Iulia. Pentru asigurarea
protecţiei, rămâneţi în incinte,
închideţi geamurile şi nu vă
expuneţi la fum. Respectaţi
recomandările pompierilor.
31. Opencode Systems - Proprietary and Confidential
Case Study: RO ALERT
▪ 19.02.2019 RO-Alert text:
Incendiu depozit Remat în comuna
Afumaţi/Ilfov cu degajări mari de
fum. Norul de fum se îndreaptă
către municipiul Bucureşti. Pentru
asigurarea protecţiei, rămâneţi pe
cât posibil într-o incintă, închideţi
geamurile şi nu vă expuneţi la
fum. Respectaţi recomandările
pompierilor DSU-IGSU.
32. Opencode Systems - Proprietary and Confidential
Case Study: RO ALERT
▪ 08.03.2019 RO-Alert text:
Pentru asigurarea protecției,
rămâneți pe cât posibil în incinte,
închideți geamurile și nu vă
expuneți la fum. Respectați
recomandările pompierilor
33. Opencode Systems - Proprietary and Confidential
Case Study: RO ALERT
▪ 10.03.2019 RO-Alert text:
Incendiu la un depozit de materiale de
constructii, comuna Sascut, sat
Sascut. Incendiul se manifesta cu
degajari mari de fum. Norul de fum se
indreapta pe directia Sascut – Adjud.
Pentru asigurarea protectiei ramaneti
pe cat posibil in incinte, inchideti
geamurile si nu va expuneti la fum.
Respectati recomandarile pompierilo
34. Opencode Systems - Proprietary and Confidential
Case Study: RO ALERT
▪ 20.03.2019 RO-Alert text:
Atenţie! Urs observat în zona
Lunca Oltului! Evitaţi zona!
Inspectoratul pentru Situaţii de
Urgenţă ”Mihai Viteazul” al
judeţului Covasna
35. Opencode Systems - Proprietary and Confidential
Cell Broadcast – Project
▪ Key points for project organisation:
Who is platform owner?
Who is operation owner?
How is maintenance organized?
…
36. Opencode Systems - Proprietary and Confidential
Cell Broadcast – Next Phases
▪ Extend to other channels:
▪ SMS for VIP list, etc.
▪ 5G
▪ Collect information from:
▪ Number of devices attached on zones
▪ Nationalities detected
▪ Collect MSISDNs for post campaign, identification
▪ Etc.