This document discusses the use of geospatial technology for homeland security. It outlines how geospatial information, including maps, imagery and aerial data, can help with critical tasks like disaster preparedness, response and management. It describes the need for geospatial data to tackle threats like terrorism and insurgency. It also discusses the US Department of Homeland Security's spatial data infrastructure and initiatives like the Homeland Infrastructure Foundation-Level Data working group, which aim to facilitate collaboration and sharing of geospatial data between agencies during crises. The Geospatial Concept of Operations (GeoCONOPS) framework is mentioned as helping to ensure timely and accurate geospatial data can be accessed and used to support emergency response operations.
My article on Smart Policing Published In Express Computer, Jan '16 Edition, where i have covered Emerging Technologies for Better Policing and Technologies for Safe Cities in depth.
My article on Smart Policing Published In Express Computer, Jan '16 Edition, where i have covered Emerging Technologies for Better Policing and Technologies for Safe Cities in depth.
The explosion of information in almost all quarters of our lives has changed the way we make decisions. In a world that is rapidly evolving, how can modern day defence organizations take advantage of the latest technology in geo-spatial intelligence? What are the unique challenges that Asian defence organizations face and how are these challenges being addressed, now?
Conceptual framework for geospatial data securityijdms
Â
Due to rapid growth of distributed network and Inte
rnet, it becomes easy for data providers and users
to
access, manage, and share voluminous geospatial dat
a in digital form. With Internet, it becomes very e
asy
to distribute and copy geospatial data. Therefore,
it becomes necessary to protect geospatial data fro
m
illegal and unauthorized usage. The increase avail
ability of tools and techniques to access and disse
minate
geospatial data has made more urgent to protect it.
Security mechanism should be enforced at geospati
al
data storage, dissemination, and at data retrieval
to protect geospatial data from illicit users. In t
his paper,
conceptual framework for geospatial data security i
s proposed by considering unique security requireme
nts
of geospatial data
Fundamentals of Remote Sensing - Introduction
What is Remote Sensing?
So, what exactly is remote sensing? For the purposes of this tutorial, we will use the following definition:
"Remote sensing is the science (and to some extent, art) of acquiring information about the Earth's surface without actually being in contact with it. This is done by sensing and recording reflected or emitted energy and processing, analyzing, and applying that information."
In much of remote sensing, the process involves an interaction between incident radiation and the targets of interest. This is exemplified by the use of imaging systems where the following seven elements are involved. Note, however that remote sensing also involves the sensing of emitted energy and the use of non-imaging sensors.
Research and development project proposal written in december 1994. The purpose was to offer a strategy and a commitment to an evolutionary approach in the development of a system to provide Regional Geospatial Information and service.
Setting up of a Kenya National Domestic Violence Call Center (K-NDVCC): Proto...drboon
Â
Domestic violence can involve men to women, men to children, women to children and sometimes women to men. Domestic violence in Kenya is mostly prevalent in middle-income and lower-income levels of the society. In this paper, a prototype system is implemented to administer and manage a national domestic violence call center. This is a GIS-based call center system supporting distress calls by: (i) automatically identifying callers’ locations, (ii) Quickly assessing accurate spatial information from its database about nearby advocate resources and reporting back to the caller, the identified advocate, and (iii) publishing maps in Keyhole Markup Language for viewing in software supporting open standards such as Google Earth. The system was validated using sample data collected from Juja location. This prototype shows promise of being able to offer rapid and timely responses to domestic violence (and other) distress requests utilizing geospatially enabled technologies.
The explosion of information in almost all quarters of our lives has changed the way we make decisions. In a world that is rapidly evolving, how can modern day defence organizations take advantage of the latest technology in geo-spatial intelligence? What are the unique challenges that Asian defence organizations face and how are these challenges being addressed, now?
Conceptual framework for geospatial data securityijdms
Â
Due to rapid growth of distributed network and Inte
rnet, it becomes easy for data providers and users
to
access, manage, and share voluminous geospatial dat
a in digital form. With Internet, it becomes very e
asy
to distribute and copy geospatial data. Therefore,
it becomes necessary to protect geospatial data fro
m
illegal and unauthorized usage. The increase avail
ability of tools and techniques to access and disse
minate
geospatial data has made more urgent to protect it.
Security mechanism should be enforced at geospati
al
data storage, dissemination, and at data retrieval
to protect geospatial data from illicit users. In t
his paper,
conceptual framework for geospatial data security i
s proposed by considering unique security requireme
nts
of geospatial data
Fundamentals of Remote Sensing - Introduction
What is Remote Sensing?
So, what exactly is remote sensing? For the purposes of this tutorial, we will use the following definition:
"Remote sensing is the science (and to some extent, art) of acquiring information about the Earth's surface without actually being in contact with it. This is done by sensing and recording reflected or emitted energy and processing, analyzing, and applying that information."
In much of remote sensing, the process involves an interaction between incident radiation and the targets of interest. This is exemplified by the use of imaging systems where the following seven elements are involved. Note, however that remote sensing also involves the sensing of emitted energy and the use of non-imaging sensors.
Research and development project proposal written in december 1994. The purpose was to offer a strategy and a commitment to an evolutionary approach in the development of a system to provide Regional Geospatial Information and service.
Setting up of a Kenya National Domestic Violence Call Center (K-NDVCC): Proto...drboon
Â
Domestic violence can involve men to women, men to children, women to children and sometimes women to men. Domestic violence in Kenya is mostly prevalent in middle-income and lower-income levels of the society. In this paper, a prototype system is implemented to administer and manage a national domestic violence call center. This is a GIS-based call center system supporting distress calls by: (i) automatically identifying callers’ locations, (ii) Quickly assessing accurate spatial information from its database about nearby advocate resources and reporting back to the caller, the identified advocate, and (iii) publishing maps in Keyhole Markup Language for viewing in software supporting open standards such as Google Earth. The system was validated using sample data collected from Juja location. This prototype shows promise of being able to offer rapid and timely responses to domestic violence (and other) distress requests utilizing geospatially enabled technologies.
Attacks on the enterprise are getting increasingly sophisticated. Current solutions available do not seem to be adequate given the innovativeness, precision and persistence of these attacks in different forms and of different dimensions. Organisations thus want to increase the sophistication of their employees and also of the solutions to be deployed given this backdrop.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Â
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
Â
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Â
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
Â
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
Â
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Â
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
DevOps and Testing slides at DASA ConnectKari Kakkonen
Â
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Â
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
Â
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
2. a watershed is modern history
World brought to the brink of
di disaster
Most negative use of technology
history of mankind
The word changed forever
Privacy was given a go by
Technology took the world
center stage
The images of 9/11 will remain
with us forever
3. Geospatial Technology
A picture is better that a thousand
words
The story of the six blind men and the
elephant
The third eye
5. Homeland Security
Technological Framework for Safe and
Secure Cities in India
• Command and Control Centers• Command and Control Centers
• City based Video Surveillance System
• Interception Systems
• TETRA Public Safety Network
• Geospatial Technology
• Managerial Response to War on Terror
6. Geospatial Tech for HS
Presentation Structure
The need
Data with a difference
The power of processing
The US Geospatial Admin/functionalThe US Geospatial Admin/functional
Mechanism
Homeland Security, its scope
Usage of Geospatial Data
Remote Sensing Data Policy
Most Critical Input/Usage
7. Geospatial Tech for HS
Geospatial Information
As per DHS Spatial Data Infrastructure (SDI)
GeospatialGeospatialGeospatialGeospatial informationinformationinformationinformation includes Surveys,Surveys,Surveys,Surveys,
maps,maps,maps,maps, charts,charts,charts,charts, remoteremoteremoteremote sensingsensingsensingsensing datadatadatadata andandandand imagesimagesimagesimages
andandandand aerialaerialaerialaerial photographicphotographicphotographicphotographic servicesservicesservicesservices; and
technology including global surveillance, GPS,
GIS, mapping, geo-coding and remote sensing
8. Geospatial Tech for HS
GS Requirements
Who needs Maps?
I think everybody does. The Map of today is the
Geospatial Information as the requirements areGeospatial Information as the requirements are
much more complex yet precise, the demand
for which is dictated by ground realities.
HereinHereinHereinHerein lieslieslieslies thethethethe needneedneedneed forforforfor GeospatialGeospatialGeospatialGeospatial InformationInformationInformationInformation
9. Geospatial Tech for HS
Geospatial Information- the need?
Internal and external wars are getting intertwined
InsurgencyInsurgencyInsurgencyInsurgency groupsgroupsgroupsgroups in far flung areas
Prevalence of NaxalitesNaxalitesNaxalitesNaxalites it large number of states
TerrorTerrorTerrorTerror strikesstrikesstrikesstrikes primarily in urban centers in open areas,
critical and important infrastructure and mass transit
systems
10. Geospatial Tech for HS
Geospatial Information- the need?
These are certainly normal law and order issues or
situations and has to be tackled differently in strategy
and inputs
ConventionalConventionalConventionalConventional inputsinputsinputsinputs areareareare notnotnotnot ableableableable totototo givegivegivegive actionableactionableactionableactionableConventionalConventionalConventionalConventional inputsinputsinputsinputs areareareare notnotnotnot ableableableable totototo givegivegivegive actionableactionableactionableactionable
datadatadatadata to a level where the results can either be
predicted or dictated, the requirements of geospatial
inputs is of critical importance
ClarityClarityClarityClarity onononon requirementsrequirementsrequirementsrequirements
11. Geospatial Tech for HS
DHS Mission Statement provides the connect
According to the National Strategy for Homeland
Security and DHS’S mission statement,
homeland security covers prevention, protection,
response, and recovery.response, and recovery.
GeospatialGeospatialGeospatialGeospatial productsproductsproductsproducts andandandand intelligenceintelligenceintelligenceintelligence playplayplayplay aaaa keykeykeykey rolerolerolerole inininin
departments’departments’departments’departments’ preparationpreparationpreparationpreparation forforforfor disastersdisastersdisastersdisasters andandandand itsitsitsits
responseresponseresponseresponse totototo themthemthemthem andandandand supportsupportsupportsupport incidentincidentincidentincident managementmanagementmanagementmanagement
12. Sun Synchronous Imaging Satellites
RRRR
EEEE
QQQQ
UUUU
IIII
RRRR
EEEE
MMMM
EEEE
Swath
Sun Sync Satellite
Spectral Bands
EEEE
TTTT
SSSS
Swath
Ortho Pan
14. Geospatial Tech for HS
Geospatial Information Stages
Geo
Technologies
are at the core
of HS/ Spatial
Geo
Core
Ideas
are at the core
of HS/ Spatial
Data most
critical
Data
Specialty
Fields
15. Geospatial Tech for HS
Geospatial Preparedness
The power of Processing
Appropriate
Geospatial Assets
Imagery/data asImagery/data as
required
Processing
16. Geospatial Tech for HS
Geospatial Preparedness
The power of Processing
Inputs as per software
requirements
Appropriate Software
Actionable Output
17. Geospatial Tech for HS
Geospatial Preparedness
The power of Processing
The human expertise
StandardStandard
Communications &
Operations
The data/the SP/the Ops
Commander all on the
same page, real time
18. Geospatial Tech for HS
DHS Spatial Data Infrastructure
DHSDHSDHSDHS SpatialSpatialSpatialSpatial DataDataDataData InfrastructureInfrastructureInfrastructureInfrastructure (SDI),a subset of
Enterprise Architecture, consists of geographicgeographicgeographicgeographic
systemsystemsystemsystem softwaresoftwaresoftwaresoftware andandandand hardware,hardware,hardware,hardware, geospatialgeospatialgeospatialgeospatialsystemsystemsystemsystem softwaresoftwaresoftwaresoftware andandandand hardware,hardware,hardware,hardware, geospatialgeospatialgeospatialgeospatial
applications,applications,applications,applications, data,data,data,data, standards,standards,standards,standards, policies,policies,policies,policies, programs,programs,programs,programs, and
the human resources necessary to acquire, process,
analyze, store, maintain, distribute, and otherwise use
geospatial data as a strategic asset for the DHS and
the nation
19. Geospatial Tech for HS
DHS Spatial Data Infrastrucuture
BasisBasisBasisBasis
The basis for an SDISDISDISDI isisisis totototo identifyidentifyidentifyidentify andandandand organizeorganizeorganizeorganize corecorecorecore
capabilitiescapabilitiescapabilitiescapabilities thatthatthatthat havehavehavehave commoncommoncommoncommon applicationsapplicationsapplicationsapplications and to
ensure the transport of data, via compatible
formatting, across DHS
20. Geospatial Tech for HS
DHS Spatial Data Infrasructure
WhatWhatWhatWhat willwillwillwill itititit deliverdeliverdeliverdeliver
Completing and maintaining an SDI with integratedintegratedintegratedintegrated
applicationsapplicationsapplicationsapplications andandandand systemssystemssystemssystems would provide the level of
geospatial preparednesspreparednesspreparednesspreparedness required to protect the
nation’s critical infrastructure, strategic assets ,
economic base, and America’s citizens
21. Geospatial Tech for HS
HomelandInfrastructure Foundation Level
Data (IHFLD) Working Group
Homeland Infrastructure Foundation Level
Data(IHFLD) Working Group
Dept. of DefenseDept of HS National Geospatial
Intelligence Agency
US Geological Survey
22. Geospatial Tech for HS
HomelandInfrastructure Foundation Level
Data (HIFLD) Working Group
TheTheTheThe HIFLDHIFLDHIFLDHIFLD membersmembersmembersmembers recognizerecognizerecognizerecognize thatthatthatthat totototo
collaboratecollaboratecollaboratecollaborate duringduringduringduring terroristterroristterroristterrorist attacks,attacks,attacks,attacks,
naturalnaturalnaturalnatural disasterdisasterdisasterdisaster andandandand otherotherotherother crisis,crisis,crisis,crisis, allallallallnaturalnaturalnaturalnatural disasterdisasterdisasterdisaster andandandand otherotherotherother crisis,crisis,crisis,crisis, allallallall
agenciesagenciesagenciesagencies needneedneedneed aaaa commoncommoncommoncommon operatingoperatingoperatingoperating
picturepicturepicturepicture andandandand thethethethe assuranceassuranceassuranceassurance thatthatthatthat theirtheirtheirtheir datadatadatadata
isisisis consistentconsistentconsistentconsistent andandandand completecompletecompletecomplete
23. Geospatial Tech for HS
Inter- Agency Geospatial Concept
of Operations
GeoCONOPS
BackgroundBackgroundBackgroundBackground
In recent years, federal mission partners have beenIn recent years, federal mission partners have been
have been operatingoperatingoperatingoperating withwithwithwith minimalminimalminimalminimal formalformalformalformal guidanceguidanceguidanceguidance
and little direction on how to conductconductconductconduct geospatialgeospatialgeospatialgeospatial
supportsupportsupportsupport to the emergency response and homeland
security operation regimes, relyingrelyingrelyingrelying insteadinsteadinsteadinstead onononon adadadad hochochochoc
coordinationcoordinationcoordinationcoordination andandandand bestbestbestbest effortseffortseffortsefforts
24. Geospatial Tech for HS
Geospatial Concept of Operations
GeoCONOPS
BackgroundBackgroundBackgroundBackground
As a result, previous geospatial effort in support of
incident management has frequently been slow to
start or have been completelycompletelycompletelycompletely unavailableunavailableunavailableunavailable
immediatelyimmediatelyimmediatelyimmediately followingfollowingfollowingfollowing aaaa disasterdisasterdisasterdisaster, leaving the “fullimmediatelyimmediatelyimmediatelyimmediately followingfollowingfollowingfollowing aaaa disasterdisasterdisasterdisaster, leaving the “full
power” and benefits of geospatial technology
unrealized
GeoCONOPSGeoCONOPSGeoCONOPSGeoCONOPS ensuresensuresensuresensures thatthatthatthat timelytimelytimelytimely andandandand accurateaccurateaccurateaccurate
geospatialgeospatialgeospatialgeospatial datadatadatadata isisisis sharedsharedsharedshared
26. Geospatial Tech for HS
Geospatial Concept of Operations
GeoCONOPS
By defining the mechanisms and authorities, the
GeoCONOPSGeoCONOPSGeoCONOPSGeoCONOPS aimsaimsaimsaims totototo reducereducereducereduce redundancyredundancyredundancyredundancy andandandand
confusionconfusionconfusionconfusion and ensure efficient access to geospatial
information for incident management
GeospatialGeospatialGeospatialGeospatial technologytechnologytechnologytechnology providesprovidesprovidesprovides aaaa significantsignificantsignificantsignificant rolerolerolerole inininin
incidentincidentincidentincident managementmanagementmanagementmanagement.... Its uses today include disaster
early warning and mitigation, border monitoring,
criminal investigations, public health protection and
critical infrastructure oversight
27. Geospatial Tech for HS
The National GeospatialNational GeospatialNational GeospatialNational Geospatial----IntelligenceIntelligenceIntelligenceIntelligence
AgencyAgencyAgencyAgency (NGANGANGANGA) is an agency of the federal
government of the United States with the primarygovernment of the United States with the primary
mission of collecting, analyzing, and
distributing geospatial intelligence (GEOINT) in
support of national security.
28. Geospatial Tech for HS
The National Geospatial-Intelligence
Agency
"Know the Earth...
Show the Way...Show the Way...
Understand the World"
29. Geospatial Tech for HS
The National Geospatial-Intelligence
Agency
The NGA was credited by White House and
military officials with providing critical
information in support of Operation
Neptune's Spear on May 2, 2011, in whichNeptune's Spear on May 2, 2011, in which
the United States Military raided a secret
compound housing Osama Bin Laden in
Abbottabad, Pakistan, at which time he was
killed in action.
30. Geospatial Tech for HS
Geospatial Preparedness
TheTheTheThe FinalFinalFinalFinal DestinationDestinationDestinationDestination
Means the level of overalloveralloveralloverall capabilitycapabilitycapabilitycapability andandandand capacitycapacitycapacitycapacity
necessarynecessarynecessarynecessary totototo enableenableenableenable allallallall levelslevelslevelslevels of the Dept to use
geospatial data, geographic information systems
software and hardware, and geospatial applications totototosoftware and hardware, and geospatial applications totototo
performperformperformperform essentialessentialessentialessential functionsfunctionsfunctionsfunctions suchsuchsuchsuch asasasas prevention,prevention,prevention,prevention,
detection,detection,detection,detection, planning,planning,planning,planning, mitigation,mitigation,mitigation,mitigation, response,response,response,response, andandandand recoveryrecoveryrecoveryrecovery
inininin orderorderorderorder totototo minimizeminimizeminimizeminimize losslosslossloss ofofofof lifelifelifelife andandandand propertypropertypropertyproperty form
weapons of mass destruction, terrorist threats, major
threats, major man made accidents, and natural
disasters
31. Geospatial Tech for HS
Homeland Security
• Homeland security is an umbrella term for
security efforts to protect the United
States against terrorist activity
• United States Department of Homeland
Security (DHS), is a new cabinet department
established as a result of the Homeland
Security Act of 2002.
32. Geospatial Tech for HS
Homeland Security
• United States National Guard,
• Federal Emergency Management Agency,
• United States Coast Guard,
• U.S. Customs and Border Protection,• U.S. Customs and Border Protection,
• U.S. Immigration and Customs Enforcement,
• United States Citizenship and Immigration Services,
• United States Secret Service,
• Transportation Security Administration,
• Civil Air Patrol etc
33. Geospatial Tech for HS
Homeland Security
Homeland security is officially defined by the
National Strategy for Homeland Security as
“ a concerted national effort to prevent terrorist“ a concerted national effort to prevent terrorist
attacks within the United States, reduce
America's vulnerability to terrorism, and
minimize the damage and recover from attacks
that do occur "
34. Geospatial Tech for HS
Homeland Security
Homeland security is officially defined by the
National Strategy for Homeland Security as
“ a concerted national effort to prevent terrorist“ a concerted national effort to prevent terrorist
attacks within the United States, reduce
America's vulnerability to terrorism, and
minimize the damage and recover from attacks
that do occur "
35. Geospatial Tech for HS
Scope of Homeland Security
Emergency preparedness and response (for both
terrorism and natural disasters), including volunteer
medical, police, emergency management,
and fire personnel;
Domestic intelligence activities, largely today within
the FBI;
Critical infrastructure and perimeter protection;
Border security, including both land, maritime and
country borders;
36. Geospatial Tech for HS
Scope of Homeland Security…
Transportation security, including aviation and maritime
transportation;
Biodefense;Biodefense;
Detection of radioactive and radiological materials;
Research on next-generation security technologies.
37. Geospatial Tech for HS
Some applications in Homeland Security
TerrainTerrainTerrainTerrain plays a key role/nature and profile of the terrain
Security of CriticalCriticalCriticalCritical InfrastructureInfrastructureInfrastructureInfrastructure and Mass
Transportation Systems
38. Geospatial Tech for HS
Some applications in Homeland Security
The information about the floorfloorfloorfloor planplanplanplan andandandand thethethethe structurestructurestructurestructure
of the building can help in designingdesigningdesigningdesigning thethethethe securitysecuritysecuritysecurity planplanplanplan
for the same
Living Memory Provides For Large Number Of Such
Examples.
ThisThisThisThis itselfitselfitselfitself cancancancan transformtransformtransformtransform ourourourour confidenceconfidenceconfidenceconfidence levellevellevellevel inininin ourourourour
daydaydayday totototo lawlawlawlaw enforcementenforcementenforcementenforcement
39. Geospatial Technology
Some applications in Homeland Security
GeospatialGeospatialGeospatialGeospatial TechnologyTechnologyTechnologyTechnology provides enhanced geospatial
understanding of a facilities vulnerabilities and speed
up detectiondetectiondetectiondetection andandandand responseresponseresponseresponse timetimetimetime in the event of a
security breachsecurity breach
RapidRapidRapidRapid accessaccessaccessaccess totototo extensiveextensiveextensiveextensive datadatadatadata, displayed in a
geospatial medium helps protectprotectprotectprotect criticalcriticalcriticalcritical assetsassetsassetsassets andandandand
infrastructureinfrastructureinfrastructureinfrastructure and ensures public safety
40. Asymmetric Warfare
Remote Sensing Data Policy
Department of Space (DOS) of the Government of India
will be the nodalnodalnodalnodal agencyagencyagencyagency for all actions under this
policy, unless otherwise stated.
For operating a remote sensing satelliteremote sensing satelliteremote sensing satelliteremote sensing satellite from India,
licenselicenselicenselicense and/or permission of the Government, through
the nodal agency, will be necessary.
41. Asymmetric Warfare
Remote Sensing Data Policy
As a national commitmentnational commitmentnational commitmentnational commitment and as a “public good”,
Government assures a continuous/improving
observing/imaging capabilityobserving/imaging capabilityobserving/imaging capabilityobserving/imaging capability from its own Indianobserving/imaging capabilityobserving/imaging capabilityobserving/imaging capabilityobserving/imaging capability from its own Indian
Remote Sensing Satellites (IRS) program
42. Asymmetric Warfare
National Remote Sensing Policy
Government guidelines for dissemination of satelliteGovernment guidelines for dissemination of satelliteGovernment guidelines for dissemination of satelliteGovernment guidelines for dissemination of satellite
remote sensing data in India:remote sensing data in India:remote sensing data in India:remote sensing data in India:
All data of resolutions up to 5.8 mresolutions up to 5.8 mresolutions up to 5.8 mresolutions up to 5.8 m shall be distributed on a
nondiscriminatory basis and on “as requested basis”“as requested basis”“as requested basis”“as requested basis”nondiscriminatory basis and on “as requested basis”“as requested basis”“as requested basis”“as requested basis”
With a view to protect national security interests, all data
of 5.8 m and better5.8 m and better5.8 m and better5.8 m and better than 5.8 m resolution images will be
screened by the appropriate agencyscreened by the appropriate agencyscreened by the appropriate agencyscreened by the appropriate agency before distribution so
that images of sensitive areassensitive areassensitive areassensitive areas are excluded.
43. Asymmetric Warfare
National Remote Sensing Policy
NRSANRSANRSANRSA will be competent to entercompetent to entercompetent to entercompetent to enter into agreementsagreementsagreementsagreements with
foreign satellite operators for acquisition/distribution
of foreign satellite dataforeign satellite dataforeign satellite dataforeign satellite data in India. However, so far the
acquisition/distribution of IKONOS dataIKONOS dataIKONOS dataIKONOS data in India isacquisition/distribution of IKONOS dataIKONOS dataIKONOS dataIKONOS data in India is
concerned, Antrix Corporation Limited (of DoS) will
conclude agreements with Space ImagingSpace ImagingSpace ImagingSpace Imaging CoporationCoporationCoporationCoporation
on such terms and conditions as may considered
appropriate by it and NRSA will distributeNRSA will distributeNRSA will distributeNRSA will distribute as per the
terms agreed with Antrix
44. Geospatial Tech for HS
Most Critical Input
• Geospatial data dovetails perfectly with homeland
security, law enforcement and emergency response at
all levels.
• It enables people to know where they are, find where• It enables people to know where they are, find where
they need to go, what they can expect to find there and
how to effectively deal with it.
• It can greatly improve information sharing and
decision making.
45. Geospatial Tech for HS
Most Critical Input
Geospatial Technologies help
overcome the enormous challenges
associated with major incidents.associated with major incidents.
think of a Osama type operation for
26/11?
46. Geospatial Tech for HS
Objective Data
• Geospatial mapping also helps remove
language barriers among mission partners.language barriers among mission partners.
• Each specialty has its own lexicon that other
partners may not fully understand.
47. Geospatial Tech for HS
Objective Data
• Geospatial mapping enables people to
comprehend data without having to learn
different disciplines’ jargon.different disciplines’ jargon.
• This has the important side benefit of fostering
better relationships and trust among mission
partners.
48. Geospatial Tech for HS
The real usage
• Geospatial technology is already
integrated into many U.S. fire and police
departments.
• Specialized mobile devices and smart
phones equipped with mobile
applications are now commonplace.
49. Geospatial Tech for HS
The real usage
• Most fire and police vehicles have laptops
running mapping software, which enables them to
respond more quickly and accurately to
incidents.
• They can determine if a route is blocked or will
accommodate their vehicle.
• That kind of real-time insight makes a real
difference.
50. Geospatial Tech for HS
The Future
• Recent years have seen quantum jump in the use
of this technology- quantitative and qualitative
• In coming years, geospatial technologies will only
become more common, powerful and intuitive.become more common, powerful and intuitive.
• The proven business case for their utility will
drive integration with other existing technologies
(voice recognition, for instance) and innovation
into new areas.
51. Geospatial Tech for HS
The Future
• The proliferation of Web mapping
services will make it easier to share
information across federal, state and local levels.
• It will continue to become easier to fuse
different kinds of data and build even
more layered, detailed maps to aid near real-
time decision making.
52. Geospatial Tech for HS
The Future
The ability to integrate information in
a geospatial context will improve oura geospatial context will improve our
nation’s responders’ ability to think
visually, prepare nationally and
respond locally – leading to a safer
country for us all.
57. Impacts everything from navigation to law
enforcement
Geospatial TechnologyGeospatial TechnologyGeospatial TechnologyGeospatial Technology
you are lost without ityou are lost without ityou are lost without ityou are lost without it
DESIRED SCENARIODESIRED SCENARIODESIRED SCENARIODESIRED SCENARIO
Case studies - Snapshots
57
58. 58
Analysis of Crime Mapping DataAnalysis of Crime Mapping DataAnalysis of Crime Mapping DataAnalysis of Crime Mapping Data