SlideShare a Scribd company logo
Safer Cities For A Better
Tomorrow
Vulnerability Assessment
Threats
• City Based Threats
• Organized Crime, Acts of TerrorCITY
• White Terror
• Large Amounts of Money LaunderingSTATE
•Destruction of Critical Infrastructure
Illegal landing of weaponry/merchandiseNATIONAL
Technological Framework for Safe and
Secure Cities (TFSSC)
Technol ogi cal Framework i nt ends t o be t he game changer
f or
Homel and Securi t y, provi di ng t he precursor t o generat i ng
t he
f unct i onal i t i es, t he out put of t he Homel and Securi t y
Syst em.
Lack of st andardi zat i on and uni f ormi t y of t echnol ogi cal
pl at f orms
has been t he maj or drawback. Thi s i s t he basi s of
creat i on of saf e and
Technological Framework for Safe
and Secure Cities(TFSSC)
Command and Control Center (CCC)
Interception Systems (IS)
City Based Video Surveillance System (CBVSS)
TETRA Radio Network (TRN)
Geospatial Technology for HLS (GTHLS)
ERP Solution, RDBMS and Integration (ERI)
Managerial Response to War on Terror (MRWT)
Command & Control Centers
City based command and control centers
integrating all feeds, radio, text, audio, video, data,
images and graphics from different angles, through
a viable command and control center software,
creating in the process a state of art C4I command
and control center. It would have the capability to
handle the worst of the terror attacks and natural
disasters at one end and day to day responsive
policing at the other end.
Command and Control Center
Integrated Command Control Coordination And Communication Syst
Command and Control Center
Ci t y based command and cont r ol cent er s
i nt egr at i ng al l f eeds r adi o, audi o, vi deo, t ext ,
dat a, i mages and gr aphi cs f r om di f f er ent
channel s, t hr ough a vi abl e command and cont r ol
cent er sof t war e, cr eat i ng i n t he pr ocess a st at e
of ar t C4I command and cont r ol cent er . I t woul d
have t he capabi l i t y t o handl e wor st of t he
t er r or at t acks and nat ur al di sast er s at one end
and day t o day r esponsi ve pol i ci ng at t he ot her
end.
Command and Control centers
ALERT
Map Data Video Data Incident Data
PCR
a
Ambulance
C4i Operator
Fire
Response Task Completed
Procedure & Reports
Activated Incident Closed
Flow Command and control center - Incident
Interception Systems (IP)
The capability to monitor and penetrate into any mode of
communication and storage for the required suspected
information/data and the capability to analyze and
connect to our requirements on a real time basis is the
urgent need and utility of the Interception Systems which
needs to be put in place, upgraded or scaled up, as the
case may be.
Interception Systems
ReveaLinx Architecture
Data Servers Data Modelling and Analysis Investigation Presentation
Analyst 1 Case A
DB1
WorkstationDeploy
Applications
Presenter
Analyst 2
Develop Applications
DB2 Case
Delivery
Workstation Case B
Results Analyst 3Direct connection to Delivery
systems to retrieve data
Data
Files
ReveaLinks Presenter
Workstation
Mobile ILD Fixed Sat IP
Networks
Verba PSV
Mediation
Storage and Archival
Processing Demand & Speech
WS 1 WS 2 WS3 WS4 WS5 WS6 WS7 WS8
Mass Interception Architecture
Interception Systems
City Based Video Surveillance
System (CBVSS)
CBVSS has a proven track record for providing the best
information (Video footage) to the investigators of terror
attacks across the globe, Kasab, being the prime example
here. Technologically, way ahead of CCTV networks, with
video analytics in build into the system, it helps find
meaning in hours and hours of video footage, giving the
precise output and the connects the investigator is looking
for. A deterrent and a must for any big city.
City Based Video Surveillance System
System Management Protect the core
applications fromPolicy—Reputation—Identity
attack
Application Security
Protect the video
content from
Content Security misuse and
abuse
Network Security
Ensure no
attacks or
Endpoint Security malfunction in
the network
Self-Defending Network:
Ensure end
Best of Breed Security in a users cannot
abuse theSystems Approach
system
Secure access to Video Surveillance System
Management to Video Surveillance Systems
TETRA Radio Network (TRN)
TETRA telecommunications system takes the Police
Communication to the fully digital mode with a complete
integration of all communication gadgets and delivery of
high quality voice/data and other related outputs. TETRA
eludes India. In reality it is an excellent public safety
communication network, improves our response to War on
Terror, organized crime and disaster management.
Al l aut hor i t i es have t hei r own Vi r t ual Pr i vat e
Net wor k(VPN)
TETRA enables sharing of a common
infrastructure between all mission critical users
Geospatial Technology
for HLS (GTHLS)
Conventional inputs are unable to provide actionable data.
The map of today is geospatial imagery/information, the
third eye as it is nicknamed. Geospatial products and
intelligence are critical to planning, preparation and
response to terror attacks, natural & other disasters and
supports incident management. It is a great tool
for regulation, enforcement, monitoring and supervision.
Geospatial Technology provides enhanced
geospatial understanding of a facilities vulnerabilities
and thus speeds up detection and response time in the
event of a security breach
Rapid access to extensive data, displayed in a
geospatial medium helps protect critical assets and
infrastructure and ensures public safety
GEO Spatial Technology
Geo-spatial Information Changes
Geo
Technologies
Specialty
Core Data
Fields
Ideas
ERP Solution, RDBMS
& Integration (ERI)
RDBMS is critical to the functioning of any organization
and ERP provides for populating the data on a real time
basis, bringing the complete functioning of the dept. on
the ERP, in Karnataka, the POLICE IT. Then integration of
the legacy systems with the ERP provides for the
functionalities with which the end users have been
accustomed for long, on a single sign in sign out concept.
How should we implement ERP systems
Obtain the right mix of people, processes and technology!!
ERP Solution
Managerial Response to War
on Terror (MRWT)
Gap anal ysi s shows a huge gap i n t he l earni ng,
ski l l s and at t i t ude of i nt ernal securi t y
managers whi ch ought t o be bri dged. The human
resources shoul d be bet t er t han t he t echni cal
syst emcreat ed and made f unct i onal . Ut i l i t y i s
how best we ut i l i ze. I nnovat i ve met hods
i ncl usi ve of out bound l earni ng needs t o
i ncul cat ed as a part of hi gh end t rai ni ng.
Change management i s t he most cri t i cal
component of our way f orward.
Prof essi onal i sml eadi ng t o gl obal l y
For each technology
A city based network
Integrated into a national
network for that technology
All technologies together
All technologies should
integrate into National
Homeland Security Resource
Base and Incident Management
System
All technologies together
All technologies should
integrate into National
Homeland Security Resource
Base and Incident Management
System
Base Document for HLS
can be the beginning
National Home Security
Blueprint
A resource for all!!!
Visit our Web site HLS –India. Com.
We owe it to every
Indian
Sincere
thanks for
the rapt

More Related Content

Viewers also liked

Tietoturvallisuuden_kevatseminaari_2013_Timo_Lehtimaki
Tietoturvallisuuden_kevatseminaari_2013_Timo_LehtimakiTietoturvallisuuden_kevatseminaari_2013_Timo_Lehtimaki
Tietoturvallisuuden_kevatseminaari_2013_Timo_Lehtimaki
Valtiokonttori / Statskontoret / State Treasury of Finland
 
Project Management & Technical Consultancy Services [Transportation, Rail...
Project Management & Technical Consultancy Services [Transportation, Rail...Project Management & Technical Consultancy Services [Transportation, Rail...
Project Management & Technical Consultancy Services [Transportation, Rail...gabriel_nistorescu
 
Gabriel Nistorescu, PMP [4]
Gabriel Nistorescu, PMP [4]Gabriel Nistorescu, PMP [4]
Gabriel Nistorescu, PMP [4]
gabriel_nistorescu
 
Integrated Solution For Modern Transport Infrastructure
Integrated Solution For Modern Transport InfrastructureIntegrated Solution For Modern Transport Infrastructure
Integrated Solution For Modern Transport Infrastructure
gabriel_nistorescu
 
Benefits of drinking water
Benefits of drinking waterBenefits of drinking water
Benefits of drinking water
Eason Chan
 
10 Tips for WeChat
10 Tips for WeChat10 Tips for WeChat
10 Tips for WeChat
Chris Baker
 

Viewers also liked (6)

Tietoturvallisuuden_kevatseminaari_2013_Timo_Lehtimaki
Tietoturvallisuuden_kevatseminaari_2013_Timo_LehtimakiTietoturvallisuuden_kevatseminaari_2013_Timo_Lehtimaki
Tietoturvallisuuden_kevatseminaari_2013_Timo_Lehtimaki
 
Project Management & Technical Consultancy Services [Transportation, Rail...
Project Management & Technical Consultancy Services [Transportation, Rail...Project Management & Technical Consultancy Services [Transportation, Rail...
Project Management & Technical Consultancy Services [Transportation, Rail...
 
Gabriel Nistorescu, PMP [4]
Gabriel Nistorescu, PMP [4]Gabriel Nistorescu, PMP [4]
Gabriel Nistorescu, PMP [4]
 
Integrated Solution For Modern Transport Infrastructure
Integrated Solution For Modern Transport InfrastructureIntegrated Solution For Modern Transport Infrastructure
Integrated Solution For Modern Transport Infrastructure
 
Benefits of drinking water
Benefits of drinking waterBenefits of drinking water
Benefits of drinking water
 
10 Tips for WeChat
10 Tips for WeChat10 Tips for WeChat
10 Tips for WeChat
 

Similar to HLS Perspective, Safer cities for a better tomorrow

Cyber security and Homeland security
Cyber security and Homeland securityCyber security and Homeland security
Cyber security and Homeland security
ADGP, Public Grivences, Bangalore
 
Secure Cities 2013
Secure Cities 2013Secure Cities 2013
Mechatronics for Homeland Security
Mechatronics for Homeland SecurityMechatronics for Homeland Security
Mechatronics for Homeland Security
ADGP, Public Grivences, Bangalore
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
AlexisHarvey8
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
Shreyas Satpute
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
GAURAV. H .TANDON
 
CCTNS & Homeland Security
CCTNS & Homeland SecurityCCTNS & Homeland Security
CCTNS & Homeland Security
ADGP, Public Grivences, Bangalore
 
Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...
IAESIJAI
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
Proposal for System Analysis and Desing
Proposal for System Analysis and DesingProposal for System Analysis and Desing
Proposal for System Analysis and Desing
Md Khaza Main Uddin
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Age
global
 
Tecnología Anti-Poaching una excelente solución
Tecnología Anti-Poaching una excelente soluciónTecnología Anti-Poaching una excelente solución
Tecnología Anti-Poaching una excelente solución
EduardoDelCampo8
 
Purushottam Sharma
Purushottam SharmaPurushottam Sharma
Purushottam Sharma
eletseditorial
 
WCIT 2016 Jan Ming Ho
WCIT 2016 Jan Ming HoWCIT 2016 Jan Ming Ho
WCIT 2016 Jan Ming Ho
Roberto C. Mayer
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
 
Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDF
Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDFSeven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDF
Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDFTor Cannady
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Angeloluca Barba
 

Similar to HLS Perspective, Safer cities for a better tomorrow (20)

Cyber security and Homeland security
Cyber security and Homeland securityCyber security and Homeland security
Cyber security and Homeland security
 
Homeland security – A robust counter terrorism mechanism
Homeland security – A robust counter terrorism mechanismHomeland security – A robust counter terrorism mechanism
Homeland security – A robust counter terrorism mechanism
 
Geopolitics HLS Article
Geopolitics HLS ArticleGeopolitics HLS Article
Geopolitics HLS Article
 
Homeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism MechanismHomeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism Mechanism
 
Secure Cities 2013
Secure Cities 2013Secure Cities 2013
Secure Cities 2013
 
Mechatronics for Homeland Security
Mechatronics for Homeland SecurityMechatronics for Homeland Security
Mechatronics for Homeland Security
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
 
CCTNS & Homeland Security
CCTNS & Homeland SecurityCCTNS & Homeland Security
CCTNS & Homeland Security
 
Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
Proposal for System Analysis and Desing
Proposal for System Analysis and DesingProposal for System Analysis and Desing
Proposal for System Analysis and Desing
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Age
 
Tecnología Anti-Poaching una excelente solución
Tecnología Anti-Poaching una excelente soluciónTecnología Anti-Poaching una excelente solución
Tecnología Anti-Poaching una excelente solución
 
Purushottam Sharma
Purushottam SharmaPurushottam Sharma
Purushottam Sharma
 
WCIT 2016 Jan Ming Ho
WCIT 2016 Jan Ming HoWCIT 2016 Jan Ming Ho
WCIT 2016 Jan Ming Ho
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDF
Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDFSeven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDF
Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDF
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 

More from ADGP, Public Grivences, Bangalore

Towards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for IndiaTowards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for India
ADGP, Public Grivences, Bangalore
 
e-gov: Secure IT 2014
e-gov: Secure IT 2014e-gov: Secure IT 2014
e-gov: Secure IT 2014
ADGP, Public Grivences, Bangalore
 
Asymmetric warfare for geoworld
Asymmetric warfare for geoworldAsymmetric warfare for geoworld
Asymmetric warfare for geoworld
ADGP, Public Grivences, Bangalore
 
Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop
ADGP, Public Grivences, Bangalore
 
KSP Composite Computerization Model
KSP Composite Computerization ModelKSP Composite Computerization Model
KSP Composite Computerization Model
ADGP, Public Grivences, Bangalore
 
CCTNS Karnataka Overview
CCTNS Karnataka OverviewCCTNS Karnataka Overview
CCTNS Karnataka Overview
ADGP, Public Grivences, Bangalore
 

More from ADGP, Public Grivences, Bangalore (20)

Towards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for IndiaTowards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for India
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Secure it0001
Secure it0001Secure it0001
Secure it0001
 
e-gov: Secure IT 2014
e-gov: Secure IT 2014e-gov: Secure IT 2014
e-gov: Secure IT 2014
 
Asymmetric warfare for geoworld
Asymmetric warfare for geoworldAsymmetric warfare for geoworld
Asymmetric warfare for geoworld
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop
 
KSP Composite Computerization Model
KSP Composite Computerization ModelKSP Composite Computerization Model
KSP Composite Computerization Model
 
CCTNS Karnataka Overview
CCTNS Karnataka OverviewCCTNS Karnataka Overview
CCTNS Karnataka Overview
 
Xime erp creation & change management 18082013
Xime erp creation & change management 18082013Xime erp creation & change management 18082013
Xime erp creation & change management 18082013
 
Technological framework
Technological frameworkTechnological framework
Technological framework
 
E gov championship workshop bangalore 21082013
E gov championship workshop bangalore 21082013E gov championship workshop bangalore 21082013
E gov championship workshop bangalore 21082013
 
Leadership casestudy
Leadership casestudyLeadership casestudy
Leadership casestudy
 
Reaching out to the unreached
Reaching out to the unreachedReaching out to the unreached
Reaching out to the unreached
 
LTC Word
LTC WordLTC Word
LTC Word
 
LTC - 1
LTC - 1LTC - 1
LTC - 1
 
HLS Perspective. Safer cities for a better tomorrow
HLS Perspective. Safer cities for a better tomorrowHLS Perspective. Safer cities for a better tomorrow
HLS Perspective. Safer cities for a better tomorrow
 
LTC - 2
LTC - 2LTC - 2
LTC - 2
 
Unreached
UnreachedUnreached
Unreached
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

HLS Perspective, Safer cities for a better tomorrow

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. Safer Cities For A Better Tomorrow Vulnerability Assessment Threats • City Based Threats • Organized Crime, Acts of TerrorCITY • White Terror • Large Amounts of Money LaunderingSTATE •Destruction of Critical Infrastructure Illegal landing of weaponry/merchandiseNATIONAL
  • 6. Technological Framework for Safe and Secure Cities (TFSSC) Technol ogi cal Framework i nt ends t o be t he game changer f or Homel and Securi t y, provi di ng t he precursor t o generat i ng t he f unct i onal i t i es, t he out put of t he Homel and Securi t y Syst em. Lack of st andardi zat i on and uni f ormi t y of t echnol ogi cal pl at f orms has been t he maj or drawback. Thi s i s t he basi s of creat i on of saf e and
  • 7. Technological Framework for Safe and Secure Cities(TFSSC) Command and Control Center (CCC) Interception Systems (IS) City Based Video Surveillance System (CBVSS) TETRA Radio Network (TRN) Geospatial Technology for HLS (GTHLS) ERP Solution, RDBMS and Integration (ERI) Managerial Response to War on Terror (MRWT)
  • 8. Command & Control Centers City based command and control centers integrating all feeds, radio, text, audio, video, data, images and graphics from different angles, through a viable command and control center software, creating in the process a state of art C4I command and control center. It would have the capability to handle the worst of the terror attacks and natural disasters at one end and day to day responsive policing at the other end.
  • 9. Command and Control Center Integrated Command Control Coordination And Communication Syst
  • 10. Command and Control Center Ci t y based command and cont r ol cent er s i nt egr at i ng al l f eeds r adi o, audi o, vi deo, t ext , dat a, i mages and gr aphi cs f r om di f f er ent channel s, t hr ough a vi abl e command and cont r ol cent er sof t war e, cr eat i ng i n t he pr ocess a st at e of ar t C4I command and cont r ol cent er . I t woul d have t he capabi l i t y t o handl e wor st of t he t er r or at t acks and nat ur al di sast er s at one end and day t o day r esponsi ve pol i ci ng at t he ot her end. Command and Control centers
  • 11. ALERT Map Data Video Data Incident Data PCR a Ambulance C4i Operator Fire Response Task Completed Procedure & Reports Activated Incident Closed Flow Command and control center - Incident
  • 12. Interception Systems (IP) The capability to monitor and penetrate into any mode of communication and storage for the required suspected information/data and the capability to analyze and connect to our requirements on a real time basis is the urgent need and utility of the Interception Systems which needs to be put in place, upgraded or scaled up, as the case may be.
  • 13. Interception Systems ReveaLinx Architecture Data Servers Data Modelling and Analysis Investigation Presentation Analyst 1 Case A DB1 WorkstationDeploy Applications Presenter Analyst 2 Develop Applications DB2 Case Delivery Workstation Case B Results Analyst 3Direct connection to Delivery systems to retrieve data Data Files ReveaLinks Presenter Workstation
  • 14. Mobile ILD Fixed Sat IP Networks Verba PSV Mediation Storage and Archival Processing Demand & Speech WS 1 WS 2 WS3 WS4 WS5 WS6 WS7 WS8 Mass Interception Architecture Interception Systems
  • 15. City Based Video Surveillance System (CBVSS) CBVSS has a proven track record for providing the best information (Video footage) to the investigators of terror attacks across the globe, Kasab, being the prime example here. Technologically, way ahead of CCTV networks, with video analytics in build into the system, it helps find meaning in hours and hours of video footage, giving the precise output and the connects the investigator is looking for. A deterrent and a must for any big city.
  • 16. City Based Video Surveillance System
  • 17. System Management Protect the core applications fromPolicy—Reputation—Identity attack Application Security Protect the video content from Content Security misuse and abuse Network Security Ensure no attacks or Endpoint Security malfunction in the network Self-Defending Network: Ensure end Best of Breed Security in a users cannot abuse theSystems Approach system Secure access to Video Surveillance System
  • 18. Management to Video Surveillance Systems
  • 19. TETRA Radio Network (TRN) TETRA telecommunications system takes the Police Communication to the fully digital mode with a complete integration of all communication gadgets and delivery of high quality voice/data and other related outputs. TETRA eludes India. In reality it is an excellent public safety communication network, improves our response to War on Terror, organized crime and disaster management.
  • 20. Al l aut hor i t i es have t hei r own Vi r t ual Pr i vat e Net wor k(VPN) TETRA enables sharing of a common infrastructure between all mission critical users
  • 21. Geospatial Technology for HLS (GTHLS) Conventional inputs are unable to provide actionable data. The map of today is geospatial imagery/information, the third eye as it is nicknamed. Geospatial products and intelligence are critical to planning, preparation and response to terror attacks, natural & other disasters and supports incident management. It is a great tool for regulation, enforcement, monitoring and supervision.
  • 22. Geospatial Technology provides enhanced geospatial understanding of a facilities vulnerabilities and thus speeds up detection and response time in the event of a security breach Rapid access to extensive data, displayed in a geospatial medium helps protect critical assets and infrastructure and ensures public safety GEO Spatial Technology
  • 24. ERP Solution, RDBMS & Integration (ERI) RDBMS is critical to the functioning of any organization and ERP provides for populating the data on a real time basis, bringing the complete functioning of the dept. on the ERP, in Karnataka, the POLICE IT. Then integration of the legacy systems with the ERP provides for the functionalities with which the end users have been accustomed for long, on a single sign in sign out concept.
  • 25. How should we implement ERP systems Obtain the right mix of people, processes and technology!! ERP Solution
  • 26. Managerial Response to War on Terror (MRWT) Gap anal ysi s shows a huge gap i n t he l earni ng, ski l l s and at t i t ude of i nt ernal securi t y managers whi ch ought t o be bri dged. The human resources shoul d be bet t er t han t he t echni cal syst emcreat ed and made f unct i onal . Ut i l i t y i s how best we ut i l i ze. I nnovat i ve met hods i ncl usi ve of out bound l earni ng needs t o i ncul cat ed as a part of hi gh end t rai ni ng. Change management i s t he most cri t i cal component of our way f orward. Prof essi onal i sml eadi ng t o gl obal l y
  • 27. For each technology A city based network Integrated into a national network for that technology
  • 28. All technologies together All technologies should integrate into National Homeland Security Resource Base and Incident Management System
  • 29. All technologies together All technologies should integrate into National Homeland Security Resource Base and Incident Management System
  • 30. Base Document for HLS can be the beginning National Home Security Blueprint A resource for all!!!
  • 31. Visit our Web site HLS –India. Com. We owe it to every Indian