The document proposes a Technological Framework for Safe and Secure Cities (TFSSC) to address threats facing cities from organized crime, terrorism, and infrastructure destruction. The framework includes:
1. Command and control centers to integrate different data feeds and coordinate emergency response.
2. Interception systems to monitor communications and analyze suspicious information.
3. A city-based video surveillance system to provide investigative footage.
4. A TETRA radio network for secure digital police communication.
5. Geospatial technology to provide actionable mapping data for planning, preparation, and emergency response.
UiPath Test Automation using UiPath Test Suite series, part 2
HLS Perspective. Safer cities for a better tomorrow
1.
2.
3.
4.
5. Safer Cities For A Better
Tomorrow
Vulnerability Assessment
Threats
• City Based Threats
• Organized Crime, Acts of TerrorCITY
• White Terror
• Large Amounts of Money LaunderingSTATE
•Destruction of Critical Infrastructure
Illegal landing of weaponry/merchandiseNATIONAL
6. Technological Framework for Safe and
Secure Cities (TFSSC)
Technol ogi cal Framework i nt ends t o be t he game changer
f or
Homel and Securi t y, provi di ng t he precursor t o generat i ng
t he
f unct i onal i t i es, t he out put of t he Homel and Securi t y
Syst em.
Lack of st andardi zat i on and uni f ormi t y of t echnol ogi cal
pl at f orms
has been t he maj or drawback. Thi s i s t he basi s of
creat i on of saf e and
7. Technological Framework for Safe
and Secure Cities(TFSSC)
Command and Control Center (CCC)
Interception Systems (IS)
City Based Video Surveillance System (CBVSS)
TETRA Radio Network (TRN)
Geospatial Technology for HLS (GTHLS)
ERP Solution, RDBMS and Integration (ERI)
Managerial Response to War on Terror (MRWT)
8. Command & Control Centers
City based command and control centers
integrating all feeds, radio, text, audio, video, data,
images and graphics from different angles, through
a viable command and control center software,
creating in the process a state of art C4I command
and control center. It would have the capability to
handle the worst of the terror attacks and natural
disasters at one end and day to day responsive
policing at the other end.
9. Command and Control Center
Integrated Command Control Coordination And Communication Syst
10. Command and Control Center
Ci t y based command and cont r ol cent er s
i nt egr at i ng al l f eeds r adi o, audi o, vi deo, t ext ,
dat a, i mages and gr aphi cs f r om di f f er ent
channel s, t hr ough a vi abl e command and cont r ol
cent er sof t war e, cr eat i ng i n t he pr ocess a st at e
of ar t C4I command and cont r ol cent er . I t woul d
have t he capabi l i t y t o handl e wor st of t he
t er r or at t acks and nat ur al di sast er s at one end
and day t o day r esponsi ve pol i ci ng at t he ot her
end.
Command and Control centers
11. ALERT
Map Data Video Data Incident Data
PCR
a
Ambulance
C4i Operator
Fire
Response Task Completed
Procedure & Reports
Activated Incident Closed
Flow Command and control center - Incident
12. Interception Systems (IP)
The capability to monitor and penetrate into any mode of
communication and storage for the required suspected
information/data and the capability to analyze and
connect to our requirements on a real time basis is the
urgent need and utility of the Interception Systems which
needs to be put in place, upgraded or scaled up, as the
case may be.
13. Interception Systems
ReveaLinx Architecture
Data Servers Data Modelling and Analysis Investigation Presentation
Analyst 1 Case A
DB1
WorkstationDeploy
Applications
Presenter
Analyst 2
Develop Applications
DB2 Case
Delivery
Workstation Case B
Results Analyst 3Direct connection to Delivery
systems to retrieve data
Data
Files
ReveaLinks Presenter
Workstation
14. Mobile ILD Fixed Sat IP
Networks
Verba PSV
Mediation
Storage and Archival
Processing Demand & Speech
WS 1 WS 2 WS3 WS4 WS5 WS6 WS7 WS8
Mass Interception Architecture
Interception Systems
15. City Based Video Surveillance
System (CBVSS)
CBVSS has a proven track record for providing the best
information (Video footage) to the investigators of terror
attacks across the globe, Kasab, being the prime example
here. Technologically, way ahead of CCTV networks, with
video analytics in build into the system, it helps find
meaning in hours and hours of video footage, giving the
precise output and the connects the investigator is looking
for. A deterrent and a must for any big city.
17. System Management Protect the core
applications fromPolicy—Reputation—Identity
attack
Application Security
Protect the video
content from
Content Security misuse and
abuse
Network Security
Ensure no
attacks or
Endpoint Security malfunction in
the network
Self-Defending Network:
Ensure end
Best of Breed Security in a users cannot
abuse theSystems Approach
system
Secure access to Video Surveillance System
19. TETRA Radio Network (TRN)
TETRA telecommunications system takes the Police
Communication to the fully digital mode with a complete
integration of all communication gadgets and delivery of
high quality voice/data and other related outputs. TETRA
eludes India. In reality it is an excellent public safety
communication network, improves our response to War on
Terror, organized crime and disaster management.
20. Al l aut hor i t i es have t hei r own Vi r t ual Pr i vat e
Net wor k(VPN)
TETRA enables sharing of a common
infrastructure between all mission critical users
21. Geospatial Technology
for HLS (GTHLS)
Conventional inputs are unable to provide actionable data.
The map of today is geospatial imagery/information, the
third eye as it is nicknamed. Geospatial products and
intelligence are critical to planning, preparation and
response to terror attacks, natural & other disasters and
supports incident management. It is a great tool
for regulation, enforcement, monitoring and supervision.
22. Geospatial Technology provides enhanced
geospatial understanding of a facilities vulnerabilities
and thus speeds up detection and response time in the
event of a security breach
Rapid access to extensive data, displayed in a
geospatial medium helps protect critical assets and
infrastructure and ensures public safety
GEO Spatial Technology
24. ERP Solution, RDBMS
& Integration (ERI)
RDBMS is critical to the functioning of any organization
and ERP provides for populating the data on a real time
basis, bringing the complete functioning of the dept. on
the ERP, in Karnataka, the POLICE IT. Then integration of
the legacy systems with the ERP provides for the
functionalities with which the end users have been
accustomed for long, on a single sign in sign out concept.
25. How should we implement ERP systems
Obtain the right mix of people, processes and technology!!
ERP Solution
26. Managerial Response to War
on Terror (MRWT)
Gap anal ysi s shows a huge gap i n t he l earni ng,
ski l l s and at t i t ude of i nt ernal securi t y
managers whi ch ought t o be bri dged. The human
resources shoul d be bet t er t han t he t echni cal
syst emcreat ed and made f unct i onal . Ut i l i t y i s
how best we ut i l i ze. I nnovat i ve met hods
i ncl usi ve of out bound l earni ng needs t o
i ncul cat ed as a part of hi gh end t rai ni ng.
Change management i s t he most cri t i cal
component of our way f orward.
Prof essi onal i sml eadi ng t o gl obal l y
27. For each technology
A city based network
Integrated into a national
network for that technology
28. All technologies together
All technologies should
integrate into National
Homeland Security Resource
Base and Incident Management
System
29. All technologies together
All technologies should
integrate into National
Homeland Security Resource
Base and Incident Management
System
30. Base Document for HLS
can be the beginning
National Home Security
Blueprint
A resource for all!!!
31. Visit our Web site HLS –India. Com.
We owe it to every
Indian