US Police Real-Time Mapping Of Terrorist Attacks

A new technology will help police officers be at the touch of their cell phones to supply them better response at scenes of terrorism and other scenes of mass casualties where good communication and the quick deployment of officers is critical.  

The technology supplies a real-time mapping capability to first responders dealing with active shooting attacks.

According to nj.com, the development is based on a system used by the US Navy SEALS in 2011, the program allows all those responding to a critical incident to “see” and communicate with each other using just their smartphones.

New Jersey Ocean County Prosecutor’s office demonstrated the technology, which Prosecutor Joseph Coronato envisions would be adopted by local school districts and then spread to other potential terrorist targets.

“With this technology, law enforcement responding to a school threat will for the first time literally be on the same page and have a complete picture of on-scene personnel,” Coronato said.

For a price tag of between $25,000 and $50,000, the prosecutor’s office bought a cloud-based secure server that will store the floor plans of schools and any other buildings or sites that could be potential terrorist targets.

The app gives police and school personnel access to those mapped plans and shows in real time the names and locations, updated every 5 seconds, of the officers on scene.

It also allows emergency responders to know where their fellow officers are, reducing the chances of a friendly-fire incident. It can also help get to victims more quickly when they can “see” if the law enforcement activity has moved away from a particular area, making it safe to get to the injured person, Coronato said.

The prosecutor’s office recently held a demonstration of the program at Central Regional High School for a dozen police agencies, including the New Jersey State Police. So far, six school districts in Ocean County are participating and two others are in the start-up phase, he said.

The sprawling high school in Berkeley, with its various hallways and more than four dozen separate entrances, highlighted the confusion law enforcement officers could face when arriving at an unfamiliar building.

As part of the training, Berkeley police officers participated in two drills, one simulating a school emergency with two victims and another with one injured and one dead.

Coronado said the SWAT team has already used the technology for a suspect who barricaded himself in his house. His office is also planning to use it for an upcoming charity. Held last year, the run in Seaside Park, was the site of a bombing, allegedly by a man who’s accused of also planting bombs in New York City and Elizabeth on the same day last year.

I-HLS

You Might Also Read: 

Wearable Sensor Tech For Beat Police Officers:

Fighting Digital Crime: Evolving Police Methods:

 

« IT Jobs Are Bound For Extinction
Dragonfly Threat: Hackers Will Sabotage Power Grids »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

European Council on Foreign Relations (ECFR)

European Council on Foreign Relations (ECFR)

ECFR is a pan-European think-tank conducting research and promote informed debate on European foreign policy. Cyber security is becoming an intrinsic element of foreign policy debate.

SecurityMetrics

SecurityMetrics

SecurityMetrics is leader in data security, PCI, and HIPAA compliance solutions

Intland Software

Intland Software

Intland offer an integrated Application Lifecycle Management platform that offers all-round Requirements, Development, and Testing & Quality Assurance functionality.

Oracle Cloud Security

Oracle Cloud Security

Oracle’s cloud security solutions enable organizations to implement and manage consistent security policies across the hybrid data center.

TraceSecurity

TraceSecurity

TraceSecurity, a leading pioneer in cloud-based security solutions, provides IT governance, risk and compliance (GRC) management solutions.

RKH Specialty

RKH Specialty

RKH Specialty, part of the Hyperion Insurance Group, is a provider of specialty insurance services including Cyber Risk cover.

Bird & Bird

Bird & Bird

Bird & Bird is an international law firm with a focus on helping organisations being changed by technology and the digital world. Areas of expertise include cyber security.

Axence

Axence

Axence provides professional solutions for the comprehensive management of IT infrastructure for companies and institutions all over the world.

ICS Cyber Security Conference

ICS Cyber Security Conference

SecurityWeek’s Industrial Control Systems (ICS) Cyber Security Conference is the largest and longest-running event series focused on industrial cybersecurity.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

BetaDen

BetaDen

BetaDen provides a revolutionary platform for businesses to develop next-generation technology, such as the internet of things and industry 4.0.

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

Iterasec

Iterasec

Iterasec provides a full range of security services to hacker-proof your products and make software engineering process secure by design.

Viakoo

Viakoo

Viakoo is an Enterprise IoT Applications Management company providing performance, security, and compliance. Viakoo enables you to be proactive in maintaining cyber hygiene and protecting your network

C/side (cside)

C/side (cside)

At c/side, we're creating the ultimate delivery, performance and detection mechanism for browser-side fetched 3rd party Javascript.

Koop

Koop

Koop’s trust management platform helps navigate the complexities of regulatory compliance, security reviews, and liability insurance in a single place.