US Police Real-Time Mapping Of Terrorist Attacks

A new technology will help police officers be at the touch of their cell phones to supply them better response at scenes of terrorism and other scenes of mass casualties where good communication and the quick deployment of officers is critical.  

The technology supplies a real-time mapping capability to first responders dealing with active shooting attacks.

According to nj.com, the development is based on a system used by the US Navy SEALS in 2011, the program allows all those responding to a critical incident to “see” and communicate with each other using just their smartphones.

New Jersey Ocean County Prosecutor’s office demonstrated the technology, which Prosecutor Joseph Coronato envisions would be adopted by local school districts and then spread to other potential terrorist targets.

“With this technology, law enforcement responding to a school threat will for the first time literally be on the same page and have a complete picture of on-scene personnel,” Coronato said.

For a price tag of between $25,000 and $50,000, the prosecutor’s office bought a cloud-based secure server that will store the floor plans of schools and any other buildings or sites that could be potential terrorist targets.

The app gives police and school personnel access to those mapped plans and shows in real time the names and locations, updated every 5 seconds, of the officers on scene.

It also allows emergency responders to know where their fellow officers are, reducing the chances of a friendly-fire incident. It can also help get to victims more quickly when they can “see” if the law enforcement activity has moved away from a particular area, making it safe to get to the injured person, Coronato said.

The prosecutor’s office recently held a demonstration of the program at Central Regional High School for a dozen police agencies, including the New Jersey State Police. So far, six school districts in Ocean County are participating and two others are in the start-up phase, he said.

The sprawling high school in Berkeley, with its various hallways and more than four dozen separate entrances, highlighted the confusion law enforcement officers could face when arriving at an unfamiliar building.

As part of the training, Berkeley police officers participated in two drills, one simulating a school emergency with two victims and another with one injured and one dead.

Coronado said the SWAT team has already used the technology for a suspect who barricaded himself in his house. His office is also planning to use it for an upcoming charity. Held last year, the run in Seaside Park, was the site of a bombing, allegedly by a man who’s accused of also planting bombs in New York City and Elizabeth on the same day last year.

I-HLS

You Might Also Read: 

Wearable Sensor Tech For Beat Police Officers:

Fighting Digital Crime: Evolving Police Methods:

 

« IT Jobs Are Bound For Extinction
Dragonfly Threat: Hackers Will Sabotage Power Grids »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ECSC Group

ECSC Group

ECSC is a full-service information security provider, specialising in 24/7/365 security breach detection and Artificial Intelligence (AI).

Tanium

Tanium

Tanium is an endpoint security and systems management company.

SAMATE

SAMATE

The Software Assurance Metrics And Tool Evaluation project is an inter-agency project between the US Department of Homeland Security and NIST.

Cloud53

Cloud53

Cloud53 specialise in improving operational IT through strategic use of Cloud technologies and services.

Australian Signals Directorate (ASD)

Australian Signals Directorate (ASD)

The Australian Signals Directorate is an intelligence agency in the Australian Government Department of Defence.

ActiveCyber

ActiveCyber

ActiveCyber is a source for news, reviews, learning, and technological innovation in the active cyber defense industry.

Communications Security Establishment (CSE)

Communications Security Establishment (CSE)

CSE is Canada's national cryptologic agency, providing the Government of Canada with IT Security and foreign signals intelligence (SIGINT) services.

Lumu Technologies

Lumu Technologies

Lumu is a cybersecurity company that illuminates threats and attacks affecting enterprises worldwide.

RIA in a Box

RIA in a Box

MyRIACompliance combines our team of RIA compliance experts with an online software platform to help investment advisers better manage regulatory compliance and cybersecurity responsibilities.

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC) is an information security company providing website vulnerability scanning and monitoring services.

Deft

Deft

Deft (formerly ServerCentral Turing Group) is a trusted provider of colocation, cloud, and disaster recovery services.

RubinBrown

RubinBrown

RubinBrown LLP is a leading accounting and professional consulting firm. The RubinBrown name and reputation are synonymous with experience, integrity and value.

Imprivata

Imprivata

Imprivata is the digital identity company for life- and mission-critical industries, redefining how organizations solve complex workflow, security, and compliance challenges.

Auriga

Auriga

Auriga create innovative software and have become a benchmark for high quality banking software including cyber security solutions to protect business critical devices.

NetAlly

NetAlly

NetAlly network test solutions help engineers and technicians better deploy, manage, maintain, and secure today’s complex wired and wireless networks.

Securitybricks

Securitybricks

Securitybricks specialize in cloud security and compliance. Our mission is to automate regulatory compliance backed by human validation.