US Police Real-Time Mapping Of Terrorist Attacks

A new technology will help police officers be at the touch of their cell phones to supply them better response at scenes of terrorism and other scenes of mass casualties where good communication and the quick deployment of officers is critical.  

The technology supplies a real-time mapping capability to first responders dealing with active shooting attacks.

According to nj.com, the development is based on a system used by the US Navy SEALS in 2011, the program allows all those responding to a critical incident to “see” and communicate with each other using just their smartphones.

New Jersey Ocean County Prosecutor’s office demonstrated the technology, which Prosecutor Joseph Coronato envisions would be adopted by local school districts and then spread to other potential terrorist targets.

“With this technology, law enforcement responding to a school threat will for the first time literally be on the same page and have a complete picture of on-scene personnel,” Coronato said.

For a price tag of between $25,000 and $50,000, the prosecutor’s office bought a cloud-based secure server that will store the floor plans of schools and any other buildings or sites that could be potential terrorist targets.

The app gives police and school personnel access to those mapped plans and shows in real time the names and locations, updated every 5 seconds, of the officers on scene.

It also allows emergency responders to know where their fellow officers are, reducing the chances of a friendly-fire incident. It can also help get to victims more quickly when they can “see” if the law enforcement activity has moved away from a particular area, making it safe to get to the injured person, Coronato said.

The prosecutor’s office recently held a demonstration of the program at Central Regional High School for a dozen police agencies, including the New Jersey State Police. So far, six school districts in Ocean County are participating and two others are in the start-up phase, he said.

The sprawling high school in Berkeley, with its various hallways and more than four dozen separate entrances, highlighted the confusion law enforcement officers could face when arriving at an unfamiliar building.

As part of the training, Berkeley police officers participated in two drills, one simulating a school emergency with two victims and another with one injured and one dead.

Coronado said the SWAT team has already used the technology for a suspect who barricaded himself in his house. His office is also planning to use it for an upcoming charity. Held last year, the run in Seaside Park, was the site of a bombing, allegedly by a man who’s accused of also planting bombs in New York City and Elizabeth on the same day last year.

I-HLS

You Might Also Read: 

Wearable Sensor Tech For Beat Police Officers:

Fighting Digital Crime: Evolving Police Methods:

 

« IT Jobs Are Bound For Extinction
Dragonfly Threat: Hackers Will Sabotage Power Grids »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

Malomatia

Malomatia

Malomatia is a leading provider of technology services and solutions in Qatar including information security.

Qufaro

Qufaro

Qufaro is a new initiative designed to make it simpler for those with career ambitions in cyber security to access the UK’s cyber-specific education and innovation opportunities.

Havelsan

Havelsan

HAVELSAN is a leading technology company in Turkey developing indigenous systems for domestic and foreign military, public and private sector clients.

Syskode Technologies

Syskode Technologies

Sykode Technologies is a next-generation global technology company offering an integrated portfolio of advisory services, products and solutions in areas including AI, IoT and Cyber Security.

Information System Authority (RIA) - Estonia

Information System Authority (RIA) - Estonia

RIA ensures the interoperability of the state’s information system, organises activities related to information security, and handles security incidents in Estonian computer networks.

Activu

Activu

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security.

Dynamic Quest

Dynamic Quest

Dynamic Quest is a managed IT, cloud and security services companies, providing a comprehensive range of technology services including cybersecurity, backup and disaster recovery.

Regulativ.ai

Regulativ.ai

Regulativ.ai is an innovative and comprehensive platform, driven by AI, to address the regulatory and compliance needs of Cyber Security Regulatory compliance and reporting.

Cyber Security Services

Cyber Security Services

Cyber Security Services is a cyber security consulting firm and security operations center (SOC).

ArmorCode

ArmorCode

ArmorCode's intelligent application security platform gives us unified visibility into AppSec postures and automates complex DevSecOps workflows.

Cognilytica

Cognilytica

Cognilytica’s Cognitive Project Management for AI (CPMAI) training and certification is recognized around the world as the best practices methodology for implementing successful AI & ML projects.

Bluewave

Bluewave

Bluewave are a strategic IT advisory company that offers businesses a simple and comprehensive way to purchase information technology solutions.

Lineaje

Lineaje

Lineaje solves critical Software Supply Chain security problems faced by every organization that builds, uses or sells software.

Averlon

Averlon

Averlon offers organizations peerless cloud security through Panoptic Cloud Visibility, Predictive Attack Intelligence and Rapid Remediation.

appNovi

appNovi

appNovi inventories everything to map the attack surface, identify missing security agents, and prioritize vulnerabilities based on exposure.